CN105117663B - The encrypted object display methods and device of a kind of application - Google Patents
The encrypted object display methods and device of a kind of application Download PDFInfo
- Publication number
- CN105117663B CN105117663B CN201510612958.0A CN201510612958A CN105117663B CN 105117663 B CN105117663 B CN 105117663B CN 201510612958 A CN201510612958 A CN 201510612958A CN 105117663 B CN105117663 B CN 105117663B
- Authority
- CN
- China
- Prior art keywords
- touch operation
- user
- preset
- touch
- encrypted object
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 47
- 238000012795 verification Methods 0.000 claims abstract description 63
- 230000001960 triggered effect Effects 0.000 claims description 25
- 230000008569 process Effects 0.000 claims description 21
- 238000012544 monitoring process Methods 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 7
- 230000006870 function Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Collating Specific Patterns (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses the encrypted object display methods and device of a kind of application, wherein, this method includes:During terminal operating third-party application, the user fingerprints information that user carries out preset fingerprint recognition region touch operation input is obtained;Judge whether the user fingerprints information matches with preset verification finger print information;If matching with the verification finger print information, in the range of the corresponding display duration of the touch operation, the encrypted object in the third-party application is shown.Implement the embodiment of the present invention, the display of the encrypted object of application can be controlled according to user fingerprints information, avoid privacy of user leakage.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an encrypted object display method and apparatus for an application.
Background
With the development of terminal technology, more and more functions can be used on various terminals such as mobile phones, and great convenience is brought to users. In the use process of the terminal, some pictures or videos related to the privacy of the user need to be encrypted many times to prevent the privacy from being leaked.
In the current encryption mode, after an image or a video is encrypted, a prompt message that the image or the video is encrypted is generally displayed, so that other users can know the existence of the encrypted object, and the encrypted object has the possibility of being decrypted, thereby causing privacy disclosure.
Disclosure of Invention
The embodiment of the invention provides an application encrypted object display method and device, which can control the display of an application encrypted object according to user fingerprint information and avoid the privacy disclosure of a user.
The embodiment of the invention discloses an applied encrypted object display method, which comprises the following steps:
acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process of running a third-party application by a terminal;
judging whether the user fingerprint information is matched with preset verification fingerprint information or not;
and if the fingerprint information is matched with the verification fingerprint information, displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the obtaining of the user fingerprint information input by the user through touch operation on the preset fingerprint identification area, the method further includes:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, monitoring the touch duration corresponding to the touch operation;
judging whether the touch duration exceeds a preset time threshold or not;
and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the user through touch operation on a preset fingerprint identification area.
Optionally, before the displaying the encrypted object in the third-party application, the method further includes:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, acquiring touch pressure corresponding to the touch operation;
judging whether the touch pressure exceeds a preset pressure threshold value;
and if the preset pressure threshold is exceeded, executing the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the displaying the encrypted object in the third-party application, the method further includes:
outputting a preset message prompt, wherein the message prompt is used for reminding a user of inputting voiceprint information;
receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information;
and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed.
Optionally, the displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation includes:
if the verification fingerprint information is matched with the verification fingerprint information, displaying an encrypted object in the third-party application;
detecting whether the input user fingerprint information is matched with the verification fingerprint information or not according to a preset time interval;
hiding an encrypted object in the third party application when the user fingerprint information does not match the verification fingerprint information.
Correspondingly, the embodiment of the invention also discloses a display device, which comprises:
the information acquisition module is used for acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process that the terminal runs the third-party application;
the fingerprint matching module is used for judging whether the user fingerprint information acquired by the information acquisition module is matched with preset verification fingerprint information or not;
and the display module is used for displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the fingerprint matching module is that the user fingerprint information is matched with the verification fingerprint information.
Optionally, the apparatus further comprises:
the time monitoring module is used for monitoring the touch duration corresponding to the touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the first judgment module is used for judging whether the touch duration monitored by the time monitoring module exceeds a preset time threshold value or not;
and the first notification module is used for notifying the information acquisition module to acquire user fingerprint information input by a user through touch operation on a preset fingerprint identification area when the judgment result of the first judgment module is that the touch duration exceeds the preset time threshold.
Optionally, the apparatus further comprises:
the pressure acquisition module is used for acquiring touch pressure corresponding to touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the second judging module is used for judging whether the touch pressure acquired by the pressure acquiring module exceeds a preset pressure threshold value or not;
and the second notification module is used for notifying the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the second judgment module is that the touch pressure exceeds the preset pressure threshold.
Optionally, the apparatus further comprises:
the output module is used for outputting a preset message prompt, and the message prompt is used for reminding a user of inputting voiceprint information;
the third judging module is used for receiving voiceprint information input by a user in response to the message prompt and judging whether the voiceprint information is matched with preset voiceprint information;
and the third informing module is used for informing the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the third judging module is that the voiceprint information is matched with the preset voiceprint information.
Optionally, the display module is further configured to hide an encrypted object in the third-party application when the user fingerprint information acquired by the information acquisition module is not matched with the verification fingerprint information.
The embodiment of the invention has the following beneficial effects:
according to the embodiment of the invention, when fingerprint information input by a user through touch operation is detected in the running process of the third-party application, the input user fingerprint information is matched and compared with the preset verification fingerprint information, so that the encrypted object in the third-party application can be displayed within the display duration of the touch operation when the user fingerprint information is matched with the verification fingerprint information. According to the embodiment of the invention, the display of the applied encrypted object can be controlled according to the fingerprint information of the user, so that other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the user is avoided.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an encrypted object display method applied in an embodiment of the present invention;
fig. 2 is a schematic flowchart of an encrypted object display method for another application according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a display device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses an application encrypted object display method and device, which can control the display of an application encrypted object according to user fingerprint information and avoid the privacy disclosure of a user. The details are described below.
Referring to fig. 1, fig. 1 is a schematic flow chart of an applied encrypted object display method according to an embodiment of the present invention, and specifically, as shown in fig. 1, the applied encrypted object display method may include the following steps:
s101: and acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process of running the third-party application by the terminal.
It should be noted that the method of the embodiment of the present invention may be specifically applied to a terminal device (referred to as a "terminal"), where the terminal device may include, but is not limited to, a smart phone (such as an Android phone, an iOS phone, etc.), a tablet computer, a Mobile Internet device (Mobile Internet Devices, referred to as "MID"), a Personal digital assistant (Personal digital assistant, referred to as "PDA"), and other terminal Devices.
In a specific embodiment, a fingerprint identification area is preset on the terminal, for example, the fingerprint identification area can be arranged on the front or the back of the terminal, and the fingerprint identification area is correspondingly provided with a fingerprint receiver for receiving user fingerprint information. In addition, some encrypted objects are preset in the third-party application of the terminal, and the encrypted objects are in a hidden state (no encryption prompt is displayed). When the third-party application of the terminal runs, the touch operation of the user in the fingerprint identification area is detected, the fingerprint information input corresponding to the touch operation is obtained, and whether the encrypted object hidden in the third-party application is displayed or not is determined according to the input fingerprint information. The third-party application may include a picture application, a video application, a music application, and the like, which is not limited in the embodiment of the present invention.
S102: and judging whether the user fingerprint information is matched with preset verification fingerprint information.
Specifically, the verification fingerprint information may be preset by the user, for example, the user may enter the fingerprint information when the terminal is turned on for the first time, and store the entered fingerprint information as the verification fingerprint information, that is, the fingerprint information of the legitimate user.
S103: and if the fingerprint information is matched with the verification fingerprint information, displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Wherein the third party application comprises a picture application, a video application, a music application, and the like, and accordingly, the encrypted object comprises an encrypted picture, an encrypted video, an encrypted music, and the like.
In a specific embodiment, when it is detected that user fingerprint information input by a touch operation of a current user in a preset fingerprint identification area matches with preset verification fingerprint information, the current user can be used as a legal user to successfully decrypt an encrypted object in the third-party application, and the encrypted object in the third-party application can be displayed within a display duration range corresponding to the touch operation. Further, when it is detected that the user fingerprint information does not match the verification fingerprint information, the encrypted object can be hidden and not displayed any more. The display duration corresponding to the touch operation may refer to a duration preset according to different application types, for example, the display duration of an encrypted picture in a picture application may be set to 2 minutes, the display duration of an encrypted video in a video application may be set to a video playing duration of the encrypted video, the display duration of the encrypted music in a music application may be set to a music playing duration of the encrypted music, and the like; or, the display duration corresponding to the touch operation may also refer to a time period corresponding to a preset time interval, that is, user fingerprint information may be acquired according to the preset time interval and fingerprint matching may be performed, and the encrypted object may be displayed in the time period during matching; or, the display duration corresponding to the touch operation may also refer to the touch operation duration, that is, the encrypted object is displayed before the touch operation is ended, for example, when it is detected that the touch pressure corresponding to the touch operation is smaller than a certain pressure threshold, it is considered that the touch operation is ended. In the process of browsing pictures by a third-party application such as a picture application, the encrypted picture can be hidden beyond the display duration corresponding to the touch operation, the encrypted picture is not displayed any more, and no encryption prompt is given, so that other users cannot perceive the existence of the encrypted picture.
In the embodiment of the invention, in the running process of the third-party application, the user fingerprint information input by a user through touch operation is detected, and the input user fingerprint information is matched and compared with the preset verification fingerprint information, so that when the user fingerprint information is matched with the verification fingerprint information, the encrypted object in the third-party application is displayed within the display duration of the touch operation, otherwise, the encrypted object in the third-party application is in a hidden state. According to the embodiment of the invention, the display of the applied encrypted object can be controlled according to the fingerprint information of the user, so that other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the user is avoided.
Further, referring to fig. 2, fig. 2 is a schematic flow chart of another method for displaying an encrypted object of an application according to an embodiment of the present invention, and specifically, as shown in fig. 2, the method for displaying an encrypted object of an application may include the following steps:
s201: and receiving a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area in the process of running the third-party application by the terminal.
The third-party application may include a picture application, a video application, a music application, and the like, which is not limited in the embodiment of the present invention.
In a specific embodiment, the terminal may encrypt some application objects in the third-party application, such as the picture application, according to the user requirement, that is, one or more encrypted objects are preset, so that the encrypted picture object, that is, the encrypted picture, is in a hidden state, and no encryption prompt is displayed. When the encrypted picture needs to be viewed, the display of the encrypted object of the application can be controlled according to the user fingerprint information, so that the privacy of the user is effectively protected.
S202: and responding to the touch instruction, and acquiring user fingerprint information corresponding to the touch operation.
Further, in an optional embodiment, before the user fingerprint information input by the touch operation is acquired, when a touch instruction triggered by a touch operation performed on a preset fingerprint identification area by a user is detected, a touch duration corresponding to the touch operation may be monitored; judging whether the touch duration exceeds a preset time threshold or not; and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the touch operation. Specifically, when the touch operation of the user in the fingerprint identification area is detected, the touch duration corresponding to the touch operation can be triggered and monitored, the monitored touch duration is compared with a preset time threshold, if the detected touch duration does not reach the preset time threshold, for example, 2s (seconds), the touch duration of the touch operation is continuously monitored, and when the touch duration reaches 2s, the fingerprint information of the user can be triggered and obtained. Therefore, the situation that a user initiates a decryption display flow of the encrypted object when the user operates the terminal by mistake is avoided, and the power consumption of the terminal is saved.
Further, when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, the terminal can further detect touch pressure corresponding to the touch operation, and when the detected touch pressure exceeds a preset pressure threshold, the terminal executes the acquisition of user fingerprint information corresponding to the touch operation and subsequent processes thereof; otherwise, the fingerprint information corresponding to the touch operation is not acquired, so that the power consumption of the terminal is saved.
S203: and judging whether the user fingerprint information is matched with preset verification fingerprint information.
Specifically, the verification fingerprint information may be preset by a user, for example, the user may enter the fingerprint information when the terminal is powered on for the first time, or enter the fingerprint after inputting a certain preset fingerprint password in the using process of the terminal, and the like. The input fingerprint information is stored as verification fingerprint information, namely fingerprint information of a legal user, and is used for matching comparison in the decryption display process of an applied encrypted object.
S204: and displaying the encrypted object in the third-party application.
Wherein, the third party application can comprise a picture application, a video application, a music application, and the like, and accordingly, the encrypted object comprises an encrypted picture, an encrypted video, an encrypted music, and the like.
In a specific embodiment, when it is detected that user fingerprint information input by a touch operation of a current user in a preset fingerprint identification area is matched with preset verification fingerprint information, the current user can be used as a legal user to indicate that decryption of an encrypted object, namely an encrypted picture, in a third-party application, such as a picture application is successful, and the encrypted picture of the picture application can be displayed within a display duration range corresponding to the touch operation; and if not, continuously hiding the encrypted picture, and monitoring a touch instruction triggered by the touch operation of the user on a preset fingerprint identification area. The display duration corresponding to the touch operation can be duration preset according to different application types; or, the time period may also be a time period corresponding to a preset time interval; or, the time length of the touch operation may be referred to, that is, the display of the encrypted object is performed before the touch operation is ended. The embodiment of the present invention takes the display duration as the time period corresponding to the preset time interval as an example for explanation.
S205: and detecting whether the input user fingerprint information is matched with the verification fingerprint information or not according to a preset time interval.
S206: hiding an encrypted object in the third party application when the user fingerprint information does not match the verification fingerprint information.
For example, if the preset time interval is that fingerprint detection is performed every 10 seconds(s), the time period corresponding to the preset time interval may be set to 10s (or slightly greater than 10 s). Specifically, after the hidden encrypted object such as the encrypted picture is displayed, whether the fingerprint information of the current user is matched with the verification fingerprint information can be detected again every 10s, and if the fingerprint information of the current user is matched with the verification fingerprint information, the hidden encrypted picture is continuously displayed; otherwise, the encrypted picture is hidden.
Further, in an optional embodiment, before the encrypted object in the third-party application is displayed, when a touch instruction triggered by a touch operation performed on a preset fingerprint identification area by a user is detected, a touch pressure corresponding to the touch operation may also be acquired; judging whether the touch pressure exceeds a preset pressure threshold value; and if the preset pressure threshold is exceeded, executing the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation. Optionally, when a touch operation of a user is detected, touch parameters such as user fingerprint information and touch pressure corresponding to the touch operation may be obtained, and when the user fingerprint information matches with preset verification fingerprint information and the touch pressure is not lower than a preset pressure threshold, it is determined that decryption of an encrypted object in a current third-party application is successful, and the encrypted object is displayed within a display duration range corresponding to the touch operation; otherwise, when the user fingerprint information is not matched with the verification fingerprint information or the touch pressure is lower than the preset pressure threshold value, the decryption is regarded as failed, the encrypted object in the third-party application is continuously hidden, and the encrypted object is forbidden to be displayed.
Further, in an optional embodiment, after detecting that user fingerprint information input by a touch operation of a user matches with the verification fingerprint information and before displaying the encrypted object in the third-party application, a preset message prompt may be further output, where the message prompt is used to prompt the user to input voiceprint information; receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information; and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed. Similar to the fingerprint verification information, the preset voiceprint information can also be preset by the user.
In the embodiment of the invention, when a touch instruction triggered by a user touch operation is detected in the running process of a third-party application of a terminal, whether a touched position point is in a preset area range or not can be detected, user fingerprint information corresponding to the touch operation is triggered and acquired when the touched position point is in the preset area range, and the user fingerprint information is matched and compared with preset verification fingerprint information, so that an encrypted object in the third-party application is displayed within the display time of the touch operation when the user fingerprint information is matched with the verification fingerprint information, otherwise, the encrypted object in the third-party application is in a hidden state, other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the users is avoided.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a display device according to an embodiment of the present invention, and specifically, as shown in fig. 3, the display device according to an embodiment of the present invention may include an information obtaining module 11, a fingerprint matching module 12, and a display module 13. Wherein,
the information obtaining module 11 is configured to obtain user fingerprint information input by a user through touch operation on a preset fingerprint identification area in a process that the terminal runs a third-party application.
It should be noted that the apparatus according to the embodiment of the present invention may be specifically disposed in a terminal device (or simply referred to as a "terminal"), where the terminal device may include, but is not limited to, a terminal device configured with a touch screen, such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a Mobile Internet Device (MID), a Personal Digital Assistant (PDA), and the like.
In a specific embodiment, a fingerprint identification area is preset on the terminal, for example, the fingerprint identification area can be arranged on the front or the back of the terminal, and the fingerprint identification area is correspondingly provided with a fingerprint receiver for receiving user fingerprint information. In addition, some encrypted objects are preset in the third-party application of the terminal, and the encrypted objects are in a hidden state (no encryption prompt is displayed). When the third-party application of the terminal runs, the information acquisition module 11 can detect the touch operation of the user in the fingerprint identification area, and acquire the fingerprint information input corresponding to the touch operation, so as to determine whether to display the encrypted object hidden in the third-party application according to the input fingerprint information.
The fingerprint matching module 12 is configured to determine whether the user fingerprint information acquired by the information acquiring module 11 matches preset verification fingerprint information.
Specifically, the verification fingerprint information may be preset by the user, for example, the user may enter the fingerprint information when the terminal is turned on for the first time, and store the entered fingerprint information as the verification fingerprint information, that is, the fingerprint information of the legitimate user.
The display module 13 is configured to display the encrypted object in the third-party application within a display duration range corresponding to the touch operation when the determination result of the fingerprint matching module 12 is that the user fingerprint information matches the verification fingerprint information.
The third-party application includes a picture application, a video application, a music application, and the like, which is not limited in the embodiment of the present invention. Accordingly, the encrypted object includes an encrypted picture, an encrypted video, an encrypted music, and the like.
The display module 13 is further configured to hide an encrypted object in the third-party application when the user fingerprint information acquired by the information acquisition module 11 is not matched with the verification fingerprint information.
In a specific embodiment, when the fingerprint matching module 12 detects that the user fingerprint information input by the touch operation of the current user matches the preset verification fingerprint information, the current user may be regarded as a valid user, and the encrypted object in the third-party application is successfully decrypted, and then the display module 13 may display the encrypted object in the third-party application within the display duration range corresponding to the touch operation. Further, when the display module 13 detects that the user fingerprint information does not match the verification fingerprint information, the encrypted object is hidden and is not displayed any more. The display duration corresponding to the touch operation can be duration preset according to different application types; or, the time period may also be a time period corresponding to a preset time interval; or, the time length of the touch operation may also be referred to, that is, the encrypted object is displayed before the touch operation is ended, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, in the running process of the third-party application, the user fingerprint information input by a user through touch operation is detected, and the input user fingerprint information is matched and compared with the preset verification fingerprint information, so that when the user fingerprint information is matched with the verification fingerprint information, the encrypted object in the third-party application is displayed within the display duration of the touch operation, otherwise, the encrypted object in the third-party application is in a hidden state. According to the embodiment of the invention, the display of the applied encrypted object can be controlled according to the fingerprint information of the user, so that other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the user is avoided.
Further, in an alternative embodiment, the apparatus may further comprise (not shown in the figures):
the time monitoring module 14 is configured to monitor a touch duration corresponding to a touch operation when a touch instruction triggered by the touch operation performed on a preset fingerprint identification area by a user is detected;
a first judging module 15, configured to judge whether the touch duration monitored by the time monitoring module 14 exceeds a preset time threshold;
a first notifying module 16, configured to notify the information obtaining module to obtain user fingerprint information that a user performs a touch operation input on a preset fingerprint identification area when the determination result of the first determining module 15 is that the touch duration exceeds the preset time threshold.
Specifically, when the touch operation of the user is detected, the touch duration corresponding to the touch operation may be monitored by the time monitoring module 14, the first determining module 15 compares the monitored touch duration with a preset time threshold, if the detected touch duration does not reach the preset time threshold, for example, 2s (seconds), the touch duration of the touch operation is continuously monitored, and when the touch duration reaches 2s, the first notifying module 16 may be triggered to obtain the fingerprint information of the user. Therefore, the situation that a user initiates a decryption display flow of the encrypted object when the user operates the terminal by mistake is avoided, and the power consumption of the terminal is saved.
Further, in an alternative embodiment, the apparatus may further comprise (not shown in the figures):
the pressure acquisition module 17 is configured to acquire a touch pressure corresponding to a touch operation when a touch instruction triggered by the touch operation performed on a preset fingerprint identification area by a user is detected;
a second determining module 18, configured to determine whether the touch pressure acquired by the pressure acquiring module 17 exceeds a preset pressure threshold;
and a second notifying module 19, configured to notify the display module 13 to display the encrypted object in the third-party application within a display duration range corresponding to the touch operation when the determination result of the second determining module 18 is that the touch pressure exceeds the preset pressure threshold.
Optionally, when the touch operation of the user is detected, the information obtaining module 11 may obtain user fingerprint information corresponding to the touch operation and the pressure obtaining module 17 may obtain touch parameters such as touch pressure corresponding to the touch operation, and when the fingerprint matching module 12 detects that the user fingerprint information matches with preset verification fingerprint information, and the second determining module 18 determines that the decryption of the encrypted object in the current third-party application is successful when the touch pressure is not lower than the preset pressure threshold, and displays the encrypted object in the display duration range corresponding to the touch operation; otherwise, when the fingerprint matching module 12 detects that the user fingerprint information is not matched with the verification fingerprint information or the determination result of the second determining module 18 is that the touch pressure is lower than the preset pressure threshold, it may be determined that decryption has failed, and the display module 13 continues to hide the encrypted object in the third-party application and forbids display of the encrypted object.
Further, in an alternative embodiment, the apparatus may further comprise (not shown in the figures):
the output module 20 is configured to output a preset message prompt, where the message prompt is used to prompt a user to input voiceprint information;
a third judging module 21, configured to receive voiceprint information input by a user in response to the message prompt, and judge whether the voiceprint information matches preset voiceprint information;
a third notifying module 22, configured to notify the display module 13 to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the determination result of the third determining module 21 is that the voiceprint information matches preset voiceprint information.
Similar to the fingerprint verification information, the preset voiceprint information can also be preset by the user.
In the embodiment of the invention, when a touch instruction triggered by a user touch operation is detected in the running process of a third-party application of a terminal, whether a touched position point is in a preset area range or not can be detected, user fingerprint information corresponding to the touch operation is triggered and acquired when the touched position point is in the preset area range, and the user fingerprint information is matched and compared with preset verification fingerprint information, so that an encrypted object in the third-party application is displayed within the display time of the touch operation when the user fingerprint information is matched with the verification fingerprint information, otherwise, the encrypted object in the third-party application is in a hidden state, other users cannot perceive the existence of the encrypted object, and the privacy disclosure of the users is avoided.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. Specifically, as shown in fig. 4, the terminal device according to the embodiment of the present invention may include: at least one processor 100, at least one input device 200, at least one output device 300, memory 500, etc. Wherein the components are communicatively coupled via one or more buses 400. Those skilled in the art will appreciate that the configuration of the terminal device shown in fig. 4 is not intended to limit the embodiments of the present invention, and may be a bus structure, a star structure, a combination of more or less components than those shown, or a different arrangement of components. Wherein:
the processor 100 is a control center of the terminal device (or simply referred to as a terminal), connects various parts of the entire terminal device using various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing programs and/or modules stored in the memory 500 and calling data stored in the memory 500. The processor 100 may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 100 may include only a Central Processing Unit (CPU), or may be a combination of a CPU, a Digital Signal Processor (DSP), a Graphics Processing Unit (GPU), and various control chips. In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
The input device 200 may include a standard touch screen, keyboard, camera, etc., and may also include a wired interface, wireless interface, etc.
The output device 300 may include a display screen, a speaker, etc., and may also include a wired interface, a wireless interface, etc.
The memory 500 may be used to store software programs and modules, and the processor 100, the input device 200 and the output device 300 execute various functional applications of the terminal device and implement data processing by calling the software programs and modules stored in the memory 500. The memory 500 mainly includes a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the data storage area may store data created according to the use of the terminal device, and the like. In the embodiment of the present invention, the operating system may be an Android system, an iOS system, a Windows operating system, or the like.
Specifically, the processor 100 calls an application program stored in the memory 500 for executing the following steps:
acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area in the process of running a third-party application by a terminal;
judging whether the user fingerprint information is matched with preset verification fingerprint information or not;
and if the fingerprint information is matched with the verification fingerprint information, displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the processor 100 invokes the application program stored in the memory 500 to execute the step of acquiring the user fingerprint information input by the user through touch operation on the preset fingerprint identification area, the processor is further configured to execute the following steps:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, monitoring the touch duration corresponding to the touch operation;
judging whether the touch duration exceeds a preset time threshold or not;
and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the user through touch operation on a preset fingerprint identification area.
Optionally, before the processor 100 calls the application program stored in the memory 500 to execute the display of the encrypted object in the third-party application, the following steps are further performed:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, acquiring touch pressure corresponding to the touch operation;
judging whether the touch pressure exceeds a preset pressure threshold value;
and if the preset pressure threshold is exceeded, executing the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation.
Optionally, before the processor 100 calls the application program stored in the memory 500 to execute the display of the encrypted object in the third-party application, the following steps are further performed:
outputting a preset message prompt, wherein the message prompt is used for reminding a user of inputting voiceprint information;
receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information;
and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed.
Optionally, the processor 100 calls an application program stored in the memory 500 to execute the display of the encrypted object in the third party application within the display duration range corresponding to the touch operation, and specifically executes the following steps:
if the verification fingerprint information is matched with the verification fingerprint information, displaying an encrypted object in the third-party application;
detecting whether the input user fingerprint information is matched with the verification fingerprint information or not according to a preset time interval;
hiding an encrypted object in the third party application when the user fingerprint information does not match the verification fingerprint information.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (7)
1. An encrypted object display method for an application, comprising:
in the process that the terminal runs a third-party application, when a touch instruction triggered by a user touch operation is detected and a touched position point is detected to be within a preset area range, user fingerprint information input by the user through the touch operation on a preset fingerprint identification area is acquired;
judging whether the user fingerprint information is matched with preset verification fingerprint information or not;
if the fingerprint verification information is matched with the verification fingerprint information and the touch pressure corresponding to the touch operation is not lower than a preset pressure threshold value, determining that the encryption object in the current third-party application is successfully decrypted, and displaying the encryption object in the third-party application within the display duration range corresponding to the touch operation;
the display duration corresponding to the touch operation refers to the operation duration of the touch operation, and the displaying of the encrypted object in the third-party application in the display duration range corresponding to the touch operation refers to: displaying the encrypted object before the touch operation is finished, and determining that the touch operation is finished when detecting that the touch pressure corresponding to the touch operation is smaller than a pressure threshold;
after the hidden encrypted object is displayed, whether the current user fingerprint information is matched with the verification fingerprint information is detected again at preset time intervals, and if the current user fingerprint information is matched with the verification fingerprint information, the hidden encrypted object is continuously displayed; and if not, hiding the encrypted object.
2. The method according to claim 1, wherein before the acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area, the method further comprises:
when a touch instruction triggered by touch operation of a user on a preset fingerprint identification area is detected, monitoring the touch duration corresponding to the touch operation;
judging whether the touch duration exceeds a preset time threshold or not;
and if the preset time threshold is exceeded, executing the step of acquiring the user fingerprint information input by the user through touch operation on a preset fingerprint identification area.
3. The method of claim 1, wherein prior to said displaying the encrypted object in the third-party application, the method further comprises:
outputting a preset message prompt, wherein the message prompt is used for reminding a user of inputting voiceprint information;
receiving voiceprint information input by a user in response to the message prompt, and judging whether the voiceprint information is matched with preset voiceprint information;
and if the encrypted object is matched with the preset voiceprint information, the step of displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation is executed.
4. A display device, comprising:
the information acquisition module is used for acquiring user fingerprint information input by a user through touch operation on a preset fingerprint identification area when a touch instruction triggered by the touch operation of the user is detected and a touched position point is detected to be in a preset area range in the process that the terminal runs the third-party application;
the fingerprint matching module is used for judging whether the user fingerprint information acquired by the information acquisition module is matched with preset verification fingerprint information or not;
the display module is used for determining that the decryption of the encrypted object in the current third-party application is successful when the judgment result of the fingerprint matching module is that the user fingerprint information is matched with the verification fingerprint information and the touch pressure corresponding to the touch operation is not lower than a preset pressure threshold value, and displaying the encrypted object in the third-party application within the display duration range corresponding to the touch operation;
the display duration corresponding to the touch operation refers to the operation duration of the touch operation, and the displaying of the encrypted object in the third-party application in the display duration range corresponding to the touch operation refers to: displaying the encrypted object before the touch operation is finished, and determining that the touch operation is finished when detecting that the touch pressure corresponding to the touch operation is smaller than a certain pressure threshold;
after the hidden encrypted object is displayed, the fingerprint matching module detects whether the current user fingerprint information is matched with the verification fingerprint information again at preset time intervals, and if so, the display module continues to display the hidden encrypted object; and if not, hiding the encrypted object by the display module.
5. The apparatus of claim 4, further comprising:
the time monitoring module is used for monitoring the touch duration corresponding to the touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the first judgment module is used for judging whether the touch duration monitored by the time monitoring module exceeds a preset time threshold value or not;
and the first notification module is used for notifying the information acquisition module to acquire user fingerprint information input by a user through touch operation on a preset fingerprint identification area when the judgment result of the first judgment module is that the touch duration exceeds the preset time threshold.
6. The apparatus of claim 4, further comprising:
the pressure acquisition module is used for acquiring touch pressure corresponding to touch operation when a touch instruction triggered by the touch operation of a user on a preset fingerprint identification area is detected;
the second judging module is used for judging whether the touch pressure acquired by the pressure acquiring module exceeds a preset pressure threshold value or not;
and the second notification module is used for notifying the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the second judgment module is that the touch pressure exceeds the preset pressure threshold.
7. The apparatus of claim 4, further comprising:
the output module is used for outputting a preset message prompt, and the message prompt is used for reminding a user of inputting voiceprint information;
the third judging module is used for receiving voiceprint information input by a user in response to the message prompt and judging whether the voiceprint information is matched with preset voiceprint information;
and the third informing module is used for informing the display module to display the encrypted object in the third-party application within the display duration range corresponding to the touch operation when the judgment result of the third judging module is that the voiceprint information is matched with the preset voiceprint information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510612958.0A CN105117663B (en) | 2015-09-23 | 2015-09-23 | The encrypted object display methods and device of a kind of application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510612958.0A CN105117663B (en) | 2015-09-23 | 2015-09-23 | The encrypted object display methods and device of a kind of application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105117663A CN105117663A (en) | 2015-12-02 |
CN105117663B true CN105117663B (en) | 2018-07-06 |
Family
ID=54665647
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510612958.0A Expired - Fee Related CN105117663B (en) | 2015-09-23 | 2015-09-23 | The encrypted object display methods and device of a kind of application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105117663B (en) |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105653924A (en) * | 2015-12-30 | 2016-06-08 | 魅族科技(中国)有限公司 | Touch screen operation method and device |
CN105678184A (en) * | 2015-12-30 | 2016-06-15 | 魅族科技(中国)有限公司 | Display method and device and terminal |
CN105740687B (en) * | 2016-01-29 | 2018-11-16 | 广东欧珀移动通信有限公司 | A kind of method and terminal for opening hidden file folder |
CN105812533B (en) * | 2016-03-08 | 2019-04-05 | 北京珠穆朗玛移动通信有限公司 | A kind of secret incoming display method and mobile terminal |
CN105844181A (en) * | 2016-03-23 | 2016-08-10 | 深圳市金立通信设备有限公司 | Key instruction processing method and terminal |
CN107292185B (en) * | 2016-03-30 | 2021-05-28 | 创新先进技术有限公司 | Method and terminal for displaying private information |
CN105893826B (en) * | 2016-04-25 | 2018-10-23 | 北京奇虎科技有限公司 | Message display method based on finger print information and intelligent terminal |
CN106056011A (en) * | 2016-05-30 | 2016-10-26 | 维沃移动通信有限公司 | Display method and mobile terminal |
CN106295368A (en) * | 2016-08-17 | 2017-01-04 | 四川长虹通信科技有限公司 | The data security protection method of a kind of mobile terminal and system |
CN106127013A (en) * | 2016-08-26 | 2016-11-16 | 广东欧珀移动通信有限公司 | Encryption and decryption method, device and mobile terminal |
CN106407773B (en) * | 2016-08-26 | 2019-03-19 | Oppo广东移动通信有限公司 | Decryption method, device and mobile terminal |
CN106650368A (en) * | 2016-10-12 | 2017-05-10 | 珠海格力电器股份有限公司 | Encrypted information display method and device |
CN107967107A (en) * | 2016-10-20 | 2018-04-27 | 中兴通讯股份有限公司 | One kind browses object lock method and system |
CN107506634B (en) * | 2017-07-31 | 2020-02-14 | Oppo广东移动通信有限公司 | Data display method and device, storage medium and terminal |
CN107798230B (en) * | 2017-10-24 | 2020-04-17 | Oppo广东移动通信有限公司 | Terminal control method, device, terminal and computer readable storage medium |
CN109857470B (en) * | 2019-01-24 | 2022-05-13 | Oppo广东移动通信有限公司 | Fingerprint unlocking method and related equipment |
CN112073560A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
CN113282899B (en) * | 2021-04-01 | 2023-04-25 | 维沃移动通信有限公司 | Object management method, device, electronic equipment and readable storage medium |
CN113676781A (en) * | 2021-08-23 | 2021-11-19 | 深圳市唐为电子有限公司 | Audio-visual broadcast control system of smart mobile phone |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
CN103246389A (en) * | 2012-02-03 | 2013-08-14 | 三星电子株式会社 | Method of operating multi-touch panel and terminal supporting the same |
CN103425915A (en) * | 2012-05-25 | 2013-12-04 | 汉王科技股份有限公司 | Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device |
CN104700010A (en) * | 2013-12-05 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Personal information protection method and protection device |
CN104751068A (en) * | 2013-12-26 | 2015-07-01 | 珠海金山办公软件有限公司 | File protection method and device |
CN104898940A (en) * | 2015-04-30 | 2015-09-09 | 努比亚技术有限公司 | Picture processing method and device |
CN104915141A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Method and device for previewing object information |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104765552B (en) * | 2015-04-28 | 2019-04-19 | 小米科技有限责任公司 | Right management method and device |
CN104899501A (en) * | 2015-06-24 | 2015-09-09 | 小米科技有限责任公司 | Dialog list display method and device and terminal |
-
2015
- 2015-09-23 CN CN201510612958.0A patent/CN105117663B/en not_active Expired - Fee Related
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103246389A (en) * | 2012-02-03 | 2013-08-14 | 三星电子株式会社 | Method of operating multi-touch panel and terminal supporting the same |
CN103425915A (en) * | 2012-05-25 | 2013-12-04 | 汉王科技股份有限公司 | Method and device for identifying whether unauthorized users read display content of electronic device or not and electronic device |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
CN104700010A (en) * | 2013-12-05 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Personal information protection method and protection device |
CN104751068A (en) * | 2013-12-26 | 2015-07-01 | 珠海金山办公软件有限公司 | File protection method and device |
CN104898940A (en) * | 2015-04-30 | 2015-09-09 | 努比亚技术有限公司 | Picture processing method and device |
CN104915141A (en) * | 2015-05-28 | 2015-09-16 | 努比亚技术有限公司 | Method and device for previewing object information |
Also Published As
Publication number | Publication date |
---|---|
CN105117663A (en) | 2015-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105117663B (en) | The encrypted object display methods and device of a kind of application | |
CN105159530B (en) | A kind of the display object switching method and device of application | |
CN107643977B (en) | Anti-addiction method and related product | |
US20170140137A1 (en) | Multi-System Entering Method, Apparatus and Terminal | |
CN104751066A (en) | Information processing method and device | |
CN107832595B (en) | Locking method and related equipment | |
TWI516972B (en) | Method for applying safety verification, applying server, applying client and system | |
CN105281907B (en) | Encrypted data processing method and device | |
CN105050061A (en) | Method and device for sending messages on the basis of user voiceprint information | |
CN104951684A (en) | Fingerprint encryption and decryption method and terminal | |
CN106648583B (en) | Information processing method and terminal | |
KR101634531B1 (en) | Device and method for preventing information from being leakage by screen capture in video output apparatus | |
WO2016145624A1 (en) | Information processing method and mobile terminal | |
CN109271228A (en) | Interface function recognition methods, device and the electronic equipment of application | |
CN107085694B (en) | Information display processing method and device | |
WO2018165341A1 (en) | Contact information display method and device, and information display method and device | |
CN107742073A (en) | Information displaying method, device, computer installation and computer-readable recording medium | |
CN105577378A (en) | Identity authentication method, apparatus, and system | |
CN111177770B (en) | Sensitive information protection method, mobile equipment and storage device | |
WO2021092769A1 (en) | Security protection method and device, mobile terminal, and storage medium | |
CN105224885A (en) | A kind of data processing method and terminal | |
CN106102011A (en) | Method, device and the terminal that a kind of terminal positioning processes | |
CN104378202B (en) | Information processing method, electronic terminal and server | |
CN106779717B (en) | Payment authentication method and device | |
CN107247900B (en) | Method and device for acquiring login password of operating system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CP01 | Change in the name or title of a patent holder | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20180706 |
|
CF01 | Termination of patent right due to non-payment of annual fee |