CN106407779A - Information acquisition method and apparatus, and terminal - Google Patents

Information acquisition method and apparatus, and terminal Download PDF

Info

Publication number
CN106407779A
CN106407779A CN201610806164.2A CN201610806164A CN106407779A CN 106407779 A CN106407779 A CN 106407779A CN 201610806164 A CN201610806164 A CN 201610806164A CN 106407779 A CN106407779 A CN 106407779A
Authority
CN
China
Prior art keywords
finger print
information
print information
user
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610806164.2A
Other languages
Chinese (zh)
Inventor
彭凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610806164.2A priority Critical patent/CN106407779A/en
Publication of CN106407779A publication Critical patent/CN106407779A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the invention discloses an information acquisition method and apparatus, and a terminal. The information acquisition method comprises the following steps: when the terminal is in a working state, acquiring first fingerprint information of a user, then verifying the first fingerprint information, starting a camera in the case of verification failure to collect image information of the user, and finally storing the first fingerprint information and the image information. By adoption of the scheme, the fingerprint information and the image information of a current operator in the case of fingerprint verification failure can be collected and stored, and thus compared with the prior art, the security of information in the terminal is improved.

Description

A kind of information getting method, device and terminal
Technical field
The present invention relates to field of terminal technology, more particularly, to a kind of information getting method, device and terminal.
Background technology
Development with the Internet and the development of mobile communications network, the also disposal ability along with terminal and storage simultaneously The fast development of ability, the application program of magnanimity has obtained rapid propagation and use;Conventional application program is facilitating user's work While making and live, it is no lack of the application program newly developed daily life also into user, improves the life matter of user Amusement sense in amount, the frequency of using terminal and use.
At present, terminal on the market progressively has fingerprint identification function, carries out equipment unblock using fingerprint recognition, can be very The safety of good raising mobile phone.But still there is certain security risk in overall security.Such as, open during unlocked by fingerprint also Remain original gesture password unblock, numerical ciphers unblock etc., once so gesture password, numerical ciphers etc. are by unauthorized use Family is known, unauthorized user can bypass unlocked by fingerprint easily, opens user terminal in the case that user has no to discover, and invades Privacy of user.
Understand, the poor technical problem of existence information safety in terminal.
Content of the invention
The embodiment of the present invention provides a kind of information getting method, device and terminal, can solve existence information peace in terminal The complete poor technical problem of property.
The embodiment of the present invention provides a kind of information getting method, including:
When terminal is in running order, obtain first finger print information of user;
Described first finger print information is verified;
If authentication failed, open photographic head, to gather the image information of described user;
Preserve described first finger print information and described image information.
Correspondingly, embodiments provide a kind of information acquisition device, including:
Fingerprint acquisition module, for when terminal is in running order, obtaining first finger print information of user;
Authentication module, for verifying to described first finger print information;
Opening module, for, when to described first finger print information authentication failed, opening photographic head, to gather described user Image information;
Preserving module, for preserving described first finger print information and described image information.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, and described terminal includes photographic head;
Touch display screen;
One or more processors;
Memorizer;And
One or more programs, wherein said one or more programs are stored in described memorizer, and be configured to by One or more of computing devices, one or more of programs include the finger for realizing above- mentioned information acquisition methods Order.
The embodiment of the present invention using when terminal is in running order, obtains first finger print information of user, then, to the One finger print information is verified, if authentication failed, opens photographic head, to gather the image information of user, finally, preserves first Finger print information and image information;The program can gather and preserve in fingerprint authentication failure the finger print information of current operator And image information, in terms of existing technologies, improve the safety of information in terminal.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, will make to required in embodiment description below Accompanying drawing be briefly described it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those skilled in the art, on the premise of not paying creative work, can also be obtained other attached according to these accompanying drawings Figure.
Fig. 1 is the schematic flow sheet of the information getting method that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the information getting method that the embodiment of the present invention two provides;
Fig. 3 is the structural representation of the first information acquisition device that the embodiment of the present invention three provides;
Fig. 4 is the structural representation of the second information acquisition device that the embodiment of the present invention three provides;
Fig. 5 is the structural representation of the third information acquisition device that the embodiment of the present invention three provides;
Fig. 6 is the structural representation of the terminal that the embodiment of the present invention four provides.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, the every other enforcement that those skilled in the art are obtained under the premise of not making creative work Example, broadly falls into the scope of protection of the invention.
The embodiment of the present invention provides a kind of information getting method, device and terminal.It is described in detail respectively below.
Embodiment one,
The present embodiment will be described from the angle of information acquisition device, and this information acquisition device specifically can be integrated in end In end, this terminal can be the equipment such as smart mobile phone, panel computer.
A kind of information getting method, including:When terminal is in running order, obtain first finger print information of user;Right First finger print information is verified;If authentication failed, open photographic head, to gather the image information of user;Preserve the first finger Stricture of vagina information and image information.
As shown in figure 1, information getting method, idiographic flow can be as follows:
101st, when terminal is in running order, obtain first finger print information of user.
Specifically, working condition refers to non-screen lock state, now, terminal removing screen locking and enter operation interface.Can To arrange fingerprint recognition module in this terminal, when fingerprint input operation has been detected, this fingerprint recognition of acquisition can be triggered The finger print information that module recognizes.
In the present embodiment, in order to monitor unauthorized user privately using the equipment of owner, can not discover in operator In the case of obtain the relevant informations such as its fingerprint.And the mode obtaining the first finger print information can have multiple, such as, operator makes Returned main screen, returned page up, check that backstage etc. operates with the execution of home key can be used during terminal unavoidably, in view of This, can gather user fingerprints, to be avoided operator to discover while operator triggers these operational orders;That is, step " obtaining first finger print information of user " idiographic flow can be as follows:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by this fingerprint key.
Specifically, fingerprint key refers to secondary or physical bond or the virtual key with fingerprint recognition module (as fingerprint sensor), such as, This fingerprint key can be the main screen key (i.e. home key) with fingerprint recognition module, and it can be virtual in embedded display screen Key or the physical button outside display screen.And pre-conditioned can according to characteristics such as the structure of terminal, functions, by Those skilled in the art or equipment manufacturer are set.Such as, this pre-conditioned can be set to:Instruction interface redirects or cuts Change;That is, the step of step " judging whether operational order meets pre-conditioned ", it is specifically as follows:
Judge that whether this operational order is the operational order of preset kind;
If so, then judge that this operational order meets pre-conditioned;
If it is not, it is pre-conditioned then to judge that this operational order is unsatisfactory for.
In specific implementation process, the operational order of this preset kind can be set to the side by pressing or touch-control fingerprint key The changing interface instruction of formula triggering, such as returns main interface, returns page up etc..Regardless of result of determination, terminal can The operational order that normal execution user is triggered by fingerprint key, is not affected by result of determination.
102nd, the first finger print information is verified.
Specifically, can determine whether operator is unauthorized user by fingerprint authentication.Wherein, verify finger print information Mode can have multiple, such as, the finger print information that operator inputs can be compared with finger print information storehouse set in advance;? That is, step " the first finger print information is verified " specifically can include:
Judge to whether there is the sample fingerprint information mated with the first finger print information in sample set;
If existing, judge the first finger print information is proved to be successful;
If not existing, judge to the first finger print information authentication failed.
Wherein, include at least one sample fingerprint information in sample set.If it is determined that being proved to be successful, then can determine behaviour Author is authorized user, if authentication failed, can determine that operator is unauthorized user to a certain extent.
In specific implementation process, in order to ensure Consumer's Experience, and also to avoiding operator to discover the monitoring of terminal Operation, regardless of the result, terminal can normally execute the operational order that above-mentioned user is triggered by fingerprint key, and Do not affected by the result.
If 103 authentication faileds, open photographic head, to gather the image information of user.
Specifically, if authentication failed, may be considered unauthorized user privately using the equipment of owner, now can open Open the image information of photographic head acquisition operations person, to record current operator's information.Wherein, photographic head can be preferably preposition taking the photograph As head, it is, of course, also possible to open post-positioned pick-up head.The image information collecting is specifically as follows human body information, such as face information, Limbs information, clothing information etc..
It is in specific implementation process, not sensitive etc. because of extraneous factor interference (as water droplet), fingerprint recognition module, Lead to fingerprint recognition module obtain operator finger print information imperfect, and cause fingerprint authentication failure so that terminal judges.For Avoid the situation of this erroneous judgement, can repeatedly finger print information be verified, if multiple authentication failure, may be considered Unauthorized user is privately using the equipment of owner.That is, after to the first finger print information authentication failed, open photographic head it Before, the method can also include:
Obtain the cumulative number of current finger print Information Authentication failure;
Judge whether cumulative number is more than predetermined threshold value;
If being more than, the step that photographic head is opened in execution.
Wherein, predetermined threshold value can hardware configuration based on equipment, equipment performance etc., by those skilled in the art or set Standby manufacturer is configured, it is of course also possible to according to the installation situation of software in terminal, voluntarily be arranged by user.Such as, this is pre- If threshold value could be arranged to 2 times, 3 inferior.
104th, the first finger print information and image information are preserved.
Specifically, after to the first finger print information authentication failed, by the get first finger print information and operator Image information is saved in the memory block of terminal, so that authorized user checks in the later stage.When next authorized user's using terminal, can , in specified folder, to read safety message, check whether unauthorized user invasion mobile phone, if having extremely photograph can be consulted Piece and fingerprint, to determine unauthorized user information.
In the present embodiment, preserve the operation of the first finger print information and the operation opening photographic head has no time order and function sequentially Requirement.That is, step 103 can be after preserving the first finger print information, before preserving image information, execution is it is also possible to right After first finger print information is verified, execute before preserving the first finger print information.
In the specific implementation, the operation note of current operator can also after to the first finger print information authentication failed, be recorded Which file record, such as checked, sent, copied which file etc., be saved in the lump in safety message.
In actual applications, in order to avoid disturbing because of extraneous factor, fingerprint recognition module is not sensitive etc. causes terminal by mistake Judge, lead to obtain by mistake, preserve finger print information and image information by mistake, occupy unnecessary memory space, can be by preservation by mistake Information deletion;That is, after preserving the first finger print information and image information, the method can also include:
Judge whether to get the second finger print information in preset time period;
If so, then the second finger print information is verified;
If being proved to be successful, delete the first finger print information and the image information of preservation.
Wherein, preset time period can be set by those skilled in the art or manufacturer, such as, this Preset Time Section can be set as 10s, 1min etc..
Specifically it is contemplated that terminal models are commonly fingerprint recognition is multiplexed type with home key, operator is in using terminal During can constantly use the function of home key.Therefore, if preset time period arrange reasonable, then it is considered that The finger print information getting in preset time period, namely the fingerprint letter that same operator is inputted by fingerprint key (i.e. home key) Breath, and again finger print information is verified.If being proved to be successful then it is assumed that authentication failed before is terminal erroneous judgement.Now, The first finger print information and the image information of preservation can be deleted, to expand memory space.
From the foregoing, it will be observed that embodiments providing a kind of information getting method, adopt when terminal is in running order, Obtain first finger print information of user, then, the first finger print information is verified, if authentication failed, open photographic head, with The image information of collection user, finally, preserves the first finger print information and image information;The program can be in fingerprint authentication failure When gather and preserve finger print information and the image information of current operator, in terms of existing technologies, improve letter in terminal The safety of breath.
Embodiment two,
Citing is described in further detail by method according to described by embodiment one below.
In the present embodiment, will with this information acquisition device specifically integrated in the terminal, by fingerprint key and main screen key (home key) is multiplexed, and taking be integrated in mobile terminal in the form of secondary or physical bond is as a example described in detail.
As shown in Fig. 2 a kind of information getting method, idiographic flow can be as follows:
201st, the authentication information of acquisition for mobile terminal user input, wherein, this authentication information is used for removing screen locking.
In the present embodiment, mobile terminal needs to open screen lock, successfully unlocks and just can enter operation interface.This authentication information Can be specifically gesture information (as pattern password), biological information (as finger-print cipher), Word message (as numerical ciphers) Deng for removing screen locking.
202nd, mobile terminal judges whether authentication information is identical with default authentication information;If so, execution step 203, if it is not, Execution step 205.
Specifically, mobile terminal is after getting the authentication information of user input, can call the pre- of storage in data base If authentication information, based on this default authentication information, the authentication information obtaining is verified, judge whether to be proved to be successful.
203rd, mobile terminal removing screen locking, and the finger print information of user is obtained by pressing home key.
Specifically, when judging that authentication information is identical with default authentication information, namely the authentication information obtaining is verified into Work(, at this point it is possible to call relative program removing screen locking, so that mobile terminal enters working condition.Wherein, home key is tool There is the physical button of fingerprint recognition module (as fingerprint sensor).When fingerprint input operation has been detected, acquisition can be triggered The finger print information that this fingerprint recognition module recognizes.
In the present embodiment, in order to monitor unauthorized user privately using the equipment of owner, can not discover in operator In the case of obtain the information such as its fingerprint.And the mode obtaining finger print information can have multiple, such as, operator using mobile eventually The execution of home key can be used during end unavoidably return main screen, return page up, check that backstage etc. operates, in view of this, User fingerprints can be gathered while operator triggers these operational orders, to avoid operator to discover;That is, step is " logical Cross the finger print information that pressing home key obtains user " idiographic flow can be as follows:
Obtain the operational order that user is triggered by home key;
Judge whether operational order meets pre-conditioned;
If meeting, obtain the finger print information of user by this fingerprint key.
Such as, this pre-conditioned can be set to:Instruction interface redirects or switches;That is, whether step " judges operational order Meet pre-conditioned " step, be specifically as follows:
Judge that whether this operational order is the operational order of preset kind;
If so, then judge that this operational order meets pre-conditioned;
If it is not, it is pre-conditioned then to judge that this operational order is unsatisfactory for.
In specific implementation process, the operational order of this preset kind can be set to changing interface instruction, such as returns to main boundary Face, return page up etc..Regardless of result of determination, mobile terminal can normally be executed user and be triggered by fingerprint key Operational order, do not affected by result of determination.
204th, mobile terminal judges whether finger print information is proved to be successful;If so, execution step 203;If it is not, execution step 205.
Specifically, can determine whether operator is unauthorized user by fingerprint authentication.Wherein, verify finger print information Mode can have multiple, such as, the finger print information that operator inputs can be compared with finger print information storehouse set in advance;? That is, step " judging whether finger print information is proved to be successful " specifically can include:
Judge to whether there is the sample fingerprint information mated with finger print information in sample set;
If existing, judge finger print information is proved to be successful;
If not existing, judge to finger print information authentication failed.
Wherein, include at least one sample fingerprint information in sample set.If it is determined that being proved to be successful, then can determine behaviour Author is authorized user, now can continue executing with detection in step 203, the operation of acquisition finger print information;If authentication failed, Then can determine that operator is unauthorized user to a certain extent.
In specific implementation process, in order to ensure Consumer's Experience, and also to avoiding operator to discover mobile terminal Policer operation, regardless of the result, mobile terminal can normally execute above by the instruction of home key trigger action, and Do not affected by the result.
205th, mobile terminal opens photographic head, to gather the image information of user.
Specifically, if authentication failed, may be considered unauthorized user privately using the equipment of owner, now can open Open the image information of photographic head acquisition operations person, such as face information, limbs information, clothing information etc., to record current operator Information.
It is in specific implementation process, not sensitive etc. because of extraneous factor interference (as water droplet), fingerprint recognition module, Lead to the finger print information of fingerprint recognition module acquisition operator imperfect, and cause fingerprint authentication failure so that mobile terminal is sentenced Disconnected.In order to avoid the situation of this erroneous judgement, can repeatedly finger print information be verified, if multiple authentication failure, permissible It is considered unauthorized user privately using the equipment of owner.That is, after to finger print information authentication failed, open photographic head it Before, the method can also include:
Obtain the cumulative number of current finger print Information Authentication failure;
Judge whether cumulative number is more than predetermined threshold value;
If being more than, the step that photographic head is opened in execution.
Wherein, predetermined threshold value can hardware configuration based on equipment, equipment performance etc., by those skilled in the art or set Standby manufacturer is configured, it is of course also possible to according to the installation situation of software in mobile terminal, voluntarily be arranged by user.Such as, This predetermined threshold value could be arranged to 2 times, 3 inferior.
206th, mobile terminal preserves finger print information and image information.
Specifically, after getting finger print information and image information, save it in the memory block of mobile terminal, with Check in later stage for authorized user.When next authorized user uses mobile terminal, safety can be read and reports in specified folder Accuse, checked whether unauthorized user invasion mobile phone, if having extremely photo and fingerprint can be consulted, to determine unauthorized user letter Breath.
In the specific implementation, the operation note of current operator can also after to the first finger print information authentication failed, be recorded Which file record, such as checked, sent, copied which file etc., be saved in the lump in safety message.
In actual applications, in order to avoid disturbing because of extraneous factor, fingerprint recognition module is not sensitive etc. cause mobile eventually End erroneous judgement, leads to obtain by mistake, preserves finger print information and image information by mistake, occupy unnecessary memory space, can be protected by mistake The information deletion deposited;That is, after preserving finger print information and image information, the method can also include:
Judge whether be proved to be successful to by the finger print information that home key obtains in preset time period;
If being proved to be successful, delete finger print information and the image information of preservation.
Wherein, preset time period can be set by those skilled in the art or manufacturer, such as, this Preset Time Section can be set as 10s, 1min etc..
Specifically it is contemplated that mobile terminal fingerprint recognition is multiplexed type with home key, operator is using mobile terminal During can constantly use the function of home key.Therefore, if preset time period arrange reasonable, then it is considered that pre- If the finger print information getting in the time period, namely the finger print information that same operator is inputted by fingerprint key (i.e. home key), And again finger print information is verified.If being proved to be successful then it is assumed that authentication failed before is mobile terminal erroneous judgement.This When, finger print information and the image information of the last preservation can be deleted, to expand memory space.
From the foregoing, it will be observed that embodiments providing a kind of information getting method, using mobile terminal to user input Authentication information is verified, if authentication failed, opens photographic head acquisition operations person's image information;If being proved to be successful, release Screen locking, when the finger print information of user is detected by home key, is verified to finger print information, if authentication failed, Open photographic head acquisition operations person's image information, and preserve finger print information and the image information collecting;The program can be Gather and preserve finger print information and the image information of current operator during fingerprint authentication failure, in terms of existing technologies, carry The safety of information in high terminal.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of information acquisition device, this acquisition of information Device can integrated in the terminal, this terminal specifically can include the equipment such as mobile phone, panel computer, notebook computer.As Fig. 3 institute Show, this information acquisition device can include fingerprint acquisition module 301, authentication module 302, opening module 303 and preserving module 304, as follows:
Fingerprint acquisition module 301, for when terminal is in running order, obtaining first finger print information of user;
Authentication module 302, for verifying to the first finger print information;
Opening module 303, for, when to the first finger print information authentication failed, opening photographic head, to gather the figure of user As information;
Preserving module 304, for preserving the first finger print information and image information.
In some embodiments, this fingerprint acquisition module 301, specifically can be used for:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether this operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by this fingerprint key
In some embodiments, as shown in figure 4, this device can also include:Number of times acquisition module 305 and the first judgement Module 306;
Number of times acquisition module 305, for, after to the first finger print information authentication failed, before opening photographic head, obtaining The cumulative number of current finger print Information Authentication failure;
First judge module 306, for judging whether cumulative number is more than predetermined threshold value;
Opening module 303, specifically for when the first judge module 306 is judged to be, opening photographic head.
In some embodiments, as shown in figure 5, this device can also include:Second judge module 307 and removing module 308;
Second judge module 307, for, after preserving the first finger print information and described image information, judging default The second finger print information whether is got in time period;
This authentication module 302, specifically for when the second judge module 307 is judged to be, carrying out to the second finger print information Checking;
Removing module 308, for when being proved to be successful to the second finger print information, delete the first finger print information preserving and Image information.
In some embodiments, authentication module 302, specifically can be used for:
Judge to whether there is the sample fingerprint information mated with the first finger print information in sample set;
If existing, judge the first finger print information is proved to be successful;
If not existing, judge to the first finger print information authentication failed.
From the foregoing, it will be observed that embodiments providing a kind of information acquisition device, using fingerprint acquisition module 301 in terminal When in running order, obtain first finger print information of user, by authentication module 302, first finger print information is verified, if Authentication failed, then open photographic head by opening module 303, to gather the image information of user, preserves first by preserving module 304 Finger print information and image information;The program can gather and preserve in fingerprint authentication failure the finger print information of current operator And image information, in terms of existing technologies, improve the safety of information in terminal.
Example IV,
The present embodiment provides a kind of terminal, and this terminal can include photographic head;
Touch display screen;
One or more processors;
Memorizer;And
One or more programs, wherein one or more programs are stored in described memorizer, and are configured to by one Or multiple computing device, one or more programs include for realizing the instruction as any one information getting method above-mentioned.
Such as, refer to Fig. 6, this terminal 400 can include radio frequency (RF, Radio Frequency) circuit 401, include There are the memorizer 402 of one or more computer-readable recording mediums, input block 403, display unit 404, sensor 405th, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407, include one or one with The parts such as the processor 408 of upper processing core, power supply 409 and photographic head 410.It will be understood by those skilled in the art that Fig. 6 Shown in terminal structure not structure paired terminal restriction, ratio can be included and illustrate more or less of part, or combination Some parts, or different part arrangements.
Radio circuit 401 can be used for receiving and sending messages, or the reception of signal and transmission in communication process, especially, by base station Downlink information receive after, transfer to one or more than one processor 408 processed;In addition, up data is activation will be related to To base station.Generally, radio circuit 401 includes but is not limited to antenna, at least one amplifier, tuner, one or more vibration Device, subscriber identity module (SIM, SubscriberIdentity Module) card, transceiver, bonder, low-noise amplifier (LNA, LowNoiseAmplifier), duplexer etc..Additionally, radio circuit 401 can also by radio communication and network and its His equipment communication.This radio communication can use arbitrary communication standard or agreement, including but not limited to global system for mobile communications (GSM, Global System ofMobile communication), general packet radio service (GPRS, General Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division many Location (WCDMA, Wideband Code Division MultipleAccess), Long Term Evolution (LTE, Long Term Evolution), Email, Short Message Service (SMS, Short Messaging Service) etc..
Memorizer 402 can be used for storing software program and module.Processor 408 is stored in memorizer 402 by operation Software program and module, thus executing various function application and data processing.Memorizer 402 can mainly include storing journey Sequence area and storage data field, wherein, storing program area can (compare the application program needed for storage program area, at least one function As sound-playing function, image player function etc.) etc.;Storage data field can store according to terminal using the data being created (such as voice data, phone directory etc.) etc..Additionally, memorizer 402 can include high-speed random access memory, can also include Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memorizer 402 can also include Memory Controller, to provide processor 408 and input block 403 to memorizer 402 Access.
Input block 403 can be used for numeral or the character information of receives input, and produces and user setup and function Control relevant keyboard, mouse, action bars, optics or trace ball signal input.Specifically, in a specific embodiment In, input block 403 may include Touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touch Control plate, can collect user thereon or neighbouring touch operation (such as user use any suitable object such as finger, stylus or Operation on Touch sensitive surface or near Touch sensitive surface for the adnexa), and corresponding connection dress is driven according to formula set in advance Put.Optionally, Touch sensitive surface may include touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus inspection Survey the touch orientation of user, and detect the signal that touch operation brings, transmit a signal to touch controller;Touch controller from Receive touch information on touch detecting apparatus, and be converted into contact coordinate, then give processor 408, and can reception processing Order that device 408 is sent simultaneously is executed.Furthermore, it is possible to it is multiple using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Type realizes Touch sensitive surface.Except Touch sensitive surface, input block 403 can also include other input equipments.Specifically, other are defeated Enter equipment and can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, Mus One or more of mark, action bars, fingerprint recognition module etc..
Display unit 404 can be used for display and by the information of user input or is supplied to the information of user and the various of terminal Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its combination in any.Display Unit 404 may include display floater, optionally, can using liquid crystal display (LCD, Liquid Crystal Display), The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) are configuring display floater.Further , Touch sensitive surface can cover display floater, when Touch sensitive surface detects thereon or after neighbouring touch operation, sends process to Device 408, to determine the type of touch event, provides accordingly according to the type of touch event on a display panel with preprocessor 408 Visual output.Although in figure 6, Touch sensitive surface and display floater are to realize inputting as two independent parts and to input Function, but in some embodiments it is possible to will be integrated to Touch sensitive surface and display floater and realize input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light The brightness to adjust display floater for the light and shade, proximity transducer can cut out display floater and/or the back of the body when terminal moves in one's ear Light.As one kind of motion sensor, Gravity accelerometer can detect (generally three axles) acceleration in all directions Size, can detect that size and the direction of gravity when static, can be used for identify mobile phone attitude application (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Can also configure as terminal Gyroscope, barometer, drimeter, thermometer, the other sensors such as infrared ray sensor, will not be described here.
Voicefrequency circuit 406 can provide the audio interface between user and terminal by speaker, microphone.Voicefrequency circuit The voice data receiving can be converted into the signal of telecommunication by 406, be transferred to speaker, be converted to acoustical signal output by speaker; On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone, is converted to audio frequency number by voicefrequency circuit 406 after being received According to then after processing voice data output processor 408, through radio circuit 401 being sent to such as another terminal, or by sound Frequency data output is to memorizer 402 to process further.Voicefrequency circuit 406 is also possible that earphone jack, to provide peripheral hardware Earphone and the communication of terminal.
Wireless Fidelity (WiFi) belongs to short range wireless transmission technology, and terminal can be helped by wireless fidelity module 407 User sends and receive e-mail, browses webpage and access streaming video etc., and it has provided the user wireless broadband internet and has accessed. Although Fig. 6 shows wireless fidelity module 407, but it is understood that, it is simultaneously not belonging to must be configured into of terminal, completely may be used To omit in the scope of essence not changing invention as needed.
Processor 408 is the control centre of terminal, using the various pieces of various interfaces and the whole terminal of connection, leads to Cross and run or software program and/or module that execution is stored in memorizer 402, and call and be stored in memorizer 402 Data, the various functions of execution terminal and processing data, thus carry out integral monitoring to terminal.Optionally, processor 408 can wrap Include one or more processing cores;Preferably, processor 408 can integrated application processor and modem processor, wherein, should Mainly process operating system, user interface and application program etc. with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated in processor 408.
Terminal also includes the power supply 409 (such as battery) powered to all parts.Preferably, power supply can pass through power supply pipe Reason system is logically contiguous with processor 408, thus realizing management charging, electric discharge and power managed by power-supply management system Etc. function.Power supply 409 can also include one or more direct current or alternating current power supply, recharging system, power failure inspection The random component such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
The photographic head 410 that terminal also includes possessing shoot function (such as can include front-facing camera, post-positioned pick-up head Deng).Preferably, photographic head can be logically contiguous with processor 408 by processing system for video, webcam driver etc., thus logical Cross processing system for video, webcam driver is realized the function such as taking pictures, imaging.
Although not shown, terminal can also bag bluetooth module etc., will not be described here.
Specifically in the present embodiment, the processor 408 in terminal can be according to following instruction, will be one or more The corresponding executable file of process of application program is loaded in memorizer 402, and to be run by processor 408 and be stored in storage Application program in device 402, thus realize various functions:
When terminal is in running order, obtain first finger print information of user, then, the first finger print information is tested Card, if authentication failed, opens photographic head, to gather the image information of user, finally, preserves the first finger print information and image Information.
From the foregoing, it will be observed that embodiments providing a kind of terminal, this terminal, using at which when working condition, obtains First finger print information of user, then, verifies to the first finger print information, if authentication failed, opens photographic head, to gather The image information of described user, finally, preserves the first finger print information and image information;The program can be in fingerprint authentication failure When gather and preserve finger print information and the image information of current operator, in terms of existing technologies, improve letter in terminal The safety of breath.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completed with the hardware instructing correlation by program, this program can be stored in a computer-readable recording medium, storage Medium can include:Read only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
A kind of information getting method, device and the terminal that above the embodiment of the present invention are provided are described in detail, Program used herein specific case is set forth to the principle of the present invention and embodiment, and the explanation of above example is only It is to be used to help understand the method for the present invention and its core concept;Simultaneously for those skilled in the art, according to the present invention's Thought, all will change in specific embodiment and range of applications, and in sum, this specification content should not be managed Solve as limitation of the present invention.

Claims (11)

1. a kind of information getting method is it is characterised in that include:
When terminal is in running order, obtain first finger print information of user;
Described first finger print information is verified;
If authentication failed, open photographic head, to gather the image information of described user;
Preserve described first finger print information and described image information.
2. information getting method as claimed in claim 1 is it is characterised in that the step of first finger print information of described acquisition user Suddenly, specifically include:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether described operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by described fingerprint key.
3. information getting method as claimed in claim 1 it is characterised in that to described first finger print information authentication failed it Afterwards, before opening photographic head, methods described also includes:
Obtain the cumulative number of current finger print Information Authentication failure;
Judge whether described cumulative number is more than predetermined threshold value;
If being more than, the step that photographic head is opened in execution.
4. information getting method as claimed in claim 1 is it is characterised in that preserving described first finger print information and described After image information, methods described also includes:
Judge whether to get the second finger print information in preset time period;
If so, then described second finger print information is verified;
If being proved to be successful, delete described first finger print information and the described image information of preservation.
5. information getting method as claimed in claim 1 is it is characterised in that described verify to described first finger print information Step, specifically include:
Judge to whether there is the sample fingerprint information mated with described first finger print information in sample set;
If existing, judge described first finger print information is proved to be successful;
If not existing, judge to described first finger print information authentication failed.
6. a kind of information acquisition device is it is characterised in that include:
Fingerprint acquisition module, for when terminal is in running order, obtaining first finger print information of user;
Authentication module, for verifying to described first finger print information;
Opening module, for, when to described first finger print information authentication failed, opening photographic head, to gather the figure of described user As information;
Preserving module, for preserving described first finger print information and described image information.
7. information acquisition device as claimed in claim 1 is it is characterised in that described fingerprint acquisition module, specifically for:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether described operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by described fingerprint key.
8. information acquisition device as claimed in claim 1 is it is characterised in that described device also includes:
Number of times acquisition module, for, after to described first finger print information authentication failed, before opening photographic head, obtaining current The cumulative number of finger print information authentication failed;
First judge module, for judging whether described cumulative number is more than predetermined threshold value;
Described opening module, specifically for when described first judge module is judged to be, opening photographic head.
9. information acquisition device as claimed in claim 1 is it is characterised in that described device also includes:
Second judge module, for, after preserving described first finger print information and described image information, judging when default Between whether get the second finger print information in section;
Described authentication module, specifically for when described second judge module is judged to be, carrying out to described second finger print information Checking;
Removing module, for when being proved to be successful to described second finger print information, delete described first finger print information preserving with And described image information.
10. information acquisition device as claimed in claim 1 is it is characterised in that described authentication module, specifically for:
Judge to whether there is the sample fingerprint information mated with described first finger print information in sample set;
If existing, judge described first finger print information is proved to be successful;
If not existing, judge to described first finger print information authentication failed.
A kind of 11. terminals are it is characterised in that described terminal includes:
Photographic head;
Touch display screen;
One or more processors;
Memorizer;And
One or more programs, wherein said one or more programs are stored in described memorizer, and are configured to by described One or more processors execute, and one or more of programs are included for realizing as described in any one of claim 1-5 The instruction of information getting method.
CN201610806164.2A 2016-09-05 2016-09-05 Information acquisition method and apparatus, and terminal Pending CN106407779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610806164.2A CN106407779A (en) 2016-09-05 2016-09-05 Information acquisition method and apparatus, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610806164.2A CN106407779A (en) 2016-09-05 2016-09-05 Information acquisition method and apparatus, and terminal

Publications (1)

Publication Number Publication Date
CN106407779A true CN106407779A (en) 2017-02-15

Family

ID=57998906

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610806164.2A Pending CN106407779A (en) 2016-09-05 2016-09-05 Information acquisition method and apparatus, and terminal

Country Status (1)

Country Link
CN (1) CN106407779A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107516030A (en) * 2017-07-24 2017-12-26 广东欧珀移动通信有限公司 Data save method and Related product
CN108491713A (en) * 2018-04-03 2018-09-04 维沃移动通信有限公司 A kind of safety prompt function method and electronic equipment
CN109492366A (en) * 2018-10-16 2019-03-19 珠海横琴现联盛科技发展有限公司 Scenic spot coupon verification method based on anti-tamper Encryption Algorithm

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN104036171A (en) * 2014-06-20 2014-09-10 北京金山安全软件有限公司 Method for protecting mobile equipment and mobile equipment
CN105827842A (en) * 2016-03-29 2016-08-03 乐视控股(北京)有限公司 Alarm method and terminal
CN105912913A (en) * 2016-05-25 2016-08-31 深圳天珑无线科技有限公司 Information processing method of terminal with touch-sensitive display, and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488924A (en) * 2013-09-26 2014-01-01 小米科技有限责任公司 Terminal unlocking processing method, device and equipment
CN104036171A (en) * 2014-06-20 2014-09-10 北京金山安全软件有限公司 Method for protecting mobile equipment and mobile equipment
CN105827842A (en) * 2016-03-29 2016-08-03 乐视控股(北京)有限公司 Alarm method and terminal
CN105912913A (en) * 2016-05-25 2016-08-31 深圳天珑无线科技有限公司 Information processing method of terminal with touch-sensitive display, and terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107516030A (en) * 2017-07-24 2017-12-26 广东欧珀移动通信有限公司 Data save method and Related product
CN108491713A (en) * 2018-04-03 2018-09-04 维沃移动通信有限公司 A kind of safety prompt function method and electronic equipment
CN108491713B (en) * 2018-04-03 2019-12-17 维沃移动通信有限公司 Safety reminding method and electronic equipment
CN109492366A (en) * 2018-10-16 2019-03-19 珠海横琴现联盛科技发展有限公司 Scenic spot coupon verification method based on anti-tamper Encryption Algorithm
CN109492366B (en) * 2018-10-16 2020-11-27 珠海横琴现联盛科技发展有限公司 Scenic spot coupon verification method based on tamper-proof encryption algorithm

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
CN103488924B (en) A kind of unlocking processing method of terminal, device and equipment
CN106227437B (en) A kind of unlocked by fingerprint method and terminal
CN103473494A (en) Application running method, device and terminal device
CN105912905A (en) Fingerprint unlocking method and terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
US9940448B2 (en) Unlock processing method and device
CN106326773B (en) A kind of method, apparatus and terminal of photo encryption handling
CN107016337B (en) A kind of fingerprint identification method and mobile terminal
CN105912919B (en) A kind of unlocked by fingerprint method and terminal
CN104571838A (en) Method and device for quickly starting application program
CN106599641A (en) Method and device for limiting terminal locking, and terminal
CN107025395A (en) A kind of fingerprint identification method and mobile terminal
CN106960146A (en) Control method and device for the electronic equipment with full frame fingerprint recognition
CN104158790A (en) User login method, device and equipment
CN107590375A (en) Unlocking method and related product
CN104967593A (en) Identity verification method, apparatus and system
CN106527949A (en) Fingerprint unlocking method and device and terminal
CN106570358A (en) Method and device for setting application permissions
CN106331370A (en) Data transmission method and terminal device
CN103366104A (en) Method and device for controlling accessing of application
CN106453589A (en) Method and apparatus for synchronizing backup data
CN104217172A (en) Privacy content checking method and device
CN106570383A (en) Unlocking method and apparatus for mobile terminal, and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170215