CN106407779A - Information acquisition method and apparatus, and terminal - Google Patents
Information acquisition method and apparatus, and terminal Download PDFInfo
- Publication number
- CN106407779A CN106407779A CN201610806164.2A CN201610806164A CN106407779A CN 106407779 A CN106407779 A CN 106407779A CN 201610806164 A CN201610806164 A CN 201610806164A CN 106407779 A CN106407779 A CN 106407779A
- Authority
- CN
- China
- Prior art keywords
- finger print
- information
- print information
- user
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses an information acquisition method and apparatus, and a terminal. The information acquisition method comprises the following steps: when the terminal is in a working state, acquiring first fingerprint information of a user, then verifying the first fingerprint information, starting a camera in the case of verification failure to collect image information of the user, and finally storing the first fingerprint information and the image information. By adoption of the scheme, the fingerprint information and the image information of a current operator in the case of fingerprint verification failure can be collected and stored, and thus compared with the prior art, the security of information in the terminal is improved.
Description
Technical field
The present invention relates to field of terminal technology, more particularly, to a kind of information getting method, device and terminal.
Background technology
Development with the Internet and the development of mobile communications network, the also disposal ability along with terminal and storage simultaneously
The fast development of ability, the application program of magnanimity has obtained rapid propagation and use;Conventional application program is facilitating user's work
While making and live, it is no lack of the application program newly developed daily life also into user, improves the life matter of user
Amusement sense in amount, the frequency of using terminal and use.
At present, terminal on the market progressively has fingerprint identification function, carries out equipment unblock using fingerprint recognition, can be very
The safety of good raising mobile phone.But still there is certain security risk in overall security.Such as, open during unlocked by fingerprint also
Remain original gesture password unblock, numerical ciphers unblock etc., once so gesture password, numerical ciphers etc. are by unauthorized use
Family is known, unauthorized user can bypass unlocked by fingerprint easily, opens user terminal in the case that user has no to discover, and invades
Privacy of user.
Understand, the poor technical problem of existence information safety in terminal.
Content of the invention
The embodiment of the present invention provides a kind of information getting method, device and terminal, can solve existence information peace in terminal
The complete poor technical problem of property.
The embodiment of the present invention provides a kind of information getting method, including:
When terminal is in running order, obtain first finger print information of user;
Described first finger print information is verified;
If authentication failed, open photographic head, to gather the image information of described user;
Preserve described first finger print information and described image information.
Correspondingly, embodiments provide a kind of information acquisition device, including:
Fingerprint acquisition module, for when terminal is in running order, obtaining first finger print information of user;
Authentication module, for verifying to described first finger print information;
Opening module, for, when to described first finger print information authentication failed, opening photographic head, to gather described user
Image information;
Preserving module, for preserving described first finger print information and described image information.
Correspondingly, the embodiment of the present invention also provides a kind of terminal, and described terminal includes photographic head;
Touch display screen;
One or more processors;
Memorizer;And
One or more programs, wherein said one or more programs are stored in described memorizer, and be configured to by
One or more of computing devices, one or more of programs include the finger for realizing above- mentioned information acquisition methods
Order.
The embodiment of the present invention using when terminal is in running order, obtains first finger print information of user, then, to the
One finger print information is verified, if authentication failed, opens photographic head, to gather the image information of user, finally, preserves first
Finger print information and image information;The program can gather and preserve in fingerprint authentication failure the finger print information of current operator
And image information, in terms of existing technologies, improve the safety of information in terminal.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, will make to required in embodiment description below
Accompanying drawing be briefly described it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those skilled in the art, on the premise of not paying creative work, can also be obtained other attached according to these accompanying drawings
Figure.
Fig. 1 is the schematic flow sheet of the information getting method that the embodiment of the present invention one provides;
Fig. 2 is the schematic flow sheet of the information getting method that the embodiment of the present invention two provides;
Fig. 3 is the structural representation of the first information acquisition device that the embodiment of the present invention three provides;
Fig. 4 is the structural representation of the second information acquisition device that the embodiment of the present invention three provides;
Fig. 5 is the structural representation of the third information acquisition device that the embodiment of the present invention three provides;
Fig. 6 is the structural representation of the terminal that the embodiment of the present invention four provides.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation description is it is clear that described embodiment is only a part of embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, the every other enforcement that those skilled in the art are obtained under the premise of not making creative work
Example, broadly falls into the scope of protection of the invention.
The embodiment of the present invention provides a kind of information getting method, device and terminal.It is described in detail respectively below.
Embodiment one,
The present embodiment will be described from the angle of information acquisition device, and this information acquisition device specifically can be integrated in end
In end, this terminal can be the equipment such as smart mobile phone, panel computer.
A kind of information getting method, including:When terminal is in running order, obtain first finger print information of user;Right
First finger print information is verified;If authentication failed, open photographic head, to gather the image information of user;Preserve the first finger
Stricture of vagina information and image information.
As shown in figure 1, information getting method, idiographic flow can be as follows:
101st, when terminal is in running order, obtain first finger print information of user.
Specifically, working condition refers to non-screen lock state, now, terminal removing screen locking and enter operation interface.Can
To arrange fingerprint recognition module in this terminal, when fingerprint input operation has been detected, this fingerprint recognition of acquisition can be triggered
The finger print information that module recognizes.
In the present embodiment, in order to monitor unauthorized user privately using the equipment of owner, can not discover in operator
In the case of obtain the relevant informations such as its fingerprint.And the mode obtaining the first finger print information can have multiple, such as, operator makes
Returned main screen, returned page up, check that backstage etc. operates with the execution of home key can be used during terminal unavoidably, in view of
This, can gather user fingerprints, to be avoided operator to discover while operator triggers these operational orders;That is, step
" obtaining first finger print information of user " idiographic flow can be as follows:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by this fingerprint key.
Specifically, fingerprint key refers to secondary or physical bond or the virtual key with fingerprint recognition module (as fingerprint sensor), such as,
This fingerprint key can be the main screen key (i.e. home key) with fingerprint recognition module, and it can be virtual in embedded display screen
Key or the physical button outside display screen.And pre-conditioned can according to characteristics such as the structure of terminal, functions, by
Those skilled in the art or equipment manufacturer are set.Such as, this pre-conditioned can be set to:Instruction interface redirects or cuts
Change;That is, the step of step " judging whether operational order meets pre-conditioned ", it is specifically as follows:
Judge that whether this operational order is the operational order of preset kind;
If so, then judge that this operational order meets pre-conditioned;
If it is not, it is pre-conditioned then to judge that this operational order is unsatisfactory for.
In specific implementation process, the operational order of this preset kind can be set to the side by pressing or touch-control fingerprint key
The changing interface instruction of formula triggering, such as returns main interface, returns page up etc..Regardless of result of determination, terminal can
The operational order that normal execution user is triggered by fingerprint key, is not affected by result of determination.
102nd, the first finger print information is verified.
Specifically, can determine whether operator is unauthorized user by fingerprint authentication.Wherein, verify finger print information
Mode can have multiple, such as, the finger print information that operator inputs can be compared with finger print information storehouse set in advance;?
That is, step " the first finger print information is verified " specifically can include:
Judge to whether there is the sample fingerprint information mated with the first finger print information in sample set;
If existing, judge the first finger print information is proved to be successful;
If not existing, judge to the first finger print information authentication failed.
Wherein, include at least one sample fingerprint information in sample set.If it is determined that being proved to be successful, then can determine behaviour
Author is authorized user, if authentication failed, can determine that operator is unauthorized user to a certain extent.
In specific implementation process, in order to ensure Consumer's Experience, and also to avoiding operator to discover the monitoring of terminal
Operation, regardless of the result, terminal can normally execute the operational order that above-mentioned user is triggered by fingerprint key, and
Do not affected by the result.
If 103 authentication faileds, open photographic head, to gather the image information of user.
Specifically, if authentication failed, may be considered unauthorized user privately using the equipment of owner, now can open
Open the image information of photographic head acquisition operations person, to record current operator's information.Wherein, photographic head can be preferably preposition taking the photograph
As head, it is, of course, also possible to open post-positioned pick-up head.The image information collecting is specifically as follows human body information, such as face information,
Limbs information, clothing information etc..
It is in specific implementation process, not sensitive etc. because of extraneous factor interference (as water droplet), fingerprint recognition module,
Lead to fingerprint recognition module obtain operator finger print information imperfect, and cause fingerprint authentication failure so that terminal judges.For
Avoid the situation of this erroneous judgement, can repeatedly finger print information be verified, if multiple authentication failure, may be considered
Unauthorized user is privately using the equipment of owner.That is, after to the first finger print information authentication failed, open photographic head it
Before, the method can also include:
Obtain the cumulative number of current finger print Information Authentication failure;
Judge whether cumulative number is more than predetermined threshold value;
If being more than, the step that photographic head is opened in execution.
Wherein, predetermined threshold value can hardware configuration based on equipment, equipment performance etc., by those skilled in the art or set
Standby manufacturer is configured, it is of course also possible to according to the installation situation of software in terminal, voluntarily be arranged by user.Such as, this is pre-
If threshold value could be arranged to 2 times, 3 inferior.
104th, the first finger print information and image information are preserved.
Specifically, after to the first finger print information authentication failed, by the get first finger print information and operator
Image information is saved in the memory block of terminal, so that authorized user checks in the later stage.When next authorized user's using terminal, can
, in specified folder, to read safety message, check whether unauthorized user invasion mobile phone, if having extremely photograph can be consulted
Piece and fingerprint, to determine unauthorized user information.
In the present embodiment, preserve the operation of the first finger print information and the operation opening photographic head has no time order and function sequentially
Requirement.That is, step 103 can be after preserving the first finger print information, before preserving image information, execution is it is also possible to right
After first finger print information is verified, execute before preserving the first finger print information.
In the specific implementation, the operation note of current operator can also after to the first finger print information authentication failed, be recorded
Which file record, such as checked, sent, copied which file etc., be saved in the lump in safety message.
In actual applications, in order to avoid disturbing because of extraneous factor, fingerprint recognition module is not sensitive etc. causes terminal by mistake
Judge, lead to obtain by mistake, preserve finger print information and image information by mistake, occupy unnecessary memory space, can be by preservation by mistake
Information deletion;That is, after preserving the first finger print information and image information, the method can also include:
Judge whether to get the second finger print information in preset time period;
If so, then the second finger print information is verified;
If being proved to be successful, delete the first finger print information and the image information of preservation.
Wherein, preset time period can be set by those skilled in the art or manufacturer, such as, this Preset Time
Section can be set as 10s, 1min etc..
Specifically it is contemplated that terminal models are commonly fingerprint recognition is multiplexed type with home key, operator is in using terminal
During can constantly use the function of home key.Therefore, if preset time period arrange reasonable, then it is considered that
The finger print information getting in preset time period, namely the fingerprint letter that same operator is inputted by fingerprint key (i.e. home key)
Breath, and again finger print information is verified.If being proved to be successful then it is assumed that authentication failed before is terminal erroneous judgement.Now,
The first finger print information and the image information of preservation can be deleted, to expand memory space.
From the foregoing, it will be observed that embodiments providing a kind of information getting method, adopt when terminal is in running order,
Obtain first finger print information of user, then, the first finger print information is verified, if authentication failed, open photographic head, with
The image information of collection user, finally, preserves the first finger print information and image information;The program can be in fingerprint authentication failure
When gather and preserve finger print information and the image information of current operator, in terms of existing technologies, improve letter in terminal
The safety of breath.
Embodiment two,
Citing is described in further detail by method according to described by embodiment one below.
In the present embodiment, will with this information acquisition device specifically integrated in the terminal, by fingerprint key and main screen key
(home key) is multiplexed, and taking be integrated in mobile terminal in the form of secondary or physical bond is as a example described in detail.
As shown in Fig. 2 a kind of information getting method, idiographic flow can be as follows:
201st, the authentication information of acquisition for mobile terminal user input, wherein, this authentication information is used for removing screen locking.
In the present embodiment, mobile terminal needs to open screen lock, successfully unlocks and just can enter operation interface.This authentication information
Can be specifically gesture information (as pattern password), biological information (as finger-print cipher), Word message (as numerical ciphers)
Deng for removing screen locking.
202nd, mobile terminal judges whether authentication information is identical with default authentication information;If so, execution step 203, if it is not,
Execution step 205.
Specifically, mobile terminal is after getting the authentication information of user input, can call the pre- of storage in data base
If authentication information, based on this default authentication information, the authentication information obtaining is verified, judge whether to be proved to be successful.
203rd, mobile terminal removing screen locking, and the finger print information of user is obtained by pressing home key.
Specifically, when judging that authentication information is identical with default authentication information, namely the authentication information obtaining is verified into
Work(, at this point it is possible to call relative program removing screen locking, so that mobile terminal enters working condition.Wherein, home key is tool
There is the physical button of fingerprint recognition module (as fingerprint sensor).When fingerprint input operation has been detected, acquisition can be triggered
The finger print information that this fingerprint recognition module recognizes.
In the present embodiment, in order to monitor unauthorized user privately using the equipment of owner, can not discover in operator
In the case of obtain the information such as its fingerprint.And the mode obtaining finger print information can have multiple, such as, operator using mobile eventually
The execution of home key can be used during end unavoidably return main screen, return page up, check that backstage etc. operates, in view of this,
User fingerprints can be gathered while operator triggers these operational orders, to avoid operator to discover;That is, step is " logical
Cross the finger print information that pressing home key obtains user " idiographic flow can be as follows:
Obtain the operational order that user is triggered by home key;
Judge whether operational order meets pre-conditioned;
If meeting, obtain the finger print information of user by this fingerprint key.
Such as, this pre-conditioned can be set to:Instruction interface redirects or switches;That is, whether step " judges operational order
Meet pre-conditioned " step, be specifically as follows:
Judge that whether this operational order is the operational order of preset kind;
If so, then judge that this operational order meets pre-conditioned;
If it is not, it is pre-conditioned then to judge that this operational order is unsatisfactory for.
In specific implementation process, the operational order of this preset kind can be set to changing interface instruction, such as returns to main boundary
Face, return page up etc..Regardless of result of determination, mobile terminal can normally be executed user and be triggered by fingerprint key
Operational order, do not affected by result of determination.
204th, mobile terminal judges whether finger print information is proved to be successful;If so, execution step 203;If it is not, execution step
205.
Specifically, can determine whether operator is unauthorized user by fingerprint authentication.Wherein, verify finger print information
Mode can have multiple, such as, the finger print information that operator inputs can be compared with finger print information storehouse set in advance;?
That is, step " judging whether finger print information is proved to be successful " specifically can include:
Judge to whether there is the sample fingerprint information mated with finger print information in sample set;
If existing, judge finger print information is proved to be successful;
If not existing, judge to finger print information authentication failed.
Wherein, include at least one sample fingerprint information in sample set.If it is determined that being proved to be successful, then can determine behaviour
Author is authorized user, now can continue executing with detection in step 203, the operation of acquisition finger print information;If authentication failed,
Then can determine that operator is unauthorized user to a certain extent.
In specific implementation process, in order to ensure Consumer's Experience, and also to avoiding operator to discover mobile terminal
Policer operation, regardless of the result, mobile terminal can normally execute above by the instruction of home key trigger action, and
Do not affected by the result.
205th, mobile terminal opens photographic head, to gather the image information of user.
Specifically, if authentication failed, may be considered unauthorized user privately using the equipment of owner, now can open
Open the image information of photographic head acquisition operations person, such as face information, limbs information, clothing information etc., to record current operator
Information.
It is in specific implementation process, not sensitive etc. because of extraneous factor interference (as water droplet), fingerprint recognition module,
Lead to the finger print information of fingerprint recognition module acquisition operator imperfect, and cause fingerprint authentication failure so that mobile terminal is sentenced
Disconnected.In order to avoid the situation of this erroneous judgement, can repeatedly finger print information be verified, if multiple authentication failure, permissible
It is considered unauthorized user privately using the equipment of owner.That is, after to finger print information authentication failed, open photographic head it
Before, the method can also include:
Obtain the cumulative number of current finger print Information Authentication failure;
Judge whether cumulative number is more than predetermined threshold value;
If being more than, the step that photographic head is opened in execution.
Wherein, predetermined threshold value can hardware configuration based on equipment, equipment performance etc., by those skilled in the art or set
Standby manufacturer is configured, it is of course also possible to according to the installation situation of software in mobile terminal, voluntarily be arranged by user.Such as,
This predetermined threshold value could be arranged to 2 times, 3 inferior.
206th, mobile terminal preserves finger print information and image information.
Specifically, after getting finger print information and image information, save it in the memory block of mobile terminal, with
Check in later stage for authorized user.When next authorized user uses mobile terminal, safety can be read and reports in specified folder
Accuse, checked whether unauthorized user invasion mobile phone, if having extremely photo and fingerprint can be consulted, to determine unauthorized user letter
Breath.
In the specific implementation, the operation note of current operator can also after to the first finger print information authentication failed, be recorded
Which file record, such as checked, sent, copied which file etc., be saved in the lump in safety message.
In actual applications, in order to avoid disturbing because of extraneous factor, fingerprint recognition module is not sensitive etc. cause mobile eventually
End erroneous judgement, leads to obtain by mistake, preserves finger print information and image information by mistake, occupy unnecessary memory space, can be protected by mistake
The information deletion deposited;That is, after preserving finger print information and image information, the method can also include:
Judge whether be proved to be successful to by the finger print information that home key obtains in preset time period;
If being proved to be successful, delete finger print information and the image information of preservation.
Wherein, preset time period can be set by those skilled in the art or manufacturer, such as, this Preset Time
Section can be set as 10s, 1min etc..
Specifically it is contemplated that mobile terminal fingerprint recognition is multiplexed type with home key, operator is using mobile terminal
During can constantly use the function of home key.Therefore, if preset time period arrange reasonable, then it is considered that pre-
If the finger print information getting in the time period, namely the finger print information that same operator is inputted by fingerprint key (i.e. home key),
And again finger print information is verified.If being proved to be successful then it is assumed that authentication failed before is mobile terminal erroneous judgement.This
When, finger print information and the image information of the last preservation can be deleted, to expand memory space.
From the foregoing, it will be observed that embodiments providing a kind of information getting method, using mobile terminal to user input
Authentication information is verified, if authentication failed, opens photographic head acquisition operations person's image information;If being proved to be successful, release
Screen locking, when the finger print information of user is detected by home key, is verified to finger print information, if authentication failed,
Open photographic head acquisition operations person's image information, and preserve finger print information and the image information collecting;The program can be
Gather and preserve finger print information and the image information of current operator during fingerprint authentication failure, in terms of existing technologies, carry
The safety of information in high terminal.
Embodiment three,
In order to preferably implement above method, the embodiment of the present invention also provides a kind of information acquisition device, this acquisition of information
Device can integrated in the terminal, this terminal specifically can include the equipment such as mobile phone, panel computer, notebook computer.As Fig. 3 institute
Show, this information acquisition device can include fingerprint acquisition module 301, authentication module 302, opening module 303 and preserving module
304, as follows:
Fingerprint acquisition module 301, for when terminal is in running order, obtaining first finger print information of user;
Authentication module 302, for verifying to the first finger print information;
Opening module 303, for, when to the first finger print information authentication failed, opening photographic head, to gather the figure of user
As information;
Preserving module 304, for preserving the first finger print information and image information.
In some embodiments, this fingerprint acquisition module 301, specifically can be used for:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether this operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by this fingerprint key
In some embodiments, as shown in figure 4, this device can also include:Number of times acquisition module 305 and the first judgement
Module 306;
Number of times acquisition module 305, for, after to the first finger print information authentication failed, before opening photographic head, obtaining
The cumulative number of current finger print Information Authentication failure;
First judge module 306, for judging whether cumulative number is more than predetermined threshold value;
Opening module 303, specifically for when the first judge module 306 is judged to be, opening photographic head.
In some embodiments, as shown in figure 5, this device can also include:Second judge module 307 and removing module
308;
Second judge module 307, for, after preserving the first finger print information and described image information, judging default
The second finger print information whether is got in time period;
This authentication module 302, specifically for when the second judge module 307 is judged to be, carrying out to the second finger print information
Checking;
Removing module 308, for when being proved to be successful to the second finger print information, delete the first finger print information preserving and
Image information.
In some embodiments, authentication module 302, specifically can be used for:
Judge to whether there is the sample fingerprint information mated with the first finger print information in sample set;
If existing, judge the first finger print information is proved to be successful;
If not existing, judge to the first finger print information authentication failed.
From the foregoing, it will be observed that embodiments providing a kind of information acquisition device, using fingerprint acquisition module 301 in terminal
When in running order, obtain first finger print information of user, by authentication module 302, first finger print information is verified, if
Authentication failed, then open photographic head by opening module 303, to gather the image information of user, preserves first by preserving module 304
Finger print information and image information;The program can gather and preserve in fingerprint authentication failure the finger print information of current operator
And image information, in terms of existing technologies, improve the safety of information in terminal.
Example IV,
The present embodiment provides a kind of terminal, and this terminal can include photographic head;
Touch display screen;
One or more processors;
Memorizer;And
One or more programs, wherein one or more programs are stored in described memorizer, and are configured to by one
Or multiple computing device, one or more programs include for realizing the instruction as any one information getting method above-mentioned.
Such as, refer to Fig. 6, this terminal 400 can include radio frequency (RF, Radio Frequency) circuit 401, include
There are the memorizer 402 of one or more computer-readable recording mediums, input block 403, display unit 404, sensor
405th, voicefrequency circuit 406, Wireless Fidelity (WiFi, Wireless Fidelity) module 407, include one or one with
The parts such as the processor 408 of upper processing core, power supply 409 and photographic head 410.It will be understood by those skilled in the art that Fig. 6
Shown in terminal structure not structure paired terminal restriction, ratio can be included and illustrate more or less of part, or combination
Some parts, or different part arrangements.
Radio circuit 401 can be used for receiving and sending messages, or the reception of signal and transmission in communication process, especially, by base station
Downlink information receive after, transfer to one or more than one processor 408 processed;In addition, up data is activation will be related to
To base station.Generally, radio circuit 401 includes but is not limited to antenna, at least one amplifier, tuner, one or more vibration
Device, subscriber identity module (SIM, SubscriberIdentity Module) card, transceiver, bonder, low-noise amplifier
(LNA, LowNoiseAmplifier), duplexer etc..Additionally, radio circuit 401 can also by radio communication and network and its
His equipment communication.This radio communication can use arbitrary communication standard or agreement, including but not limited to global system for mobile communications
(GSM, Global System ofMobile communication), general packet radio service (GPRS, General
Packet Radio Service), CDMA (CDMA, Code Division Multiple Access), wideband code division many
Location (WCDMA, Wideband Code Division MultipleAccess), Long Term Evolution (LTE, Long Term
Evolution), Email, Short Message Service (SMS, Short Messaging Service) etc..
Memorizer 402 can be used for storing software program and module.Processor 408 is stored in memorizer 402 by operation
Software program and module, thus executing various function application and data processing.Memorizer 402 can mainly include storing journey
Sequence area and storage data field, wherein, storing program area can (compare the application program needed for storage program area, at least one function
As sound-playing function, image player function etc.) etc.;Storage data field can store according to terminal using the data being created
(such as voice data, phone directory etc.) etc..Additionally, memorizer 402 can include high-speed random access memory, can also include
Nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-state parts.Phase
Ying Di, memorizer 402 can also include Memory Controller, to provide processor 408 and input block 403 to memorizer 402
Access.
Input block 403 can be used for numeral or the character information of receives input, and produces and user setup and function
Control relevant keyboard, mouse, action bars, optics or trace ball signal input.Specifically, in a specific embodiment
In, input block 403 may include Touch sensitive surface and other input equipments.Touch sensitive surface, also referred to as touch display screen or touch
Control plate, can collect user thereon or neighbouring touch operation (such as user use any suitable object such as finger, stylus or
Operation on Touch sensitive surface or near Touch sensitive surface for the adnexa), and corresponding connection dress is driven according to formula set in advance
Put.Optionally, Touch sensitive surface may include touch detecting apparatus and two parts of touch controller.Wherein, touch detecting apparatus inspection
Survey the touch orientation of user, and detect the signal that touch operation brings, transmit a signal to touch controller;Touch controller from
Receive touch information on touch detecting apparatus, and be converted into contact coordinate, then give processor 408, and can reception processing
Order that device 408 is sent simultaneously is executed.Furthermore, it is possible to it is multiple using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes Touch sensitive surface.Except Touch sensitive surface, input block 403 can also include other input equipments.Specifically, other are defeated
Enter equipment and can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, Mus
One or more of mark, action bars, fingerprint recognition module etc..
Display unit 404 can be used for display and by the information of user input or is supplied to the information of user and the various of terminal
Graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its combination in any.Display
Unit 404 may include display floater, optionally, can using liquid crystal display (LCD, Liquid Crystal Display),
The forms such as Organic Light Emitting Diode (OLED, Organic Light-Emitting Diode) are configuring display floater.Further
, Touch sensitive surface can cover display floater, when Touch sensitive surface detects thereon or after neighbouring touch operation, sends process to
Device 408, to determine the type of touch event, provides accordingly according to the type of touch event on a display panel with preprocessor 408
Visual output.Although in figure 6, Touch sensitive surface and display floater are to realize inputting as two independent parts and to input
Function, but in some embodiments it is possible to will be integrated to Touch sensitive surface and display floater and realize input and output function.
Terminal may also include at least one sensor 405, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light
The brightness to adjust display floater for the light and shade, proximity transducer can cut out display floater and/or the back of the body when terminal moves in one's ear
Light.As one kind of motion sensor, Gravity accelerometer can detect (generally three axles) acceleration in all directions
Size, can detect that size and the direction of gravity when static, can be used for identify mobile phone attitude application (such as horizontal/vertical screen switching,
Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Can also configure as terminal
Gyroscope, barometer, drimeter, thermometer, the other sensors such as infrared ray sensor, will not be described here.
Voicefrequency circuit 406 can provide the audio interface between user and terminal by speaker, microphone.Voicefrequency circuit
The voice data receiving can be converted into the signal of telecommunication by 406, be transferred to speaker, be converted to acoustical signal output by speaker;
On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone, is converted to audio frequency number by voicefrequency circuit 406 after being received
According to then after processing voice data output processor 408, through radio circuit 401 being sent to such as another terminal, or by sound
Frequency data output is to memorizer 402 to process further.Voicefrequency circuit 406 is also possible that earphone jack, to provide peripheral hardware
Earphone and the communication of terminal.
Wireless Fidelity (WiFi) belongs to short range wireless transmission technology, and terminal can be helped by wireless fidelity module 407
User sends and receive e-mail, browses webpage and access streaming video etc., and it has provided the user wireless broadband internet and has accessed.
Although Fig. 6 shows wireless fidelity module 407, but it is understood that, it is simultaneously not belonging to must be configured into of terminal, completely may be used
To omit in the scope of essence not changing invention as needed.
Processor 408 is the control centre of terminal, using the various pieces of various interfaces and the whole terminal of connection, leads to
Cross and run or software program and/or module that execution is stored in memorizer 402, and call and be stored in memorizer 402
Data, the various functions of execution terminal and processing data, thus carry out integral monitoring to terminal.Optionally, processor 408 can wrap
Include one or more processing cores;Preferably, processor 408 can integrated application processor and modem processor, wherein, should
Mainly process operating system, user interface and application program etc. with processor, modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor can not also be integrated in processor 408.
Terminal also includes the power supply 409 (such as battery) powered to all parts.Preferably, power supply can pass through power supply pipe
Reason system is logically contiguous with processor 408, thus realizing management charging, electric discharge and power managed by power-supply management system
Etc. function.Power supply 409 can also include one or more direct current or alternating current power supply, recharging system, power failure inspection
The random component such as slowdown monitoring circuit, power supply changeover device or inverter, power supply status indicator.
The photographic head 410 that terminal also includes possessing shoot function (such as can include front-facing camera, post-positioned pick-up head
Deng).Preferably, photographic head can be logically contiguous with processor 408 by processing system for video, webcam driver etc., thus logical
Cross processing system for video, webcam driver is realized the function such as taking pictures, imaging.
Although not shown, terminal can also bag bluetooth module etc., will not be described here.
Specifically in the present embodiment, the processor 408 in terminal can be according to following instruction, will be one or more
The corresponding executable file of process of application program is loaded in memorizer 402, and to be run by processor 408 and be stored in storage
Application program in device 402, thus realize various functions:
When terminal is in running order, obtain first finger print information of user, then, the first finger print information is tested
Card, if authentication failed, opens photographic head, to gather the image information of user, finally, preserves the first finger print information and image
Information.
From the foregoing, it will be observed that embodiments providing a kind of terminal, this terminal, using at which when working condition, obtains
First finger print information of user, then, verifies to the first finger print information, if authentication failed, opens photographic head, to gather
The image information of described user, finally, preserves the first finger print information and image information;The program can be in fingerprint authentication failure
When gather and preserve finger print information and the image information of current operator, in terms of existing technologies, improve letter in terminal
The safety of breath.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
Completed with the hardware instructing correlation by program, this program can be stored in a computer-readable recording medium, storage
Medium can include:Read only memory (ROM, Read Only Memory), random access memory (RAM, Random
Access Memory), disk or CD etc..
A kind of information getting method, device and the terminal that above the embodiment of the present invention are provided are described in detail,
Program used herein specific case is set forth to the principle of the present invention and embodiment, and the explanation of above example is only
It is to be used to help understand the method for the present invention and its core concept;Simultaneously for those skilled in the art, according to the present invention's
Thought, all will change in specific embodiment and range of applications, and in sum, this specification content should not be managed
Solve as limitation of the present invention.
Claims (11)
1. a kind of information getting method is it is characterised in that include:
When terminal is in running order, obtain first finger print information of user;
Described first finger print information is verified;
If authentication failed, open photographic head, to gather the image information of described user;
Preserve described first finger print information and described image information.
2. information getting method as claimed in claim 1 is it is characterised in that the step of first finger print information of described acquisition user
Suddenly, specifically include:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether described operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by described fingerprint key.
3. information getting method as claimed in claim 1 it is characterised in that to described first finger print information authentication failed it
Afterwards, before opening photographic head, methods described also includes:
Obtain the cumulative number of current finger print Information Authentication failure;
Judge whether described cumulative number is more than predetermined threshold value;
If being more than, the step that photographic head is opened in execution.
4. information getting method as claimed in claim 1 is it is characterised in that preserving described first finger print information and described
After image information, methods described also includes:
Judge whether to get the second finger print information in preset time period;
If so, then described second finger print information is verified;
If being proved to be successful, delete described first finger print information and the described image information of preservation.
5. information getting method as claimed in claim 1 is it is characterised in that described verify to described first finger print information
Step, specifically include:
Judge to whether there is the sample fingerprint information mated with described first finger print information in sample set;
If existing, judge described first finger print information is proved to be successful;
If not existing, judge to described first finger print information authentication failed.
6. a kind of information acquisition device is it is characterised in that include:
Fingerprint acquisition module, for when terminal is in running order, obtaining first finger print information of user;
Authentication module, for verifying to described first finger print information;
Opening module, for, when to described first finger print information authentication failed, opening photographic head, to gather the figure of described user
As information;
Preserving module, for preserving described first finger print information and described image information.
7. information acquisition device as claimed in claim 1 is it is characterised in that described fingerprint acquisition module, specifically for:
Obtain the operational order that user is triggered by fingerprint key;
Judge whether described operational order meets pre-conditioned;
If meeting, obtain first finger print information of user by described fingerprint key.
8. information acquisition device as claimed in claim 1 is it is characterised in that described device also includes:
Number of times acquisition module, for, after to described first finger print information authentication failed, before opening photographic head, obtaining current
The cumulative number of finger print information authentication failed;
First judge module, for judging whether described cumulative number is more than predetermined threshold value;
Described opening module, specifically for when described first judge module is judged to be, opening photographic head.
9. information acquisition device as claimed in claim 1 is it is characterised in that described device also includes:
Second judge module, for, after preserving described first finger print information and described image information, judging when default
Between whether get the second finger print information in section;
Described authentication module, specifically for when described second judge module is judged to be, carrying out to described second finger print information
Checking;
Removing module, for when being proved to be successful to described second finger print information, delete described first finger print information preserving with
And described image information.
10. information acquisition device as claimed in claim 1 is it is characterised in that described authentication module, specifically for:
Judge to whether there is the sample fingerprint information mated with described first finger print information in sample set;
If existing, judge described first finger print information is proved to be successful;
If not existing, judge to described first finger print information authentication failed.
A kind of 11. terminals are it is characterised in that described terminal includes:
Photographic head;
Touch display screen;
One or more processors;
Memorizer;And
One or more programs, wherein said one or more programs are stored in described memorizer, and are configured to by described
One or more processors execute, and one or more of programs are included for realizing as described in any one of claim 1-5
The instruction of information getting method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610806164.2A CN106407779A (en) | 2016-09-05 | 2016-09-05 | Information acquisition method and apparatus, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610806164.2A CN106407779A (en) | 2016-09-05 | 2016-09-05 | Information acquisition method and apparatus, and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106407779A true CN106407779A (en) | 2017-02-15 |
Family
ID=57998906
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610806164.2A Pending CN106407779A (en) | 2016-09-05 | 2016-09-05 | Information acquisition method and apparatus, and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106407779A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107516030A (en) * | 2017-07-24 | 2017-12-26 | 广东欧珀移动通信有限公司 | Data save method and Related product |
CN108491713A (en) * | 2018-04-03 | 2018-09-04 | 维沃移动通信有限公司 | A kind of safety prompt function method and electronic equipment |
CN109492366A (en) * | 2018-10-16 | 2019-03-19 | 珠海横琴现联盛科技发展有限公司 | Scenic spot coupon verification method based on anti-tamper Encryption Algorithm |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
CN104036171A (en) * | 2014-06-20 | 2014-09-10 | 北京金山安全软件有限公司 | Method for protecting mobile equipment and mobile equipment |
CN105827842A (en) * | 2016-03-29 | 2016-08-03 | 乐视控股(北京)有限公司 | Alarm method and terminal |
CN105912913A (en) * | 2016-05-25 | 2016-08-31 | 深圳天珑无线科技有限公司 | Information processing method of terminal with touch-sensitive display, and terminal |
-
2016
- 2016-09-05 CN CN201610806164.2A patent/CN106407779A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488924A (en) * | 2013-09-26 | 2014-01-01 | 小米科技有限责任公司 | Terminal unlocking processing method, device and equipment |
CN104036171A (en) * | 2014-06-20 | 2014-09-10 | 北京金山安全软件有限公司 | Method for protecting mobile equipment and mobile equipment |
CN105827842A (en) * | 2016-03-29 | 2016-08-03 | 乐视控股(北京)有限公司 | Alarm method and terminal |
CN105912913A (en) * | 2016-05-25 | 2016-08-31 | 深圳天珑无线科技有限公司 | Information processing method of terminal with touch-sensitive display, and terminal |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107516030A (en) * | 2017-07-24 | 2017-12-26 | 广东欧珀移动通信有限公司 | Data save method and Related product |
CN108491713A (en) * | 2018-04-03 | 2018-09-04 | 维沃移动通信有限公司 | A kind of safety prompt function method and electronic equipment |
CN108491713B (en) * | 2018-04-03 | 2019-12-17 | 维沃移动通信有限公司 | Safety reminding method and electronic equipment |
CN109492366A (en) * | 2018-10-16 | 2019-03-19 | 珠海横琴现联盛科技发展有限公司 | Scenic spot coupon verification method based on anti-tamper Encryption Algorithm |
CN109492366B (en) * | 2018-10-16 | 2020-11-27 | 珠海横琴现联盛科技发展有限公司 | Scenic spot coupon verification method based on tamper-proof encryption algorithm |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN103488924B (en) | A kind of unlocking processing method of terminal, device and equipment | |
CN106227437B (en) | A kind of unlocked by fingerprint method and terminal | |
CN103473494A (en) | Application running method, device and terminal device | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
US9940448B2 (en) | Unlock processing method and device | |
CN106326773B (en) | A kind of method, apparatus and terminal of photo encryption handling | |
CN107016337B (en) | A kind of fingerprint identification method and mobile terminal | |
CN105912919B (en) | A kind of unlocked by fingerprint method and terminal | |
CN104571838A (en) | Method and device for quickly starting application program | |
CN106599641A (en) | Method and device for limiting terminal locking, and terminal | |
CN107025395A (en) | A kind of fingerprint identification method and mobile terminal | |
CN106960146A (en) | Control method and device for the electronic equipment with full frame fingerprint recognition | |
CN104158790A (en) | User login method, device and equipment | |
CN107590375A (en) | Unlocking method and related product | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN106527949A (en) | Fingerprint unlocking method and device and terminal | |
CN106570358A (en) | Method and device for setting application permissions | |
CN106331370A (en) | Data transmission method and terminal device | |
CN103366104A (en) | Method and device for controlling accessing of application | |
CN106453589A (en) | Method and apparatus for synchronizing backup data | |
CN104217172A (en) | Privacy content checking method and device | |
CN106570383A (en) | Unlocking method and apparatus for mobile terminal, and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170215 |