CN106778166B - Data editing method and device and terminal - Google Patents
Data editing method and device and terminal Download PDFInfo
- Publication number
- CN106778166B CN106778166B CN201611089010.2A CN201611089010A CN106778166B CN 106778166 B CN106778166 B CN 106778166B CN 201611089010 A CN201611089010 A CN 201611089010A CN 106778166 B CN106778166 B CN 106778166B
- Authority
- CN
- China
- Prior art keywords
- data
- knocking
- editing
- instruction
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Document Processing Apparatus (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a data editing method, which comprises the following steps: receiving a data editing instruction; when the data indicated by the data editing instruction is determined to be preset encrypted data, acquiring a user tapping operation instruction; and when the user knocking operation instruction is judged to meet the preset condition, carrying out editing operation on the data indicated by the data editing instruction. According to the method and the device, the knocking operation instruction of the user is obtained when the data indicated by the data editing instruction is judged to be the preset encrypted data, and when the knocking operation instruction meets the preset condition, the preset encrypted data is allowed to be edited, so that the problem that the user data is easily subjected to misoperation and stealing is solved, and the safety of the user data is greatly improved. The invention also relates to a data transmission device and a terminal.
Description
Technical Field
The present invention relates to the field of terminal technologies, and in particular, to a method and an apparatus for editing data, and a terminal.
Background
With the rapid development and popularization of terminals, smart devices such as smart phones have increasingly wide applications. People can use the smart phone to surf the internet, take pictures, play games, pay online and the like, and the smart phone becomes an indispensable tool in life, so that a large amount of data of users are inevitably stored in the smart phone, and how to ensure the safety of the data of the users is very important.
In the prior art, encryption is generally used to protect the security of user data, for example, a string encryption method is used. When a user operates data, the user can operate the data only by inputting a preset character string password, and although the encryption method plays a certain role in protecting the data, the user is easily seen by people beside a smart phone or illegally cracked when inputting the password, so that the safety of the user data is influenced.
Disclosure of Invention
The embodiment of the invention provides a data editing method, a data editing device and a data editing terminal, which can improve the safety of user data.
The embodiment of the invention provides the following technical scheme:
a method of editing data, comprising:
receiving a data editing instruction;
when the data indicated by the data editing instruction is determined to be preset encrypted data, acquiring a user knocking operation instruction;
and when the user knocking operation instruction is judged to meet the preset condition, carrying out editing operation on the data indicated by the data editing instruction.
The embodiment of the invention also provides the following technical scheme:
an apparatus for editing data, comprising:
the receiving module is used for receiving a data editing instruction;
the acquisition module is used for acquiring a user knocking operation instruction when the data indicated by the data editing instruction is determined to be preset encrypted data;
and the editing module is used for editing the data indicated by the data editing instruction when the user knocking operation instruction is judged to meet the preset condition.
The embodiment of the invention also provides the following technical scheme:
a terminal, comprising:
a memory storing executable program code;
a processor coupled to the memory;
the processor calls the executable program code stored in the memory to execute any data editing method provided by the embodiment of the invention.
According to the data editing method, the data editing device and the data editing terminal, when the data indicated by the data editing instruction is judged to be the preset encrypted data, the user knocking operation instruction is obtained, when the knocking operation instruction meets the preset condition, the preset encrypted data is allowed to be edited, the problem that the user data is easy to be mistakenly operated and stolen is solved, and therefore the safety of the user data is improved.
Drawings
The technical solution and other advantages of the present invention will become apparent from the following detailed description of specific embodiments of the present invention, which is to be read in connection with the accompanying drawings.
Fig. 1 is a schematic flowchart of a data editing method according to an embodiment of the present invention.
Fig. 2 is another schematic flow chart of a data editing method according to an embodiment of the present invention.
Fig. 3 is a schematic view of an operation interface provided in an embodiment of the present invention.
Fig. 4 is a schematic diagram of an editing interface provided in the embodiment of the present invention.
Fig. 5 is a block diagram of an apparatus for editing data according to an embodiment of the present invention.
Fig. 6 is a schematic block diagram of an apparatus for editing data according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements, the principles of the present invention are illustrated as being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be taken as limiting the invention with regard to other embodiments that are not detailed herein.
The term "module" as used herein may be considered a software object executing on the computing system. The various components, modules, engines, and services described herein may be viewed as objects implemented on the computing system. The apparatus and method described herein are preferably implemented in software, but may also be implemented in hardware, and are within the scope of the present invention.
The following is a detailed description of the analysis.
In the present embodiment, the description will be made from the perspective of a data editing apparatus, which may be specifically integrated in a terminal, such as a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), and the like.
Referring to fig. 1, fig. 1 is a flowchart illustrating a data editing method according to an embodiment of the present invention. Specifically, the method comprises the following steps:
in step S101, a data editing instruction is received.
The data refers to a file stored in the terminal, and may be a photograph, a document, audio, an address book, or the like.
The data editing instruction is generated when data is edited. The editing operation may be copying, deleting, cutting, and checking of data, and for example, the user copies, deletes, cuts, and checks the address book in the terminal, that is, receives a data editing instruction.
In step S102, when it is determined that the data indicated by the data editing instruction is the preset encrypted data, a user tap operation instruction is acquired.
It should be noted that data in the terminal is easily deleted or stolen by mistake, for example, when a user uses the terminal for a child at home, a mistake deletion operation on the data is easily generated in the operation process of the child, and if the data deleted by mistake is important data, great inconvenience and loss are brought to the user.
In order to solve the above problem, in steps S101 and S102 of the embodiment of the present invention, when a user performs an editing operation on data (receives a data editing instruction), when it is determined that the edited data is important data (when it is determined that the data indicated by the data editing instruction is preset encrypted data), an editing operation authority corresponding to the data cannot be immediately acquired, a state to be verified needs to be entered, and when a preset password is input (a user tapping operation instruction is acquired) and verification is passed, the data can be edited.
The data can be divided into general data and important data. The common data is data with low importance level for the user, and can allow the user to operate the data by himself, and the important data is data with high importance level for the user, and generally does not allow other people to operate the data, such as photo data, address book data and the like.
Based on this, the preset encrypted data may be set by the user according to the actual application, and may be an address book, a photo, a short message, and the like on the user terminal, which is not limited specifically here.
Specifically, the determining that the data indicated by the data editing instruction is preset encrypted data includes:
(1) and acquiring data indicated by the data editing instruction.
(2) And when the data indicated by the data editing instruction is judged to have the encryption identifier, judging that the data indicated by the data editing instruction is preset encryption data.
Wherein, the user can preset encryption for the data with higher importance level. When the data is encrypted in advance, an encryption identifier is added to the data, when a user operates the data with the encryption identifier (namely, the data is encrypted in advance), a corresponding decryption password needs to be input, and otherwise, the operation is refused.
In step S103, when it is determined that the user tap operation instruction satisfies the preset condition, an editing operation is performed on the data indicated by the data editing instruction.
In a possible implementation manner, before receiving the data editing instruction, the method further includes setting a preset condition, where the preset condition is a determination condition for determining whether the user tapping operation instruction passes the verification.
In one possible implementation, the user can sense the tapping action of the user through a pressure sensing screen preset on the terminal. Can acquire the dynamics value that the action of knocking each time of user corresponds through the pressure sensing screen, divide into 0 (light) with the dynamics, 1 (heavy) dynamics rank (decryption code), when the dynamics value that the action of knocking that acquires corresponds is less than and predetermines middle dynamics value, divide into 0 level with the dynamics, when the dynamics value that the action of knocking that acquires corresponds is greater than and predetermines middle dynamics value, divide into 1 level with the dynamics, generate corresponding dynamics rank and according to knocking action precedence order combination with all dynamics values of knocking, generate the decryption code. If the user carries out four knocking actions, namely three knocking actions are lighter than one other and one knocking action is heavier than three knocking actions, generating a corresponding decryption code 0001 according to a preset rule, correspondingly comparing the decryption code with a preset decryption code, and if the decryption code is consistent with the preset decryption code, judging that the user knocking operation instruction meets a preset condition; and if not, judging that the tapping operation instruction of the user does not meet the preset condition. In another possible embodiment, the user may sense the tapping action of the user through a speaker or a gravity sensor of the terminal. When a loudspeaker is used for sensing, vibration generated by a terminal when a user knocks is obtained to judge that the user performs knocking action for one time, and when a gravity sensor is used for sensing, acceleration change generated by the terminal when the user knocks is obtained to judge that the user performs knocking for one time, knocking times are counted, and if the knocking times are consistent with preset knocking times, it is judged that a user knocking operation instruction meets a preset condition; and if the tapping frequency is inconsistent with the preset tapping frequency, judging that the tapping operation instruction of the user does not meet the preset condition. And is not particularly limited herein.
Therefore, according to the data editing method provided by the embodiment, when the data indicated by the data editing instruction is judged to be the preset encrypted data, the user knocking operation instruction is obtained, and when the knocking operation instruction meets the preset condition, the preset encrypted data is allowed to be edited, so that the problem that the user data is easily subjected to misoperation and stealing is solved, and the safety of the user data is improved.
The method described in the above embodiments is further illustrated in detail by way of example.
Referring to fig. 2, fig. 2 is another flow chart illustrating a data editing method according to an embodiment of the present invention.
Specifically, the method comprises the following steps:
in step S201, a data editing instruction is received.
The data refers to a file stored in the terminal, and may be a photograph, a document, audio, an address book, or the like.
The data editing instruction is generated by editing data. The editing operation may be copying, deleting, cutting, and checking of data, and for example, the user copies, deletes, cuts, and checks the terminal address book, that is, receives a data editing instruction.
For example, taking a mobile phone as an example, the data refers to an address book, a photo, a document, a video, a voice file, etc. on the mobile phone, and when the content of the file is viewed, deleted, cut, copied, it is the received data editing instruction. As shown in fig. 3, fig. 3 is a schematic view of an operation interface, where icons on the interface are user data including a calendar, contacts, an electronic book, and music, and when a user clicks the icon for a contact, it is determined that a data editing instruction is received for viewing the contact.
In step S202, when it is determined that the data indicated by the data editing instruction is the preset encrypted data, a tapping action of the user is sensed through a preset pressure sensing screen.
The data can be divided into general data and important data. The general data is data with low importance level for the user and can be allowed to be operated by a non-user, and the important data is data with high importance level for the user and generally does not allow the non-user to be operated, such as photo data, address book data and the like.
Further, the user performs a predetermined encryption step on the important data. When a user encrypts certain important data, an encryption identifier is added to the data, preset locking processing is carried out on the data, the important data are generated into preset encrypted data after the encryption processing is completed, a decryption password is collected in advance by a terminal and used for unlocking the preset encrypted data, when the user operates the preset encrypted data, the corresponding decryption password needs to be input, and otherwise, the operation on the preset encrypted data is not allowed.
Based on the data, data indicated by the data editing instruction are obtained, when the fact that the encryption mark exists in the indicated data is detected, the data indicated by the data editing instruction are judged to be the preset encryption data, a verification mode is entered, the knocking action input by the user is collected, and whether the data operation is carried out by the user himself or herself is verified through the collected knocking action.
In a possible embodiment, a display flag may be added to the preset encrypted data to distinguish the normal data from the preset encrypted data, as shown in fig. 3, a preset display flag is set in a lower right corner of the contact icon to indicate that the contact is the preset encrypted data, and the other calendar, e-book, and music data are the normal data.
Referring to fig. 3, when a user views a contact icon, it is detected that an encrypted identifier exists in the contact data, the contact data is determined to be preset encrypted data, a verification mode is performed, a corresponding message a box is popped up, the user is required to input corresponding verification password information, and a tapping action input by the user is started to be collected.
It should be noted that, the pressure sensing screen can recognize the pressure when the user touches, that is, can obtain the pressure value when the user touches each time.
In step S203, tapping force data corresponding to the tapping action is acquired.
The tapping force data is a force value corresponding to the current tapping action, and when the user lightly taps the terminal screen, the current tapping force value is relatively small; when the user heavily taps the terminal screen, the value corresponding to the current tapping force value is larger.
In step S204, the tapping force data is classified based on the light tapping motion and the heavy tapping motion, and the corresponding decryption codes are obtained. It should be noted that the tapping operation command represents a series of continuous tapping actions, i.e. the time interval between each tapping action cannot exceed a preset time. For example, when a user inputs a tapping action for the first time, a second tapping action needs to be input within a preset time (for example, 10 seconds), otherwise, no tapping action is input within the preset time (for example, 10 seconds) after the tapping action is input, the acquisition of the tapping action is finished, and a tapping operation instruction is generated.
The knocking strength can be classified in advance, for example, into a level 0 and a level 1 (decryption coding), wherein the level 0 represents a light knocking action, and the level 1 represents a heavy knocking action. Through presetting a middle knocking force value, when the knocking force data corresponding to the knocking action is smaller than the middle knocking force value, judging the mild knocking to be 0 grade; and when the tapping force data corresponding to the tapping action is larger than the middle tapping force value, judging that the heavy tapping is in a grade 1.
In step S205, the decryption codes are combined according to the sequence of the tapping actions, so as to generate a tapping operation instruction.
The method comprises the steps of converting knocking strength data of each knocking action into corresponding decryption codes, combining the corresponding decryption codes according to the sequence of the knocking actions, and generating a knocking operation instruction according to the sequence combination of the knocking actions, wherein if a user carries out 5 continuous knocking actions, the knocking actions are respectively light knocking 0, heavy knocking 1, light knocking 0 and heavy knocking 1, and the knocking operation instruction comprises the combined 01001 decryption codes.
In step S206, it is determined whether the decryption code in the tapping operation instruction is consistent with the decryption code recorded in the preset tapping operation instruction.
In a certain possible implementation manner, before the data editing instruction is received, the method further comprises the steps of presetting and collecting continuous knocking actions of a user, grading knocking force data in the knocking actions to generate corresponding decryption codes, and combining the decryption codes according to the sequence combination of the knocking actions to generate a preset knocking operation instruction.
It should be noted that, in order to ensure the accuracy of the preset tapping operation instruction. When the preset knocking operation instruction is acquired for the first time, the terminal prompts the user to input the preset knocking operation instruction again, and if the preset knocking operation instructions input twice are consistent, the preset knocking operation instruction is recorded; if the preset knocking operation instructions input twice are inconsistent, the preset knocking operation instructions need to be collected again. For example, when a user collects a preset knocking operation instruction for the first time, the user inputs 4 continuous knocking actions, namely a light knocking 0 level, a heavy knocking 1 level, a light knocking 0 level and a light knocking 0 level, and the preset knocking operation instruction is generated by combining according to the sequence of the knocking actions and comprises 0100 decryption codes generated by the combination, at the moment, the terminal prompts the user to determine the preset knocking operation instruction, and when the decryption codes in the preset knocking operation instruction input by the user again are consistent with the decryption codes collected for the first time, the preset knocking operation instruction is determined and recorded.
If the decryption code in the tapping operation instruction is judged to be consistent with the decryption code recorded in the preset tapping operation instruction, step S207 is executed; if the tapping force data in the tapping operation instruction is determined to be inconsistent with the tapping force data recorded in the preset tapping operation instruction, step S208 is executed.
For example, when the decryption code recorded in the preset tapping operation instruction is 01001, if the decryption code is consistent with the 01001 decryption code in the obtained tapping operation instruction, the verification is passed, and when the decryption code recorded in the preset tapping action is 110011, if the decryption code is inconsistent with the 01001 decryption code in the obtained tapping operation instruction, the verification is not passed.
In step S207, an editing operation is performed on the data instructed by the data editing instruction.
When the decryption code in the knocking operation instruction is judged to be consistent with the decryption code recorded in the preset knocking operation instruction, the correct knocking operation instruction is input by the user, and the verification is carried out through the knocking operation instruction. At this time, the corresponding preset encrypted data indicated in the data editing instruction is acquired, the data editing instruction is responded, and the data editing operation indicated in the data editing instruction is completed, as shown in fig. 3, after the verification mode is performed and the corresponding message box a is popped up, a user inputs a correct knocking operation instruction, and then the checking operation of the contact is responded.
In step S208, the editing operation in response to the data indicated by the data editing instruction is rejected.
When the decryption code in the knocking operation instruction is judged to be inconsistent with the decryption code recorded in the preset knocking operation instruction, the fact that the user does not input the correct knocking operation instruction is indicated, the verification fails, and the terminal refuses to respond to the data editing operation indicated by the data editing instruction in order to protect the information safety of the terminal.
In a possible implementation manner, when the value of the number of times of obtaining the data editing operation that the terminal refuses to respond to the data indicated by the data editing instruction exceeds a certain threshold number of times, namely, in the case that the multi-tap operation instruction fails to verify. In order to protect the data security of the terminal and prevent others from trying to crack the knocking operation instruction, the terminal refuses to respond to the received data editing instruction and executes the screen locking operation.
In order to better describe the embodiment of the present invention, the operation interface schematic diagram shown in fig. 3 and the editing interface schematic diagram shown in fig. 4 are used to describe in detail: as shown in fig. 3, the calendar, the electronic book, and the music in the figure are general data, and the contact is preset encrypted data. When the user looks over contact data, because this contact data is for predetermineeing the encryption data, so can pop out prompt dialog box A, the suggestion user need input corresponding verification password, the suggestion input strikes the operating instruction promptly, at this moment, current user can pass through the action of strikeing on the forced induction screen that sets up in advance, the action of strikeing of cell-phone response forced induction screen, acquire the power value that the action of strikeing corresponds, can show a translucent power value display strip on the screen, when the power value is big more, the display strip shows more fully. The user can control the size of the input tapping force value according to the display bar, when a finger of the user leaves the pressure sensing screen, for the end of one-time tapping action, the middle scale value of the display bar is the middle tapping force value, when the displayed force value of the display bar is smaller than the middle scale value (the middle tapping force value), the display bar is divided into a mild tapping 0 level (decryption code), and when the displayed force value of the display bar is larger than the middle scale value (the middle tapping force value), the display bar is divided into a severe tapping 1 level (decryption code). When one knocking action is finished, recording decryption codes corresponding to the knocking action, starting timing, when a user inputs a new knocking action on a pressure sensing screen within a preset time threshold (for example, within 10 seconds), judging the new knocking action as a continuous knocking action, acquiring knocking force data corresponding to the new knocking action, recording, and when no new knocking action is input within a preset time (for example, within 10 seconds) after the knocking action is finished, finishing a knocking operation instruction, combining the recorded decryption codes according to the occurrence sequence of the knocking actions to generate password information, and if the user continuously inputs 3 times of knocking actions, namely, light knocking and heavy knocking respectively, generating a corresponding decryption password (knocking operation instruction) of 001. If the decryption password (the tapping operation instruction) is consistent with the preset decryption password (the preset tapping operation instruction), the verification is passed, the checking operation of the contact person is responded, the editing interface shown in the figure 4 is entered, and at the moment, the user can check, copy and the like the stored contact person data. However, when the user deletes the contact data, in order to protect the data security of the user, the user needs to input the verification password again to prevent the user from forgetting to exit the current interface, and other users use the mobile phone to delete the data by mistake, and the preset password for deleting the data may not be consistent with the preset password for checking the data, which is not limited in this respect. In the process of acquiring the verification password, when detecting that the user continuously inputs wrong verification passwords for more than 5 times, stopping receiving the verification passwords within a certain time, and performing screen locking operation.
According to the data editing method provided by the embodiment, when the data indicated by the data editing instruction is judged to be the preset encrypted data, the knocking action of the user is sensed through the preset pressure sensing screen, the knocking force data corresponding to the knocking action is obtained, the knocking force data are classified to generate the decryption codes, the decryption codes corresponding to the continuous knocking actions are combined to generate the knocking operation instruction, and when the decryption codes in the knocking operation instruction are consistent with the decryption codes recorded in the preset knocking action, the preset encrypted data are edited in response, so that the problem that the user data are easily subjected to misoperation and stealing is solved, and the safety of the user data is improved.
In order to better implement the data editing method provided by the embodiment of the present invention, the embodiment of the present invention further provides a device based on the data editing method. The meaning of the noun is the same as that in the editing method of the data, and the specific implementation details can refer to the description in the method embodiment.
Referring to fig. 5, fig. 5 is a block diagram of an apparatus for editing data according to an embodiment of the present invention. Specifically, the data editing apparatus 300 includes: an instruction receiving module 31, an obtaining module 32, and an editing module 33.
The receiving module 31 is configured to receive a data editing instruction.
The data editing instruction is generated by performing an editing operation on data. The data refers to files stored in the terminal, and can be photos, documents, audios, address books and the like.
The data editing instruction in the receiving module 31 is to perform editing operation on data. The editing operations may be copying, deleting, cutting, and viewing of data.
The obtaining module 32 is configured to obtain a user tapping operation instruction when it is determined that the data indicated by the data editing instruction is preset encrypted data.
Specifically, the obtaining module 32 determines that the data indicated by the data editing instruction is preset encrypted data, and may:
and acquiring the data indicated by the data editing instruction. And when the data indicated by the data editing instruction is judged to have the encryption identifier, judging that the data indicated by the data editing instruction is preset encryption data.
The editing module 33 is configured to, when it is determined that the user tapping operation instruction meets the preset condition, perform an editing operation on the data indicated by the data editing instruction.
In one possible implementation, the user can sense the tapping action of the user through a pressure sensing screen preset on the terminal. The strength value that each time of can acquireing the user strikes the action through the pressure sensing screen corresponds is divided into 0 (light) level, 1 (heavy) level power level (decryption code) with the dynamics, when the dynamics value that the action that strikes that acquires corresponds is less than and predetermines middle power value, divide into 0 level with the dynamics, when the dynamics value that the action that strikes that acquires corresponds is greater than and predetermines middle power value, divide into 1 level with the dynamics, generate corresponding dynamics level and strike action and successively make up according to the order with all strike action dynamics values, generate the decryption code. The determining module 33 compares the decryption code with a preset decryption code, and determines that the user tapping operation command satisfies a preset condition when the decryption code is consistent with the preset decryption code. In another possible embodiment, the user may sense the tapping action of the user through a speaker or a gravity sensor of the terminal. When the loudspeaker is used for sensing, vibration generated when the user taps the terminal is obtained to judge that the user performs a tapping action, and when the gravity sensor is used for sensing, acceleration change generated when the user taps the terminal is obtained to judge that the user performs a tapping, tapping times are counted, and the determining module 33 can also determine that the tapping operation instruction of the user meets preset conditions by determining that the tapping times are consistent with the preset tapping times. And is not particularly limited herein.
Referring to fig. 6, fig. 6 is a schematic block diagram of an apparatus for editing data according to an embodiment of the present invention, where the apparatus 300 for editing data may further include:
the obtaining module 32 may further include a sensing submodule 321, an obtaining submodule 322, and a generating submodule 323.
Specifically, the sensing sub-module 321 is configured to sense a tapping action of a user through a preset pressure sensing screen when it is determined that the data indicated by the data editing instruction is preset encrypted data. The obtaining sub-module 322 is configured to obtain tapping force data corresponding to the tapping action. The generating submodule 323 is configured to combine the tapping force data according to the sequence of the tapping actions, and generate a tapping operation instruction.
Based on this, the generation submodule 323 combines the knocking strength data according to the sequence of the knocking actions, which may be:
and classifying the knocking strength data based on the mild knocking action and the severe knocking action to obtain corresponding decryption codes. And combining the decryption codes according to the sequence of the knocking actions to generate a knocking operation instruction.
It should be noted that the tapping operation command represents a series of continuous tapping actions, i.e. the time interval between each tapping action cannot exceed a preset time. If the tapping action is not input within the preset time (such as 10 seconds) after the tapping action is input, the acquisition of the tapping action is finished, and a tapping operation instruction is generated.
And the judging module 35 is configured to judge whether the user knocking operation instruction meets a preset condition.
Wherein, it is judged whether the user knocking operation instruction satisfies the preset condition in the judging module 35, and the judgment can be performed by:
judging whether the decryption code in the knocking operation instruction is consistent with the decryption code recorded in the preset knocking operation instruction or not; when the decryption code in the knocking operation instruction is judged to be consistent with the decryption code recorded in the preset knocking operation instruction, judging that the user knocking operation instruction meets the preset condition; and when the decryption code in the tapping operation instruction is judged to be inconsistent with the decryption code recorded in the preset tapping operation instruction, judging that the tapping operation instruction of the user does not meet the preset condition.
By the above, the data editing device provided by this embodiment, when data indicated by the data editing instruction is the preset encrypted data, the knocking action of the user is sensed through the preset pressure sensing screen, the knocking force data corresponding to the knocking action is acquired, the knocking force data is classified, the decryption codes are generated, the decryption codes corresponding to the continuous knocking action are combined, the knocking operation instruction is generated, when the decryption codes in the knocking operation instruction are consistent with the decryption codes recorded in the preset knocking action, the preset encrypted data are edited in response, the problem that the user data is easily subjected to misoperation and stealing is solved, and therefore the safety of the user data is improved.
An embodiment of the present invention further provides a terminal, as shown in fig. 7, the terminal 400 may include one or more computer-readable storage media, such as a memory 401, a sensor 402, an input unit 403, a display unit 404, a pressure sensing module 405, and a processor 406 including one or more processing cores. Those skilled in the art will appreciate that the terminal structure shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The memory 401 may be used to store applications and data. The memory 401 stores applications containing executable code. The application programs may constitute various functional modules. The processor 406 executes various functional applications and data processing by running the application programs stored in the memory 401. Further, the memory 401 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 401 may also include a memory controller to provide the processor 406 and the input unit 403 access to the memory 401.
The terminal may also include at least one sensor 402, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or the backlight when the terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal, detailed description is omitted here.
The input unit 403 may be used to receive input numbers, character information, or user characteristic information, such as a fingerprint, and generate a keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control. In particular, in a particular embodiment, the input unit 403 may include a touch-sensitive surface as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 406, and can receive and execute commands sent by the processor 406. In addition, touch sensitive surfaces may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 403 may include other input devices in addition to the touch-sensitive surface. In particular, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a fingerprint recognition module, a trackball, a mouse, a joystick, and the like.
The display unit 404 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal, which may be made up of graphics, text, icons, video, and any combination thereof. The display unit 404 may include a display panel. Alternatively, the Display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface may overlay the display panel, and when a touch operation is detected on or near the touch-sensitive surface, the touch operation is transmitted to the processor 406 to determine the type of touch event, and the processor 406 then provides a corresponding visual output on the display panel according to the type of touch event. Although in FIG. 7 the touch-sensitive surface and the display panel are two separate components to implement input and output functions, in some embodiments the touch-sensitive surface may be integrated with the display panel to implement input and output functions.
The pressure sensing unit 405 may obtain specific pressure data of touch on the terminal input unit 403, and transmit the specific pressure data to the processor 406 to determine a specific touch pressure value of the touch event.
The processor 406 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal and processes data by running or executing an application program stored in the memory 401 and calling data stored in the memory 401, thereby performing overall monitoring of the terminal. Alternatively, processor 406 may include one or more processing cores; preferably, the processor 406 may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like.
Although not shown in fig. 7, the terminal may further include a camera, a bluetooth module, a power supply, and the like, which are not described in detail herein.
Specifically, in this embodiment, the processor 406 in the terminal loads the executable code corresponding to the process of one or more application programs into the memory 401 according to the following instructions, and the processor 406 runs the application program stored in the memory 401, thereby implementing various functions:
a data editing instruction is received through the input unit 403.
When it is determined by the processor 406 that the data indicated by the data editing instruction is preset encrypted data, a user tap operation instruction is acquired through the display unit 403.
When the processor 406 determines that the user tapping operation instruction meets the preset condition, the data indicated by the data editing instruction is edited.
The processor 406, when executing the step of obtaining the user tapping operation instruction, may include: and the knocking action of the user is sensed through a preset pressure sensing screen. The knocking force data corresponding to the knocking action is obtained through the pressure sensing unit 405. And combining the knocking force data according to the sequence of the knocking actions to generate a knocking operation instruction. The processor 406, when executing the step of combining the tapping force data according to the sequence of the tapping actions, may include: and classifying the knocking strength data based on the mild knocking action and the severe knocking action to obtain corresponding decryption codes. And combining the decryption codes according to the sequence of the knocking actions.
The processor 406, when executing the step of determining that the user tapping operation instruction meets the preset condition, may include: and judging whether the decryption code in the tapping operation instruction is consistent with the decryption code recorded in the preset tapping operation instruction. And when the decryption code in the tapping operation instruction is consistent with the decryption code recorded in the preset tapping operation instruction, judging that the tapping operation instruction of the user meets the preset condition.
The processor 406, when performing the step of determining that the data indicated by the data editing instruction is the preset encrypted data, may include: acquiring data indicated by the data editing instruction; and when the data indicated by the data editing instruction is judged to have the encryption identifier, judging that the data indicated by the data editing instruction is preset encryption data.
Since the terminal can execute any data editing method provided in the embodiment of the present invention, the beneficial effects that can be achieved by any data editing method provided in the embodiment of the present invention can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
In a specific implementation, the above units may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and the specific implementation of the above units may refer to the foregoing method embodiments, which are not described herein again.
In the above embodiments, the descriptions of the embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed description of the editing method for data, which is not described herein again.
The method, the apparatus, and the terminal for editing data provided in the embodiments of the present invention are, for example, a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), and the like, and the terminal, the apparatus for editing data, and the method for editing data belong to the same concept, and any method provided in the embodiment of the method for editing data may be operated on the apparatus for editing data, and specific implementation processes thereof are described in the embodiment of the method for editing data, and are not described herein again.
It should be noted that, for the data editing method of the present invention, it can be understood by those skilled in the art that all or part of the process of implementing the data editing method of the embodiments of the present invention can be completed by controlling the relevant hardware through a computer program, where the computer program can be stored in a computer readable storage medium, such as a memory of a terminal, and executed by at least one processor in the terminal, and during the execution process, the process of implementing the data editing method can include the process of the embodiments of the data editing method. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
In the data editing apparatus according to the embodiment of the present invention, each functional module may be integrated into one processing chip, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented as a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium such as a read-only memory, a magnetic or optical disk, or the like.
The method, the apparatus, and the terminal for editing data provided by the embodiment of the present invention are described in detail above, and a specific example is applied in the description to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in view of the above, the content of the present specification should not be construed as a limitation to the present invention.
Claims (9)
1. A method for editing data, comprising:
receiving a data editing instruction, wherein the data comprises common data and important data;
when the data indicated by the data editing instruction is determined to be preset encrypted data, prompting a user to input a knocking operation instruction, wherein the preset encrypted data has a display mark which is used for distinguishing common data from important data;
the knocking action of a user is sensed through a preset loudspeaker or a preset gravity sensor;
acquiring knocking force data corresponding to the knocking action;
combining the knocking force data according to the sequence of knocking actions to generate a knocking operation instruction, and displaying a force value display bar according to the knocking operation instruction; when the user knocking operation instruction is judged to meet a preset condition, carrying out editing operation on data indicated by the data editing instruction;
and when the data editing instruction is a deleting instruction, prompting the user to input a knocking instruction again.
2. The method for editing data according to claim 1, wherein the step of combining the tapping force data according to the sequence of the tapping actions comprises:
classifying the knocking strength data based on a mild knocking action and a severe knocking action to obtain corresponding decryption codes;
and combining the decryption codes according to the sequence of the knocking actions.
3. The method for editing data according to claim 2, wherein the step of determining that the user tap operation instruction satisfies a preset condition includes:
judging whether the decryption code in the knocking operation instruction is consistent with the decryption code recorded in the preset knocking operation instruction or not;
and when the decryption code in the tapping operation instruction is consistent with the decryption code recorded in the preset tapping operation instruction, judging that the tapping operation instruction of the user meets the preset condition.
4. The method for editing data according to any one of claims 1 to 3, wherein the step of determining that the data indicated by the data editing instruction is preset encrypted data includes:
acquiring data indicated by the data editing instruction;
and when the data indicated by the data editing instruction is judged to have the encryption identifier, judging that the data indicated by the data editing instruction is preset encryption data.
5. An apparatus for editing data, comprising:
the receiving module is used for receiving a data editing instruction, and the data comprises common data and important data;
the prompting module is used for prompting a user to input a knocking operation instruction when the data indicated by the data editing instruction is determined to be preset encrypted data, and the preset encrypted data has a display mark which is used for distinguishing common data from important data;
the sensing submodule is used for sensing the knocking action of a user through a preset loudspeaker or a preset gravity sensor;
the obtaining sub-module is used for obtaining knocking force data corresponding to the knocking action;
the generating submodule is used for combining the knocking force data according to the sequence of knocking actions to generate a knocking operation instruction and displaying a force value display bar according to the knocking operation instruction;
the editing module is used for editing the data indicated by the data editing instruction when the user knocking operation instruction is judged to meet the preset condition;
and the prompting submodule is used for prompting the user to input a knocking instruction again when the data editing instruction is a deleting instruction.
6. Apparatus for editing data according to claim 5, wherein the generation submodule is configured to:
classifying the knocking strength data based on a mild knocking action and a severe knocking action to obtain corresponding decryption codes;
and combining the decryption codes according to the sequence of the knocking actions to generate a knocking operation instruction.
7. The apparatus for editing data according to claim 6, said apparatus further comprising:
the judging module is used for judging whether the user knocking operation instruction meets a preset condition or not;
the judging module is used for: judging whether the decryption code in the knocking operation instruction is consistent with the decryption code recorded in the preset knocking operation instruction or not, judging that the user knocking operation instruction meets the preset condition when judging that the decryption code in the knocking operation instruction is consistent with the decryption code recorded in the preset knocking operation instruction, and judging that the user knocking operation instruction does not meet the preset condition when judging that the decryption code in the knocking operation instruction is inconsistent with the decryption code recorded in the preset knocking operation instruction.
8. Apparatus for editing data according to any one of claims 5 to 7, wherein the acquisition module is configured to:
acquiring data indicated by the data editing instruction;
when the data indicated by the data editing instruction is judged to have the encryption identifier, judging that the data indicated by the data editing instruction is preset encryption data;
and acquiring a knocking operation instruction of the user.
9. A terminal, comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the data editing method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611089010.2A CN106778166B (en) | 2016-11-30 | 2016-11-30 | Data editing method and device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611089010.2A CN106778166B (en) | 2016-11-30 | 2016-11-30 | Data editing method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106778166A CN106778166A (en) | 2017-05-31 |
CN106778166B true CN106778166B (en) | 2020-04-10 |
Family
ID=58914165
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611089010.2A Active CN106778166B (en) | 2016-11-30 | 2016-11-30 | Data editing method and device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106778166B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102306255A (en) * | 2011-08-29 | 2012-01-04 | 飞天诚信科技股份有限公司 | Document protection method and system |
CN102455842A (en) * | 2010-10-21 | 2012-05-16 | 北京创新方舟科技有限公司 | Method and equipment for unlocking screen according to clicking operation of user |
CN102542210A (en) * | 2010-12-31 | 2012-07-04 | 富泰华工业(深圳)有限公司 | Electronic device and method for managing file permissions |
CN105512565A (en) * | 2015-11-26 | 2016-04-20 | 浪潮电子信息产业股份有限公司 | Method and server for preventing electronic document leakage |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN105718179A (en) * | 2016-01-20 | 2016-06-29 | 广东欧珀移动通信有限公司 | Information processing method and device |
-
2016
- 2016-11-30 CN CN201611089010.2A patent/CN106778166B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102455842A (en) * | 2010-10-21 | 2012-05-16 | 北京创新方舟科技有限公司 | Method and equipment for unlocking screen according to clicking operation of user |
CN102542210A (en) * | 2010-12-31 | 2012-07-04 | 富泰华工业(深圳)有限公司 | Electronic device and method for managing file permissions |
CN102306255A (en) * | 2011-08-29 | 2012-01-04 | 飞天诚信科技股份有限公司 | Document protection method and system |
CN105512565A (en) * | 2015-11-26 | 2016-04-20 | 浪潮电子信息产业股份有限公司 | Method and server for preventing electronic document leakage |
CN105678186A (en) * | 2016-01-05 | 2016-06-15 | 上海卓易科技股份有限公司 | Information encryption method and device |
CN105718179A (en) * | 2016-01-20 | 2016-06-29 | 广东欧珀移动通信有限公司 | Information processing method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106778166A (en) | 2017-05-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6360866B2 (en) | Apparatus, method and graphical user interface for operating a user interface based on fingerprint sensor input | |
CN106778130B (en) | Message display method, display device and mobile terminal | |
US11636192B2 (en) | Secure login with authentication based on a visual representation of data | |
JP7564304B2 (en) | DEVICE, METHOD, AND GRAPHICAL USER INTERFACE FOR MANAGING AUTHENTICATION CREDENTIALS FOR USER ACCOUNTS - Patent application | |
CN111488113B (en) | virtual computer keyboard | |
CN107506634B (en) | Data display method and device, storage medium and terminal | |
TWI613562B (en) | Authenticated device used to unlock another device | |
US20160048705A1 (en) | Authenticated device used to unlock another device | |
WO2014109344A1 (en) | Terminal, unlocking method, and program | |
KR102104123B1 (en) | Device for displaying contents and method thereof | |
US11601419B2 (en) | User interfaces for accessing an account | |
US11703996B2 (en) | User input interfaces | |
KR20140119608A (en) | Method and device for providing a private page | |
US20220392455A1 (en) | Methods and user interfaces for voice-based user profile management | |
KR101474856B1 (en) | Apparatus and method for generateg an event by voice recognition | |
US11960615B2 (en) | Methods and user interfaces for voice-based user profile management | |
US20240256105A1 (en) | Methods and user interfaces for account recovery | |
CN106778131B (en) | Display method and device of hidden information and terminal | |
WO2017008630A1 (en) | Hiding setting method and apparatus, and application program content processing method and apparatus | |
CN107018232A (en) | A kind of identifying code rendering method and terminal | |
CN106778296B (en) | Access method, device and terminal for access object | |
CN106778166B (en) | Data editing method and device and terminal | |
US20230084751A1 (en) | User interfaces for managing passwords | |
JP2014002522A (en) | Information terminal device | |
CN108763886B (en) | Touch information processing method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |