CN106778296B - Access method, device and terminal for access object - Google Patents

Access method, device and terminal for access object Download PDF

Info

Publication number
CN106778296B
CN106778296B CN201611084999.8A CN201611084999A CN106778296B CN 106778296 B CN106778296 B CN 106778296B CN 201611084999 A CN201611084999 A CN 201611084999A CN 106778296 B CN106778296 B CN 106778296B
Authority
CN
China
Prior art keywords
access
preset
object set
access object
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611084999.8A
Other languages
Chinese (zh)
Other versions
CN106778296A (en
Inventor
任利宽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611084999.8A priority Critical patent/CN106778296B/en
Publication of CN106778296A publication Critical patent/CN106778296A/en
Application granted granted Critical
Publication of CN106778296B publication Critical patent/CN106778296B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an access method, an access device and a terminal for an access object. Receiving an access request, wherein the access request carries verification information; matching the verification information with a preset verification sample, wherein the preset verification sample corresponds to a hidden preset access object set one by one; when the verification information is matched with a preset verification sample, acquiring a preset access object set corresponding to the verification information; and displaying and accessing the corresponding preset access object set. According to the embodiment of the invention, the access object sets are preset and hidden, wherein each hidden preset access object set corresponds to a preset verification sample one by one, and when the input verification information is determined to be matched with the preset verification samples, the corresponding access object sets can be unhidden and displayed, so that the privacy information in the terminal is ensured not to be easily leaked, and the security of the privacy information of the user is improved.

Description

Access method, device and terminal for access object
Technical Field
The present invention belongs to the field of communications technologies, and in particular, to an access method, an access device, and a terminal for accessing an object.
Background
With the development and popularization of mobile terminals, the functions of the mobile terminals are also more and more powerful, for example, mobile phones have become an indispensable communication tool in people's daily life.
At present, a great amount of privacy information of a user, such as short messages, pictures, address list information and the like, is usually stored in a mobile phone. If a user forgets to lock the screen after using the mobile phone and the mobile phone is used by others, or the mobile phone is stolen, the privacy information in the mobile phone is easily leaked, so that the security of the privacy information of the user is influenced.
Disclosure of Invention
The embodiment of the invention provides an access method, an access device and a terminal of an access object, which can improve the security of user privacy information.
In a first aspect, the present invention provides an access method for accessing an object, including:
receiving an access request, wherein the access request carries verification information;
matching the verification information with a preset verification sample, wherein the preset verification sample corresponds to a hidden preset access object set one by one;
when the verification information is matched with the preset verification sample, acquiring a preset access object set corresponding to the verification information;
and displaying and accessing the corresponding preset access object set.
In a second aspect, the present invention provides an access device for accessing an object, comprising:
the device comprises a receiving unit, a verification unit and a processing unit, wherein the receiving unit is used for receiving an access request which carries verification information;
the matching unit is used for matching the verification information with preset verification samples, wherein the preset verification samples correspond to the hidden preset access object sets one by one;
an obtaining unit, configured to obtain a preset access object set corresponding to the verification information when the verification information matches the preset verification sample;
and the display unit is used for displaying and accessing the corresponding preset access object set.
In a third aspect, the present invention provides a terminal, including:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to perform the access method for accessing objects as provided in the first aspect.
In the embodiment of the invention, when an access request carrying verification information is received, the verification information is matched with a preset verification sample, wherein the preset verification sample corresponds to a hidden preset access object set one by one; and then, when the verification information is matched with the preset verification sample, acquiring a preset access object set corresponding to the verification information, and displaying and accessing the corresponding preset access object set. That is, in this embodiment, first, an access object set is preset and hidden, where each hidden preset access object set corresponds to a preset verification sample one to one, and when it is determined that input verification information matches the preset verification sample, the corresponding access object set can be unhidden and displayed, so that it is ensured that privacy information in the terminal is not easily leaked, and the security of user privacy information is improved.
Drawings
The technical solution and other advantages of the present invention will become apparent from the following detailed description of specific embodiments of the present invention, which is to be read in connection with the accompanying drawings.
Fig. 1 is a schematic flowchart of an access method for accessing an object according to an embodiment of the present invention.
Fig. 2 is another schematic flow chart of an access method for accessing an object according to an embodiment of the present invention.
Fig. 3 is a schematic terminal interface diagram of an access method for accessing an object according to an embodiment of the present invention.
Fig. 4 is a schematic structural diagram of an access device for accessing an object according to an embodiment of the present invention.
Fig. 5 is another schematic structural diagram of an access apparatus for accessing an object according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Referring to the drawings, wherein like reference numbers refer to like elements, the principles of the present invention are illustrated as being implemented in a suitable computing environment. The following description is based on illustrated embodiments of the invention and should not be taken as limiting the invention with regard to other embodiments that are not detailed herein.
In the description that follows, specific embodiments of the present invention are described with reference to steps and symbols executed by one or more computers, unless otherwise indicated. Accordingly, these steps and operations will be referred to, several times, as being performed by a computer, the computer performing operations involving a processing unit of the computer in electronic signals representing data in a structured form. This operation transforms the data or maintains it at locations in the computer's memory system, which may be reconfigured or otherwise altered in a manner well known to those skilled in the art. The data maintains a data structure that is a physical location of the memory that has particular characteristics defined by the data format. However, while the principles of the invention have been described in language specific to above, it is not intended to be limited to the specific form set forth herein, but on the contrary, it is to be understood that various steps and operations described hereinafter may be implemented in hardware.
The principles of the present invention are operational with numerous other general purpose or special purpose computing, communication environments or configurations. Examples of well known computing systems, environments, and configurations that may be suitable for use with the invention include, but are not limited to, hand-held telephones, personal computers, servers, multiprocessor systems, microcomputer-based systems, mainframe-based computers, and distributed computing environments that include any of the above systems or devices.
The details will be described below separately.
In the present embodiment, a description will be made from the perspective of an access device (which may be simply referred to as an access device) for accessing an object, and the access device may be specifically integrated in a terminal, such as a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), a desktop computer, and the like.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating an access method for accessing an object according to an embodiment of the present invention. The method comprises the following steps:
in step S101, an access request is received, where the access request carries authentication information.
In step S102, the verification information is matched with a preset verification sample, where the preset verification sample corresponds to a hidden preset access object set one to one.
It is understood that, in this embodiment, the following steps may be further included before "receiving an access request" (i.e. step S101):
(1) at least one access object set is created.
(2) And setting the attribute information of the access object set as an instruction to hide the access object set.
(3) And determining the access object set of which the attribute information indicates to hide the access object set as a hidden preset access object set.
For example, the terminal receives a creation instruction of the user, and may create a plurality of access object sets in the terminal interface, for example, the plurality of access object sets may be presented in the form of folders.
Furthermore, after a plurality of access object sets are created, attribute information of the access object sets is set, for example, the access object sets are set to be hidden, that is, after a user unlocks and enters a terminal interface, the access object sets are invisible.
Finally, the terminal determines the plurality of invisible access object sets set as hidden preset access object sets.
In the embodiment of the present invention, in order to improve security and facilitate multi-user use, each hidden preset access object set may be correspondingly provided with a verification sample to obtain a preset verification sample, where the preset verification sample corresponds to the hidden preset access object set one by one, and the verification samples corresponding to the preset access object sets may be set to be the same or different, and are not specifically limited herein.
It is understood that, in the embodiment of the present invention, the authentication information may specifically include one or a combination of two or more of a fingerprint, a voice, a password, and the like, and is not specifically limited herein.
For example, when a user wants to access any access object set, authentication information needs to be input, the terminal matches the authentication information with a preset authentication sample, and when the authentication information matches the preset authentication sample, the user is allowed to access the corresponding preset access object set.
In some embodiments, "creating at least one set of access objects" (step (1)) may comprise:
(11) a plurality of access objects are obtained.
(12) And receiving a selection instruction input by a user.
(13) And according to the selection instruction, aggregating the corresponding access objects to generate at least one access object set.
For example, for creating an access object set, the terminal first obtains a plurality of access objects that are determined by the user and need to be hidden, and then receives a selection instruction input by the user, where the selection instruction indicates that corresponding access objects are selected from the plurality of access objects that are determined and need to be hidden to be aggregated, thereby completing the creation of an access object set.
In some embodiments, the access object set in this embodiment may be a folder, and the access object set includes at least one access object, where the access object may specifically be a photo, a video, information, a file, a terminal application, and the like, and is not limited herein.
In step S103, when the verification information matches a preset verification sample, a preset access object set corresponding to the verification information is acquired.
In step S104, the corresponding preset access object set is displayed and accessed.
In some embodiments, the hidden preset access object set may be a hidden preset folder, and based on this, "acquiring the preset access object set corresponding to the verification information" (i.e., step S103) may include: and acquiring a preset folder corresponding to the verification information.
"exposing and accessing the corresponding preset access object set" (i.e., step S104) includes: and displaying and accessing the corresponding preset folder.
In some embodiments, after "matching the verification information with the preset verification sample" (i.e. step S102), the method may further include: and refusing to respond to the access request when the verification information does not match the preset verification sample.
It can be understood that the verification information carried in the access request in the embodiment of the present invention is different from the terminal unlocking information, the terminal unlocking information is used for unlocking the terminal, and the verification information carried in the access request is used for entering the display interface of the preset access object set for access.
When the input verification information is not matched with the preset verification sample, the current verification information is considered to be not matched with the preset access object set, and the right of entering the display interface of the preset access object set is not available, so that the terminal refuses to respond to the access request, such as prompting input error, or not entering the display interface of the preset access object set and not making any prompt, and the like.
As can be seen from the above, in the access method for accessing an object provided in this embodiment, when an access request carrying authentication information is received, the authentication information is matched with a preset authentication sample, where the preset authentication sample corresponds to a hidden preset access object set one by one; and then, when the verification information is matched with the preset verification sample, acquiring a preset access object set corresponding to the verification information, and displaying and accessing the corresponding preset access object set. That is, in this embodiment, first, an access object set is preset and hidden, where each hidden preset access object set corresponds to a preset verification sample one to one, and when it is determined that input verification information matches the preset verification sample, the corresponding access object set can be unhidden and displayed, so that it is ensured that privacy information in the terminal is not easily leaked, and the security of user privacy information is improved.
The method described in the above embodiments is further illustrated in detail by way of example.
In this embodiment, the most commonly used mobile terminal is taken as an example for description, since a large amount of privacy information of a user, such as short messages, pictures, address book information, and the like, is usually stored in the mobile terminal (such as a mobile phone). If a user forgets to lock the screen after using the mobile terminal and the mobile terminal is used by others, or the mobile terminal is stolen, the privacy information in the mobile terminal is easily leaked.
Based on the technical scheme, the invention provides a file hierarchical hiding scheme of the mobile terminal. Referring to fig. 2, fig. 2 is another schematic flow chart of an access method for accessing an object according to an embodiment of the present invention.
It can be understood that, in this embodiment, the access object refers to a file of the mobile terminal, and may include a photo, a video, information, a document, a terminal application, and the like, and these access objects may be stored in desktop folders, which are also called privacy folders, respectively, to form an access object set.
Wherein, the method comprises the following steps:
in step S201, the mobile terminal creates at least one privacy folder and sets the privacy folder to be hidden.
For example, a plurality of privacy folders set to be hidden are created first for storing the privacy information of the user. Then, for each privacy folder, a corresponding verification sample is set.
In this embodiment, for creating a privacy folder, the mobile terminal first obtains a plurality of files that are determined by a user and need to be hidden, and then receives a selection instruction input by the user, where the selection instruction indicates that corresponding files are selected from the plurality of files that are determined and need to be hidden to be aggregated, thereby completing creation of a privacy folder.
For example, the mobile terminal receives a creation instruction of a user, and creates a plurality of privacy folders in the terminal interface according to the creation mode.
Further, after the plurality of privacy folders are created, attribute information of "hidden/displayed" of the privacy folders is set, in this embodiment, the privacy folders are set to be hidden, that is, after the user unlocks the access terminal interface, the plurality of privacy folders are invisible.
In step S202, the mobile terminal sets a verification sample for each hidden privacy folder.
In the embodiment of the present invention, in order to improve security and facilitate multi-user use, each hidden privacy folder may be correspondingly provided with a verification sample, and the verification samples corresponding to the hidden privacy folders may be set to be the same or different, which is not specifically limited herein.
It is understood that, in the embodiment of the present invention, the verification sample may specifically include one or a combination of two or more of a fingerprint, a voice, a password, and the like, and is not specifically limited herein.
In step S203, the mobile terminal receives an access request of the hidden privacy folder, where the access request carries authentication information.
In step S204, the mobile terminal matches the authentication information with the authentication sample.
For example, when a user wants to access any hidden privacy folder, authentication information needs to be input, the terminal performs one-to-one matching on the authentication information and the authentication samples set in step S202, and when the authentication information and the authentication samples match, the user is allowed to access the hidden privacy folder corresponding to the authentication samples.
In step S205, when the verification information matches the verification sample, the mobile terminal acquires a hidden privacy folder corresponding to the verification information.
In step S206, the mobile terminal displays the corresponding hidden privacy folder, so as to access the displayed privacy folder.
For example, when the input verification information is matched with the verification sample, the authority of entering the display interface of the privacy folder can be obtained, so that the corresponding hidden privacy folder is obtained according to the matched verification sample or verification information, and the privacy folder is displayed, so that the user can conveniently enter the privacy folder and access the privacy folder.
For example, the following description is given of hierarchical hiding and access to a mobile phone privacy folder through a specific scenario, taking a mobile phone as an example:
firstly, a plurality of privacy folders are arranged on the desktop of the mobile phone, and here, four privacy folders of 'A1, A2 and B, C' are temporarily arranged, and different types of contents can be stored in the four privacy folders, and the four privacy folders can also be selectively stored according to the needs of users.
Then, the access conditions of the four privacy folders are set respectively, that is, access verification samples are set, and for example, specified operations such as passwords, fingerprints, gestures, and the like can be set. In this scenario, the mobile terminal sets the corresponding relationship of the access conditions of the four privacy folders as follows:
“A1→P1、A2→P1、B→P2、C→P3”。
wherein the former is the name of the privacy folder, and the latter is the access condition, such as the authentication password.
It is understood that each privacy folder corresponds to a verification sample, and the corresponding verification samples may be set differently or identically, which is not intended to limit the present invention.
Then, the user inputs the verification information to the mobile phone, and whether the verification information input by the user meets the above access condition can be verified through a password verification module, a fingerprint identification module or a gesture identification module of the mobile phone.
And finally, if the verification information input by the user meets the set access conditions, the mobile phone can display a corresponding privacy folder besides a general mobile phone desktop.
For example, as shown in fig. 3, the mobile phone desktop is provided with four privacy folders "a 1, a2, B, C", which are indicated by a dashed box, and the user inputs P1, so that the content displayed on the mobile phone desktop includes non-privacy content and two privacy folders a1 and a2, wherein the privacy folders may contain mobile phone applications or documents with privacy information, and the like. That is to say, the user can enter the mobile phone through different verification conditions, the purpose of displaying different contents is achieved, and the privacy information of the user is protected.
That is to say, the scheme sets different verification samples for the preset privacy folders, so as to enter different privacy folders according to the verification information matched with the verification samples, and display and access different contents.
In some embodiments, different privacy folders and privacy files can be hidden for different user identities without affecting the use of the user, so that not only is the privacy of the user ensured, but also the simplicity of the desktop of the mobile terminal is ensured. Furthermore, different privacy folder protection contents are displayed through different verification modes, so that the mobile phone privacy contents displayed by the same mobile terminal or the same person in different occasions can be different conveniently for multiple people, and the application scene is wide.
In addition, different hidden folders are set in the desktop in advance, each (or each type of) hidden privacy folder corresponds to different identification access conditions which can be different fingerprints, voices or passwords, and the access conditions are applied to the whole mobile terminal. The mobile terminal can be unlocked through different access conditions, and different hidden folders can be displayed at the same time.
As can be seen from the above, in the access method for accessing an object provided in this embodiment, when an access request carrying verification information is received, the verification information is matched with a verification sample, where the verification sample corresponds to a hidden privacy folder set one by one; and then, when the verification information is matched with the verification sample, acquiring the privacy folder corresponding to the verification information, and displaying and accessing the corresponding privacy folder. In the embodiment, the privacy folders are preset and hidden, wherein each hidden privacy folder corresponds to a verification sample one by one, and when the input verification information is determined to be matched with the verification samples, the corresponding privacy folders can be released from being hidden and displayed, so that the privacy information in the terminal is not easy to leak, and the security of the privacy information of the user is improved; meanwhile, the terminal desktop is ensured to be tidy, and the personal privacy of the user is also protected.
In order to better implement the access method for the access object provided by the embodiment of the present invention, an embodiment of the present invention further provides an apparatus and a mobile terminal based on the access method for the access object. The terms are the same as those in the above-described method for accessing an object, and details of implementation may refer to the description in the method embodiment.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an access device for accessing an object according to an embodiment of the present invention, where the access device 300 for accessing an object may include: a receiving unit 301, a matching unit 302, an obtaining unit 303 and a presenting unit 304.
The receiving unit 301 is configured to receive an access request, where the access request carries authentication information.
The matching unit 302 matches the verification information with a preset verification sample in english, where the preset verification sample corresponds to a hidden preset access object set one by one.
An obtaining unit 303, configured to obtain a preset access object set corresponding to the verification information when the verification information matches a preset verification sample.
And the presentation unit 304 is configured to present and access the corresponding preset access object set.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an access device for accessing an object according to an embodiment of the present invention, where the access device 400 may further include:
an establishing unit 305 for creating at least one access object set.
A setting unit 306, configured to set the attribute information of the access object set as an instruction to hide the access object set.
A determining unit 307, configured to determine, as a preset hidden access object set, an access object set of which the attribute information indicates that the access object set is hidden.
For example, the terminal receives a creation instruction of the user, and may create a plurality of access object sets in the terminal interface, for example, the plurality of access object sets may be presented in the form of folders.
Furthermore, after a plurality of access object sets are created, attribute information of the access object sets is set, for example, the access object sets are set to be hidden, that is, after a user unlocks and enters a terminal interface, the access object sets are invisible.
Finally, the terminal determines the plurality of invisible access object sets set as hidden preset access object sets.
In the embodiment of the present invention, in order to improve security and facilitate multi-user use, each hidden preset access object set may be correspondingly provided with a verification sample to obtain a preset verification sample, where the preset verification sample corresponds to the hidden preset access object set one by one, and the verification samples corresponding to the preset access object sets may be set to be the same or different, and are not specifically limited herein.
It is understood that, in the embodiment of the present invention, the authentication information may specifically include one or a combination of two or more of a fingerprint, a voice, a password, and the like, and is not specifically limited herein.
For example, when a user wants to access any access object set, authentication information needs to be input, the terminal matches the authentication information with a preset authentication sample, and when the authentication information matches the preset authentication sample, the user is allowed to access the corresponding preset access object set.
In some embodiments, the establishing unit 305 may include:
an obtaining subunit 3051, configured to obtain a plurality of access objects.
And the receiving subunit 3052, configured to receive a selection instruction input by the user.
The aggregation subunit 3053 is configured to aggregate the corresponding access objects according to the selection instruction, so as to generate at least one access object set.
For example, for creating an access object set, the terminal first obtains a plurality of access objects that are determined by the user and need to be hidden, and then receives a selection instruction input by the user, where the selection instruction indicates that corresponding access objects are selected from the plurality of access objects that are determined and need to be hidden to be aggregated, thereby completing the creation of an access object set.
In some embodiments, the access object set in this embodiment may be a folder, and the access object set includes at least one access object, where the access object may specifically be a photo, a video, information, a file, a terminal application, and the like, and is not limited herein.
In some embodiments, the hidden preset access object set may be a hidden preset folder, based on which the obtaining unit 303 is configured to obtain a preset folder corresponding to the verification information when the verification information matches a preset verification sample. And the display unit 304 is configured to display and access the corresponding preset folder.
In some embodiments, the access device 400 may further include: a rejecting unit 308 configured to reject to respond to the access request when the authentication information does not match a preset authentication sample.
It can be understood that the verification information carried in the access request in the embodiment of the present invention is different from the terminal unlocking information, the terminal unlocking information is used for unlocking the terminal, and the verification information carried in the access request is used for entering the display interface of the preset access object set for access.
When the input verification information is not matched with the preset verification sample, the current verification information is considered to be not matched with the preset access object set, and the right of entering the display interface of the preset access object set is not available, so that the terminal refuses to respond to the access request, such as prompting input error, or not entering the display interface of the preset access object set and not making any prompt, and the like.
In a specific implementation, the above units may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and the specific implementation of the above units may refer to the foregoing method embodiments, which are not described herein again.
The access device may be integrated in a terminal, such as a mobile phone, a tablet computer, a PDA, a desktop computer, etc.
As can be seen from the above, in the access device for accessing an object provided in this embodiment, when an access request carrying authentication information is received, the authentication information is matched with a preset authentication sample, where the preset authentication sample corresponds to a hidden preset access object set one by one; and then, when the verification information is matched with the preset verification sample, acquiring a preset access object set corresponding to the verification information, and displaying and accessing the corresponding preset access object set. That is, in this embodiment, first, an access object set is preset and hidden, where each hidden preset access object set corresponds to a preset verification sample one to one, and when it is determined that input verification information matches the preset verification sample, the corresponding access object set can be unhidden and displayed, so that it is ensured that privacy information in the terminal is not easily leaked, and the security of user privacy information is improved.
The present invention further provides a terminal, such as a mobile terminal, e.g., a tablet computer, a mobile phone, etc., please refer to fig. 6, and fig. 6 is a schematic structural diagram of the mobile terminal according to an embodiment of the present invention. The mobile terminal 500 may include: an input unit 501, a memory 502 comprising one or more computer-readable storage media, a display unit 503, a fingerprint sensor 504, an audio circuit 505, a processor 506 comprising one or more processing cores, and the like. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 6 is not intended to be limiting of mobile terminals and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The input unit 501 may be used to receive input numbers, character information, or user characteristic information (such as a fingerprint), and generate a keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control. Specifically, in one particular embodiment, input unit 501 may include a touch-sensitive surface as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 506, and can receive and execute commands sent by the processor 506. In addition, touch sensitive surfaces may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 501 may include other input devices in addition to a touch-sensitive surface. In particular, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a fingerprint recognition module, a trackball, a mouse, a joystick, and the like.
The memory 502 may be used to store applications and data. Memory 502 stores applications containing executable code. The application programs may constitute various functional modules. The processor 506 executes various functional applications and data processing by running the application programs stored in the memory 502. The memory 502 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the mobile terminal, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 502 may also include a memory controller to provide the processor 506 and the input unit 501 access to the memory 502.
The display unit 503 may be used to display information input by or provided to the user and various graphical user interfaces of the mobile terminal, which may be configured by graphics, text, icons, video, and any combination thereof. The display unit 503 may include a display panel. Alternatively, the display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface may overlay the display panel, and when a touch operation is detected on or near the touch-sensitive surface, the touch operation is transmitted to the processor 506 to determine the type of touch event, and then the processor 506 provides a corresponding visual output on the display panel according to the type of touch event. Although in FIG. 6 the touch-sensitive surface and the display panel are two separate components to implement input and output functions, in some embodiments the touch-sensitive surface may be integrated with the display panel to implement input and output functions.
The fingerprint sensor 504 is a device that enables automatic acquisition of a user's fingerprint. The fingerprint sensor 504 may be disposed under a screen on the front side of the mobile terminal, may be disposed at the rear side of the mobile terminal, or the like. The fingerprint sensor 504 may transmit the collected fingerprint information of the user to the processor 506 for analysis and comparison, or may transmit the fingerprint information to the memory 502 for storage. For example, after collecting fingerprint information of the owner of the mobile terminal, the fingerprint sensor 504 may transfer the fingerprint information to the memory 502 for storage.
The audio circuit 505 may provide an audio interface between the user and the mobile terminal through a speaker, microphone. The audio circuit 506 can convert the received audio data into an electrical signal, transmit the electrical signal to a speaker, and convert the electrical signal into a sound signal to output; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit 506 and converted into audio data, which is then processed by the audio data output processor 508, and the audio data is output to the memory 502 for further processing. The audio circuit 506 may also include an earbud jack to provide communication of a peripheral headset with the mobile terminal.
The processor 506 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing an application program stored in the memory 502 and calling data stored in the memory 502, thereby integrally monitoring the mobile terminal. Optionally, processor 506 may include one or more processing cores; preferably, the processor 506 may integrate an application processor, which mainly handles operating systems, user interfaces, applications, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 506.
Although not shown in fig. 6, the mobile terminal may further include a camera, a bluetooth module, and the like, which are not described in detail herein.
Specifically, in this embodiment, the processor 506 in the mobile terminal loads the executable code corresponding to the process of one or more application programs into the memory 502 according to the following instructions, and the processor 506 runs the application programs stored in the memory 502, thereby implementing various functions:
receiving an access request, wherein the access request carries verification information; matching the verification information with a preset verification sample, wherein the preset verification sample corresponds to a hidden preset access object set one by one; when the verification information is matched with a preset verification sample, acquiring a preset access object set corresponding to the verification information; and displaying and accessing the corresponding preset access object set.
In some embodiments, the processor 506 may also run an application program stored in the memory 502, such as to create at least one access object set prior to receiving an access request; setting attribute information of the access object set as an instruction to hide the access object set; and determining the access object set of which the attribute information indicates to hide the access object set as a hidden preset access object set.
Further, the creating at least one access object set by the processor 506 may specifically include: acquiring a plurality of access objects; receiving a selection instruction input by a user; and according to the selection instruction, aggregating the corresponding access objects to generate at least one access object set.
In some embodiments, the set of hidden preset access objects is a hidden preset folder.
Based on this, the processor 506 may also run the application program stored in the memory 502, such as obtaining the preset folder corresponding to the verification information, displaying and accessing the corresponding preset folder.
In some embodiments, after the processor 506 matches the verification information with the preset verification sample, the method may further include: and when the verification information does not match the preset verification sample, refusing to respond to the access request.
In the foregoing embodiments, the descriptions of the embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed description of the access method for accessing an object, which is not described herein again.
The access device for the access object provided in the embodiment of the present invention is, for example, a computer, a tablet computer, a mobile phone with a touch function, and the like, and the access device for the access object and the access method for the access object in the above embodiments belong to the same concept, and any method provided in the embodiment of the access method for the access object may be run on the access device for the access object, and a specific implementation process thereof is described in detail in the embodiment of the access method for the access object, and is not described herein again.
It should be noted that, for the access method for an access object according to the present invention, it can be understood by a person skilled in the art that all or part of the process of implementing the access method for an access object according to the embodiment of the present invention can be completed by controlling related hardware through a computer program, where the computer program can be stored in a computer readable storage medium, such as a memory of a mobile terminal, and executed by at least one processor in the mobile terminal, and during the execution process, the process of implementing the access method for an access object according to the present invention can be included. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
In the access device for accessing an object according to the embodiment of the present invention, each functional module may be integrated into one processing chip, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, or the like.
The foregoing describes in detail an access method, an access device, and a terminal for accessing an object, which are provided by the embodiments of the present invention, and a specific example is applied in the description to explain the principles and implementations of the present invention, and the description of the foregoing embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. An access method for accessing an object, applied to a mobile terminal, the method comprising:
receiving an access request in a screen locking state, wherein the access request carries verification information, the verification information carried in the access request is different from terminal unlocking information, and the verification information carried in the access request is used for entering a display interface of a preset access object set;
matching the verification information with a preset verification sample, wherein the preset verification sample corresponds to a hidden preset access object set one by one, in a default state, after a user unlocks and enters a terminal interface, a plurality of access object sets are invisible, and the hidden preset access object set is a hidden preset folder;
when the verification information is matched with the preset verification sample, acquiring a preset access object set corresponding to the verification information;
and displaying and accessing the corresponding hidden preset folder through the access request in the screen locking state.
2. The method of claim 1, wherein prior to receiving the access request, further comprising:
creating at least one access object set;
setting attribute information of the access object set as an instruction to hide the access object set;
and determining the access object set with the attribute information indicating to hide the access object set as a hidden preset access object set.
3. The method according to claim 2, wherein said creating at least one access object set comprises:
acquiring a plurality of access objects;
receiving a selection instruction input by a user;
and according to the selection instruction, aggregating the corresponding access objects to generate at least one access object set.
4. An access method for accessing objects according to any of claims 1 to 3, wherein the set of hidden preset access objects is a hidden preset folder;
the acquiring the preset access object set corresponding to the verification information comprises: acquiring a preset folder corresponding to the verification information;
the displaying and accessing the corresponding preset access object set comprises: and displaying and accessing the corresponding preset folder.
5. The method according to any one of claims 1 to 3, wherein after matching the authentication information with the predetermined authentication pattern, the method further comprises:
and when the verification information does not match the preset verification sample, refusing to respond to the access request.
6. An access apparatus for accessing an object, applied to a mobile terminal, the apparatus comprising:
the terminal comprises a receiving unit, a display unit and a processing unit, wherein the receiving unit is used for receiving an access request in a screen locking state, the access request carries verification information, the verification information carried in the access request is different from terminal unlocking information, and the verification information carried in the access request is used for entering a display interface of a preset access object set;
the matching unit is used for matching the verification information with preset verification samples, wherein the preset verification samples correspond to the hidden preset access object sets one by one, and the hidden preset access object sets are hidden preset folders;
an obtaining unit, configured to obtain a preset access object set corresponding to the verification information when the verification information matches the preset verification sample;
and the display unit is used for displaying and accessing the hidden preset folder through the access request in the screen locking state.
7. An access device for accessing objects according to claim 6, the device further comprising:
the establishing unit is used for establishing at least one access object set;
a setting unit, configured to set attribute information of the access object set as an instruction to hide the access object set;
and the determining unit is used for determining the access object set with the attribute information indicating that the access object set is hidden as a hidden preset access object set.
8. The apparatus for accessing an object according to claim 7, wherein the establishing unit comprises:
an acquisition subunit configured to acquire a plurality of access objects;
the receiving subunit is used for receiving a selection instruction input by a user;
and the aggregation subunit is used for aggregating the corresponding access objects according to the selection instruction to generate at least one access object set.
9. An access device for accessing objects according to any of claims 6-8, wherein the set of hidden preset access objects is a hidden preset folder;
the obtaining unit is used for obtaining a preset folder corresponding to the verification information when the verification information is matched with the preset verification sample;
the display unit is used for displaying and accessing the corresponding preset folder;
the access device further comprises: and the rejecting unit is used for rejecting to respond to the access request when the verification information is not matched with a preset verification sample.
10. A terminal, comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to perform the method of any one of claims 1 to 5.
CN201611084999.8A 2016-11-30 2016-11-30 Access method, device and terminal for access object Active CN106778296B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611084999.8A CN106778296B (en) 2016-11-30 2016-11-30 Access method, device and terminal for access object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611084999.8A CN106778296B (en) 2016-11-30 2016-11-30 Access method, device and terminal for access object

Publications (2)

Publication Number Publication Date
CN106778296A CN106778296A (en) 2017-05-31
CN106778296B true CN106778296B (en) 2020-05-12

Family

ID=58914762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611084999.8A Active CN106778296B (en) 2016-11-30 2016-11-30 Access method, device and terminal for access object

Country Status (1)

Country Link
CN (1) CN106778296B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815729A (en) * 2018-12-28 2019-05-28 北京奇安信科技有限公司 A kind of storage processing method and device of source file of auditing
CN111290746A (en) * 2020-02-13 2020-06-16 腾讯科技(深圳)有限公司 Object access method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104184900A (en) * 2014-08-28 2014-12-03 深圳市中兴移动通信有限公司 Data processing method, system and mobile terminal
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN105095790A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Hidden object view method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN104184900A (en) * 2014-08-28 2014-12-03 深圳市中兴移动通信有限公司 Data processing method, system and mobile terminal
CN105095790A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Hidden object view method and device

Also Published As

Publication number Publication date
CN106778296A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US9158907B2 (en) Alternative unlocking patterns
EP2680110B1 (en) Method and apparatus for processing multiple inputs
WO2019174611A1 (en) Application configuration method and mobile terminal
CN106778130B (en) Message display method, display device and mobile terminal
US20160227010A1 (en) Device and method for providing lock screen
US20150149925A1 (en) Emoticon generation using user images and gestures
CN104937603A (en) Terminal, unlocking method, and program
KR20100073743A (en) Apparatus and method for unlocking a locking mode of portable terminal
CN101960485A (en) Multi-context graphics processing
CN107450839A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
KR20140111790A (en) Method and apparatus for inputting keys using random valuable on virtual keyboard
CN111459358B (en) Application program control method and electronic equipment
US20180024976A1 (en) Annotation providing method and device
WO2021057301A1 (en) File control method and electronic device
CN107422860A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN111459362A (en) Information display method, information display device, electronic apparatus, and storage medium
US9672337B2 (en) Dynamic authentication
CN106778296B (en) Access method, device and terminal for access object
CN109189243B (en) Input method switching method and device and user terminal
US20140162605A1 (en) Mobile terminal and login control method thereof
US20170277395A1 (en) Control method for terminal and terminal
KR20200117183A (en) Electronic device for displaying message and operating method thereof
CN108763886B (en) Touch information processing method and device, storage medium and electronic device
CN110688035B (en) Photo album processing method, photo album processing device and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

GR01 Patent grant
GR01 Patent grant