CN106874738B - Response method for touch operation and mobile terminal - Google Patents

Response method for touch operation and mobile terminal Download PDF

Info

Publication number
CN106874738B
CN106874738B CN201710056680.2A CN201710056680A CN106874738B CN 106874738 B CN106874738 B CN 106874738B CN 201710056680 A CN201710056680 A CN 201710056680A CN 106874738 B CN106874738 B CN 106874738B
Authority
CN
China
Prior art keywords
touch operation
user
touch
application program
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710056680.2A
Other languages
Chinese (zh)
Other versions
CN106874738A (en
Inventor
靳勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710056680.2A priority Critical patent/CN106874738B/en
Publication of CN106874738A publication Critical patent/CN106874738A/en
Application granted granted Critical
Publication of CN106874738B publication Critical patent/CN106874738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a response method of touch operation and a mobile terminal, comprising the following steps: when detecting the touch operation of a user on an application program operation interface displayed on a touch display screen of a mobile terminal, judging whether the touch operation meets a trigger authentication condition, wherein the application program operation interface is displayed under the condition that first authentication information input by the user is correct; if the touch operation is judged to meet the triggering authentication condition, prompting the user to input second authentication information; and responding to the touch operation under the condition that the second authentication information input by the user is correct. The embodiment of the invention can improve the information security in the application program of the mobile terminal.

Description

Response method for touch operation and mobile terminal
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a response method of touch operation and a mobile terminal.
Background
Currently, a mobile terminal records user private information including personal identification information, photos, videos, personal files, account information on application software, and the like. The mobile terminal can ensure the safety of the information recorded in the application program of the mobile terminal by setting the authentication information. However, after the user inputs the authentication information to unlock the mobile application, the mobile terminal responds to the touch operation detected on the touch screen, and further information protection cannot be performed on the unlocked application, which results in low security of the mobile terminal.
Disclosure of Invention
The embodiment of the invention provides a response method of touch operation and a mobile terminal, which can improve the information security in an application program of the mobile terminal.
In a first aspect, an embodiment of the present invention provides a response method for touch operations, including:
when detecting that first authentication information input by a user in an application program needing to start the mobile terminal is correct, displaying an operation interface of the application program;
when the touch operation of the user on the operation interface of the application program is detected, prompting the user to input second authentication information;
and responding to the touch operation under the condition that the second authentication information input by the user is correct.
Optionally, when a touch operation of a user on an operation interface of the application program is detected, before the prompting the user to input second authentication information, the method further includes:
judging whether the touch operation meets a trigger authentication condition;
the prompting the user to input second authentication information comprises:
and if the touch operation is judged to meet the trigger authentication condition, prompting the user to input second authentication information.
Optionally, the determining whether the touch operation meets the trigger authentication condition includes:
judging whether the operation type of the touch operation belongs to a preset operation type set or not;
and if the operation type of the touch operation is judged to belong to the preset operation type set, determining that the touch operation meets the triggering authentication condition.
Optionally, the preset operation type set includes a sliding operation type, and in a case that the operation type of the touch operation is determined to be the sliding operation type, the method further includes:
judging whether a pattern formed by the operation track of the touch operation belongs to a preset track pattern or not;
and if the pattern formed by the operation track of the touch operation is judged to belong to the preset track pattern, determining that the touch operation meets the triggering authentication condition.
Optionally, the determining whether the touch operation meets the trigger authentication condition includes:
judging whether an operation object corresponding to the touch operation belongs to a preset private operation object set or not;
and if the operation object corresponding to the touch operation is judged to belong to a preset private operation object set, determining that the touch operation meets the triggering authentication condition.
Optionally, the determining whether the touch operation meets the trigger authentication condition includes:
judging whether an operation area corresponding to the touch operation belongs to a preset private operation area or not;
and if the operation area corresponding to the touch operation is judged to belong to the preset private operation area, determining that the touch operation meets the triggering authentication condition.
In a second aspect, an embodiment of the present invention provides a mobile terminal, where the mobile terminal includes a functional unit, and the functional unit is configured to perform some or all of the steps described in any method of the first aspect of the present invention.
In a third aspect, an embodiment of the present invention provides a mobile terminal, including:
the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface are connected through the communication bus and complete mutual communication;
the memory stores executable program code, the communication interface is for wireless communication;
the processor is configured to call the executable program code in the memory to perform some or all of the steps described in any of the methods of the first aspect of the embodiments of the present invention.
In the embodiment of the invention, when the first authentication information input by the user when the application program of the mobile terminal needs to be started is detected to be correct, the operation interface of the application program can be displayed. And if the touch operation of the user on the operation interface of the application program is detected, the user can be further prompted to input second authentication information. And if the second authentication information input by the user is determined to be correct, responding to the touch operation. Through the authentication of the touch operation of the user, the information security in the application program of the mobile terminal can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart illustrating a response method of touch operation according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating another response method for touch operation according to an embodiment of the disclosure;
fig. 3 is a block diagram of the components of a mobile terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile terminal disclosed in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of another mobile terminal disclosed in the embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Embodiments of the method of the present invention are described below. The method in the embodiment of the invention can be realized by the mobile terminal. The mobile terminal may be any device with communication and storage functions, for example: the system comprises intelligent equipment such as a tablet Computer, a mobile phone, an electronic reader, a remote controller, a Personal Computer (PC), a notebook Computer, vehicle-mounted equipment, a network television and wearable equipment.
Referring to fig. 1, fig. 1 is a flowchart illustrating a response method of touch operation according to an embodiment of the present invention. As shown in fig. 1, the method may include the following steps.
Step S101, when detecting that the first authentication information input by the user when the application program of the mobile terminal needs to be started is correct, displaying an operation interface of the application program.
In one embodiment, when it is detected that the first authentication information input by the user at the time of starting the application program of the mobile terminal is correct, an operation interface of the application program can be displayed. Specifically, when the mobile terminal detects that the user starts the application program, the mobile terminal can prompt the user to input first authentication information, and if the mobile terminal detects that the first authentication information input by the user is correct, the application program can be started and an operation interface of the application program is correspondingly displayed.
Step S102, when the touch operation of the user on the operation interface of the application program is detected, prompting the user to input second authentication information.
In one embodiment, after the mobile terminal starts the application program, user operation can be further authenticated, so that the security of information in the mobile terminal is improved. Specifically, when the touch operation of the user on the operation interface of the application program is detected, the user may be prompted to input the second authentication information. The user can be prompted to input the second authentication information when any touch operation of the user on the operation interface of the application program is detected, and the user can be prompted to input the second authentication information when the touch operation of the user on the operation interface of the application program is detected to meet the trigger authentication condition. For example, the touch operation is a sliding touch or a clicking touch, or the operation track or the operation time of the touch operation meets the trigger authentication condition, and the user is prompted to input the second authentication information. Wherein different application programs can set different trigger authentication conditions. Different trigger authentication conditions can be set according to the requirement of the application program on the safety degree. Here, the manner in which the touch operation satisfies the trigger authentication condition is not limited.
The first authentication information or the second authentication information in the embodiment of the present invention may include password information such as numbers and letters input by a user through a virtual keyboard or a physical keyboard, pattern information input by the user through a touch display screen, fingerprint information input by the user through a fingerprint identification module, iris information input by the user through an iris sensor, or the like. The first authentication information or the second authentication information described in the embodiment of the invention correctly represents that the authentication information input by the user is matched with the password information set by the mobile terminal. For example, if the authentication information is fingerprint information, the matching degree between the fingerprint information input by the user and the fingerprint template stored in the mobile terminal reaches a preset threshold, and it is determined that the fingerprint information matches the fingerprint template, that is, the fingerprint information input by the user is correct.
In one embodiment, the mobile terminal may display a prompt through image text or the like or prompt through voice.
Step S103, responding to the touch operation when the second authentication information input by the user is correct.
In an embodiment, in a case that the second authentication information input by the user is correct, the touch operation may be responded, that is, an operation instruction corresponding to the touch operation is executed. And if the second authentication information input by the user is incorrect, not responding to the touch operation. Optionally, the application operation interface is locked while the touch operation is not responded, and further, the owner of the mobile terminal may be simultaneously alerted, for example, the alert information is sent to the standby mobile terminal according to the standby mobile terminal information stored in the mobile terminal.
In the embodiment of the invention, when the first authentication information input by the user when the application program of the mobile terminal needs to be started is detected to be correct, the operation interface of the application program can be displayed. And if the touch operation of the user on the operation interface of the application program is detected, the user can be further prompted to input second authentication information. And if the second authentication information input by the user is determined to be correct, responding to the touch operation. Through the authentication of the touch operation of the user, the information security in the application program of the mobile terminal can be improved.
Referring to fig. 2, fig. 2 is a schematic flow chart illustrating another response method of touch operation according to an embodiment of the disclosure. As shown in fig. 2, the method may include the following steps.
Step S201, when detecting that the first authentication information input by the user in the application program of the mobile terminal is required to be started is correct, displaying an operation interface of the application program.
Step S202, when the touch operation of the user on the operation interface of the application program is detected, whether the touch operation meets the triggering authentication condition is judged.
Optionally, it is determined whether the touch operation meets the trigger authentication condition, and it may be determined whether the operation type of the touch operation belongs to a preset operation type set.
In one embodiment, when a touch operation of a user on an application program operation interface displayed on a touch display screen of a mobile terminal is detected, whether the touch operation meets a trigger authentication condition can be determined by determining whether an operation type of the touch operation belongs to a preset operation type set. The operation types of the touch operation described in the embodiment of the present invention include single click, double click, sliding, dragging, double finger expansion, double finger contraction, long press, and the like. The set of preset operation types may include at least one of the operation types described above. Different applications of the mobile terminal may be preset with different sets of operation types. If the operation type of the touch operation is judged to belong to the preset operation type set, the touch operation can be determined to meet the triggering authentication condition. For example, if the preset operation type set corresponding to the application includes a sliding operation, when it is detected that the touch operation on the application operation interface is the sliding operation, it is determined that the touch operation satisfies the trigger authentication condition, and step S203 may be further performed.
Optionally, whether the touch operation meets the trigger authentication condition may also be determined by determining whether an operation object of the touch operation belongs to a preset private operation object set. The mobile terminal can set a preset private operation object set through a system or a user. The operation object belonging to the private operation object set can be determined on the operation interface of the application program, when the operation object corresponding to the touch operation is detected to belong to the private operation object set, the touch operation can be determined to meet the triggering authentication condition, and then the user can be further prompted to input second authentication information. The operation object of the touch operation may include a control, an application icon, a hyperlink, an image or other display content on the operation interface of the application program as the operation object, which is not limited herein.
Optionally, whether the touch operation meets the trigger authentication condition may be determined by determining whether the operation area corresponding to the touch operation belongs to a preset private operation area. Specifically, the mobile terminal may preset a private operation area through a system or a user. For example, if the mobile terminal detects that the content in the upper half of the application program operation interface has a high requirement on operation security, the upper half of the application program operation interface may be set as a private operation area. If the operation area corresponding to the touch operation is judged to be the preset private operation area, the touch operation can be determined to meet the trigger authentication condition, and the user can be further prompted to input second authentication information.
Furthermore, at least two judgment modes in the judgment modes can be combined to judge whether the touch operation meets the triggering authentication condition. For example, it may be determined whether an operation area corresponding to the touch operation belongs to a preset private operation area; if the operation area of the touch operation is judged to belong to a preset private operation area, whether an operation object corresponding to the touch operation belongs to a preset private operation object set or not can be further judged; if the operation object corresponding to the touch operation is judged to belong to the preset private operation object set, whether the operation type of the touch operation belongs to the preset operation type set or not can be further judged, and if the operation type of the touch operation is judged to belong to the preset operation type set, the touch operation can be determined to meet the triggering authentication condition. For example, it may be determined whether the operation type of the touch operation belongs to a preset operation type set, and if the operation type of the touch operation belongs to the preset operation type set, it may be further determined whether an operation object corresponding to the touch operation belongs to a preset private operation object set, and if the operation object corresponding to the touch operation belongs to the preset private operation object set, it may be determined that the touch operation satisfies the trigger authentication condition. Of course, the touch operation parameter of the touch operation can be obtained, and the at least two determination methods are combined to determine whether the touch operation satisfies the trigger authentication condition. The embodiment of the present invention does not specifically limit the determination order of the determination manner.
Therefore, whether the touch operation meets the triggering authentication condition or not can be more accurately determined by combining at least two judgment modes, and misoperation of a user is avoided.
Step S203, if it is determined that the touch operation satisfies the trigger authentication condition, prompting the user to input second authentication information.
In an embodiment, if it is determined that the operation type of the touch operation belongs to the set of preset operation types, the user may be prompted to input second authentication information. Specifically, the display prompt may be performed through contents such as image and text or the voice prompt may be performed.
Optionally, when it is determined that the operation type of the touch operation belongs to the preset operation type set, the touch operation parameter of the touch operation is further determined to determine whether the touch operation satisfies the trigger authentication condition.
For example, the preset operation type set includes a sliding operation type, and when the operation type of the touch operation is determined to be the sliding operation type, it may be further determined whether a pattern formed by an operation track of the touch operation belongs to a preset track pattern. And if the pattern formed by the operation track of the touch operation is judged to belong to a preset track pattern, determining that the touch operation meets the triggering authentication condition. And under the condition that the authentication is successful, further responding to the touch operation, such as displaying hidden contents on an operation interface of an application program. Or, by determining whether the track length of the operation track of the touch operation exceeds a preset length threshold, if it is determined that the track length of the operation track of the touch operation exceeds the preset length threshold, it is determined that the touch operation satisfies the trigger authentication condition. Alternatively, the two determination methods are combined, and of course, other determination methods may be performed on the sliding operation, which are not listed here.
For another example, the preset operation type set includes a click operation type, and when the operation type of the touch operation is determined to be the click operation type, it may be further determined whether the touch pressure of the touch operation is greater than a preset pressure threshold, and if the touch pressure of the touch operation is determined to be greater than the preset pressure threshold, it is determined that the touch operation satisfies the trigger authentication condition.
For another example, the preset operation type set includes a double-click operation type, and when the operation type of the touch operation is determined to be the double-click operation type, it may be further determined whether an interval duration between two clicks of the touch operation is less than a preset first duration threshold, and if it is determined that the interval duration is less than the preset duration threshold, it is determined that the touch operation satisfies the trigger authentication condition.
For another example, the preset operation type set includes a long press operation type, and when the operation type of the touch operation is determined to be the long press operation type, it may be further determined whether the touch duration of the touch operation is greater than a preset second duration threshold, and if the touch duration of the touch operation is determined to be greater than the preset second duration threshold, it is determined that the touch operation satisfies the trigger authentication condition.
By the method, under the condition that the authentication is successful, the touch operation can be further responded, such as displaying hidden contents on an operation interface of an application program. The information security in the mobile terminal can be further improved.
Step S204, under the condition that the second authentication information input by the user is correct, responding to the touch operation.
In an embodiment, in a case that the second authentication information input by the user is correct, the touch operation may be responded, that is, an operation instruction corresponding to the touch operation is executed. The response touch operation includes but is not limited to: displaying hidden contents on the application program operation interface, switching the application program operation interface, jumping to other display interfaces, or receiving and displaying user input contents and the like. And if the second authentication information input by the user is incorrect, not responding to the touch operation. Optionally, the application operation interface is locked while the touch operation is not responded, and further, the owner of the mobile terminal may be simultaneously alerted, for example, the alert information is sent to the standby mobile terminal according to the standby mobile terminal information stored in the mobile terminal.
In the embodiment of the invention, when the first authentication information input by the user when the application program of the mobile terminal needs to be started is detected to be correct, the operation interface of the application program can be displayed. And if the touch operation of the user on the operation interface of the application program is detected, the user can be further prompted to input second authentication information. And if the second authentication information input by the user is determined to be correct, responding to the touch operation. Through the authentication of the touch operation of the user, the information security in the application program of the mobile terminal can be improved.
Embodiments of the apparatus of the present invention are described below. The device embodiments in the embodiments of the present invention are capable of performing the methods described in the above embodiments.
Referring to fig. 3, fig. 3 is a block diagram of a mobile terminal according to an embodiment of the present invention. As shown in fig. 3, the mobile terminal includes a display unit 301, a prompt unit 302, and a response unit 303.
The display unit 301 is configured to display an operation interface of an application program when it is detected that first authentication information input by a user when the user needs to start the application program of the mobile terminal is correct;
the prompting unit is used for prompting the user to input second authentication information when the touch operation of the user on the operation interface of the application program is detected;
a response unit 303, configured to respond to the touch operation when the second authentication information input by the user is correct.
Optionally, the mobile terminal further includes a determining unit 304,
the determining unit 304 is configured to, when a touch operation of a user on an operation interface of the application program is detected, determine whether the touch operation satisfies a trigger authentication condition before the prompting unit 302 prompts the user to input second authentication information;
the prompting unit 302 is further configured to:
and if the judging unit judges that the touch operation meets the trigger authentication condition, prompting the user to input second authentication information.
Optionally, the determining unit 304 is specifically configured to:
judging whether the operation type of the touch operation belongs to a preset operation type set or not;
and if the operation type of the touch operation is judged to belong to the preset operation type set, determining that the touch operation meets the triggering authentication condition.
Optionally, the preset operation type set includes a sliding operation type, and when the determining unit 304 determines that the operation type of the touch operation is the sliding operation type, the determining unit 304 is further configured to:
judging whether a pattern formed by the operation track of the touch operation belongs to a preset track pattern or not;
and if the pattern formed by the operation track of the touch operation is judged to belong to the preset track pattern, determining that the touch operation meets the triggering authentication condition.
Optionally, the determining unit 304 is specifically configured to:
judging whether an operation object corresponding to the touch operation belongs to a preset private operation object set or not;
and if the operation object corresponding to the touch operation is judged to belong to a preset private operation object set, determining that the touch operation meets the triggering authentication condition.
Optionally, the determining unit 304 is specifically configured to:
judging whether an operation area corresponding to the touch operation belongs to a preset private operation area or not;
and if the operation area corresponding to the touch operation is judged to belong to the preset private operation area, determining that the touch operation meets the triggering authentication condition.
In the embodiment of the present invention, the display unit 301, the prompt unit 302, the response unit 303, or the determination unit 304 may perform any method described in the embodiment shown in fig. 1 or fig. 2.
In the embodiment of the invention, when the first authentication information input by the user when the application program of the mobile terminal needs to be started is detected to be correct, the operation interface of the application program can be displayed. And if the touch operation of the user on the operation interface of the application program is detected, the user can be further prompted to input second authentication information. And if the second authentication information input by the user is determined to be correct, responding to the touch operation. Through the authentication of the touch operation of the user, the information security in the application program of the mobile terminal can be improved.
An embodiment of the present invention further provides another mobile terminal, as shown in fig. 4, including: a processor 101, a memory 102, a communication interface 103, a communication bus 104; the processor 101, the memory 102 and the communication interface 103 are connected through a communication bus 104 and complete mutual communication; processor 101 controls wireless communications with an external cellular network through communication interface 103; the communication interface 103 includes, but is not limited to, an antenna, an Amplifier, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. The memory 102 includes at least one of: random access memory, non-volatile memory and external memory, memory 102 having stored therein executable program code capable of directing processor 101 to perform the method specifically disclosed in the method embodiments of the present invention, comprising the steps of:
the processor 101 displays an operation interface of an application program when detecting that first authentication information input by a user in the application program needing to start the mobile terminal is correct;
when detecting the touch operation of the user on the operation interface of the application program, the processor 101 prompts the user to input second authentication information;
the processor 101 responds to the touch operation when the second authentication information input by the user is correct.
In the embodiment of the invention, when the first authentication information input by the user when the application program of the mobile terminal needs to be started is detected to be correct, the operation interface of the application program can be displayed. And if the touch operation of the user on the operation interface of the application program is detected, the user can be further prompted to input second authentication information. And if the second authentication information input by the user is determined to be correct, responding to the touch operation. Through the authentication of the touch operation of the user, the information security in the application program of the mobile terminal can be improved.
In addition, the executable program code stored in the memory 102 is also used for executing the relevant steps of the method shown in fig. 2. The details are not repeated herein.
As shown in fig. 5, for convenience of description, only the parts related to the embodiment of the present invention are shown, and details of the specific technology are not disclosed, please refer to the method part in the embodiment of the present invention. The mobile terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, and the like, taking the mobile terminal as the mobile phone as an example:
fig. 5 is a block diagram illustrating a partial structure of a mobile phone related to a mobile terminal according to an embodiment of the present invention. Referring to fig. 5, the handset includes: radio Frequency (RF) circuit 910, memory 920, input unit 930, display unit 940, sensor 950, audio circuit 960, wireless fidelity (WiFi) module 970, processor 980, and power supply 990. Those skilled in the art will appreciate that the handset configuration shown in fig. 5 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 5:
RF circuitry 910 may be used for the reception and transmission of information. In general, the RF circuit 910 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 910 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 920 may be used to store software programs and modules, and the processor 980 may execute various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 920. The memory 920 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the mobile phone, and the like. Further, the memory 920 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 930 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. In particular, input device 930 may include, but is not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, a fingerprint recognition module, and the like.
The display unit 940 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 940 may include a display screen 941, and optionally, the display screen 941 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The handset may also include at least one sensor 950, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display screen 941 according to the brightness of ambient light, and the proximity sensor may turn off the display screen 941 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 960, speaker 961, microphone 962 may provide an audio interface between a user and a cell phone. The audio circuit 960 may transmit the electrical signal converted from the received audio data to the speaker 961, and convert the electrical signal into a sound signal for output by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electrical signal, converts the electrical signal into audio data after being received by the audio circuit 960, and outputs the audio data to the processor 980 for processing, and then transmits the audio data to, for example, another mobile phone through the RF circuit 910, or outputs the audio data to the memory 920 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 970, and provides wireless broadband Internet access for the user. Although fig. 5 shows the WiFi module 970, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 980 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 920 and calling data stored in the memory 920, thereby integrally monitoring the mobile phone. Optionally, processor 980 may include one or more core processing units; preferably, the processor 980 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 980.
The handset also includes a power supply 990 (e.g., a battery) for supplying power to the various components, which may preferably be logically connected to the processor 980 via a power management system, thereby providing management of charging, discharging, and power consumption via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In any of the foregoing embodiments shown in fig. 1-2, the method flow of each step may be implemented based on the structure of the mobile phone.
In the embodiment shown in fig. 3, the functions of the units can be implemented based on the structure of the mobile phone.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium may store a program, and when the program is executed, the program includes some or all of the steps of any one of the touch operation response methods described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (5)

1. A response method for touch operation is characterized by comprising the following steps:
when detecting that first authentication information input by a user in an application program needing to start the mobile terminal is correct, displaying an operation interface of the application program;
when the touch operation of the user on the operation interface of the application program is detected, judging whether an operation area corresponding to the touch operation belongs to a preset private operation area or not;
if the operation area corresponding to the touch operation is judged to belong to the preset private operation area, the operation type of the touch operation is a sliding operation type, and a pattern formed by an operation track of the touch operation belongs to a preset track pattern, determining that the touch operation meets a trigger authentication condition;
if the touch operation is judged to meet the trigger authentication condition, prompting the user to input second authentication information;
under the condition that the second authentication information input by the user is correct, responding to the touch operation, and displaying hidden contents on an operation interface of the application program;
and if the second authentication information input by the user is incorrect, not responding to the touch operation, and simultaneously locking the operation interface of the application program.
2. The method of claim 1, wherein after determining that the operation area corresponding to the touch operation belongs to the preset private operation area, the method further comprises:
judging whether an operation object corresponding to the touch operation belongs to a preset private operation object set or not;
if it is determined that the operation area corresponding to the touch operation belongs to the preset private operation area, the operation type of the touch operation is a sliding operation type, and the pattern formed by the operation track of the touch operation belongs to a preset track pattern, determining that the touch operation satisfies the trigger authentication condition includes:
and if the operation area corresponding to the touch operation is judged to belong to the preset private operation area, the operation object corresponding to the touch operation belongs to a preset private operation object set, the operation type of the touch operation is a sliding operation type, and a pattern formed by the operation track of the touch operation belongs to a preset track pattern, determining that the touch operation meets the trigger authentication condition.
3. A mobile terminal, comprising:
the display unit is used for displaying an operation interface of the application program when detecting that first authentication information input by a user in the application program needing to start the mobile terminal is correct;
the judging unit is used for judging whether an operation area corresponding to the touch operation belongs to a preset private operation area or not when the touch operation of a user on an operation interface of the application program is detected, and if the operation area corresponding to the touch operation is judged to belong to the preset private operation area, the operation type of the touch operation is a sliding operation type, and a pattern formed by an operation track of the touch operation belongs to a preset track pattern, determining that the touch operation meets a trigger authentication condition;
the prompting unit is used for prompting the user to input second authentication information if the judging unit judges that the touch operation meets the trigger authentication condition;
the response unit is used for responding to the touch operation under the condition that the second authentication information input by the user is correct, and displaying hidden contents on the operation interface of the application program; and if the second authentication information input by the user is incorrect, not responding to the touch operation, and simultaneously locking the operation interface of the application program.
4. The mobile terminal of claim 3, wherein the determining unit is specifically configured to:
when the touch operation of a user on an operation interface of the application program is detected, judging whether an operation area corresponding to the touch operation belongs to a preset private operation area, and if the operation area corresponding to the touch operation belongs to the preset private operation area, judging whether an operation object corresponding to the touch operation belongs to a preset private operation object set;
and if the operation object corresponding to the touch operation is judged to belong to a preset private operation object set, the operation type of the touch operation is a sliding operation type, and a pattern formed by the operation track of the touch operation belongs to a preset track pattern, determining that the touch operation meets a trigger authentication condition.
5. A mobile terminal comprising a processor, a memory;
wherein the memory stores executable program code;
the processor is configured to call the executable program code in the memory to perform the method of any of claims 1-2.
CN201710056680.2A 2017-01-25 2017-01-25 Response method for touch operation and mobile terminal Active CN106874738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710056680.2A CN106874738B (en) 2017-01-25 2017-01-25 Response method for touch operation and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710056680.2A CN106874738B (en) 2017-01-25 2017-01-25 Response method for touch operation and mobile terminal

Publications (2)

Publication Number Publication Date
CN106874738A CN106874738A (en) 2017-06-20
CN106874738B true CN106874738B (en) 2020-03-17

Family

ID=59158103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710056680.2A Active CN106874738B (en) 2017-01-25 2017-01-25 Response method for touch operation and mobile terminal

Country Status (1)

Country Link
CN (1) CN106874738B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111104653B (en) * 2019-12-12 2022-03-04 中国建设银行股份有限公司 User operation processing method and device, electronic equipment and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101594350A (en) * 2008-05-26 2009-12-02 鸿富锦精密工业(深圳)有限公司 The verifying E-mail password system and method
CN104008348A (en) * 2014-04-17 2014-08-27 小米科技有限责任公司 Application program control method, application program control device and terminal
CN105426048A (en) * 2015-11-19 2016-03-23 广东欧珀移动通信有限公司 Method and device for preventing misoperation of application programs
CN105700814A (en) * 2016-02-29 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting application information and mobile terminal
CN106156586A (en) * 2016-06-30 2016-11-23 联想(北京)有限公司 A kind of control method and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101083524A (en) * 2007-06-14 2007-12-05 腾讯科技(深圳)有限公司 Method and system for encrypting and deciphering E-mail

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101594350A (en) * 2008-05-26 2009-12-02 鸿富锦精密工业(深圳)有限公司 The verifying E-mail password system and method
CN104008348A (en) * 2014-04-17 2014-08-27 小米科技有限责任公司 Application program control method, application program control device and terminal
CN105426048A (en) * 2015-11-19 2016-03-23 广东欧珀移动通信有限公司 Method and device for preventing misoperation of application programs
CN105700814A (en) * 2016-02-29 2016-06-22 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting application information and mobile terminal
CN106156586A (en) * 2016-06-30 2016-11-23 联想(北京)有限公司 A kind of control method and electronic equipment

Also Published As

Publication number Publication date
CN106874738A (en) 2017-06-20

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
EP3493056B1 (en) Information displaying method for terminal device, and terminal device
CN106951767B (en) Unlocking control method and related product
CN107194224B (en) Unlocking control method and related product
CN106302653B (en) Control authority sharing method of access control terminal and related equipment
CN107480489B (en) unlocking control method and related product
EP3299999B1 (en) Method and device for updating sequence of fingerprint templates for matching
CN107071147B (en) Parameter adjusting method and device
CN106445596B (en) Method and device for managing setting items
CN106469028B (en) A kind of data migration method and mobile terminal
CN105653220B (en) Screen data display method and device in remote control
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN108108111B (en) Method and device for checking lock screen picture information and mobile terminal
CN107908939B (en) Terminal alarm method and device and mobile terminal
CN106528638B (en) Method for deleting backup data and mobile terminal
CN107317918B (en) Parameter setting method and related product
CN106454805A (en) Data migration method and mobile terminal
CN107743108B (en) Method and device for identifying medium access control address
CN107272985B (en) Notification message processing method and related product
CN107071151B (en) Control method for physical key corresponding to home key and mobile terminal
CN107194223B (en) Fingerprint identification area display method and related product
CN106413032B (en) Hotspot establishing method and terminal equipment
CN107330374B (en) Fingerprint registration method and related product
CN106897164B (en) Fingerprint input control method and device
CN107092819B (en) Fingerprint input inspection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant