CN107015741B - User equipment with fingerprint authentication function and operation method thereof - Google Patents

User equipment with fingerprint authentication function and operation method thereof Download PDF

Info

Publication number
CN107015741B
CN107015741B CN201710205147.8A CN201710205147A CN107015741B CN 107015741 B CN107015741 B CN 107015741B CN 201710205147 A CN201710205147 A CN 201710205147A CN 107015741 B CN107015741 B CN 107015741B
Authority
CN
China
Prior art keywords
touch input
touch
response
received
identity authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710205147.8A
Other languages
Chinese (zh)
Other versions
CN107015741A (en
Inventor
王松林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201710205147.8A priority Critical patent/CN107015741B/en
Publication of CN107015741A publication Critical patent/CN107015741A/en
Application granted granted Critical
Publication of CN107015741B publication Critical patent/CN107015741B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

A user equipment having a touch area and an operating method thereof are disclosed. The method comprises the following steps: receiving a first touch input in the touch area, wherein the touch area can respond to authentication of identity authentication when touched or perform manipulation on a system or an object of user equipment; and determining a response mode to the first touch input based on the currently running application.

Description

User equipment with fingerprint authentication function and operation method thereof
Technical Field
The present disclosure relates to the field of electronic devices, and more particularly, to a user equipment having a fingerprint authentication function and an operating method thereof.
Background
With the development of technology, the functions of electronic devices become more and more abundant. However, the number of keys that can be provided on an electronic device is limited due to size limitations, and even small in number relative to functionality. One trend is that a single key can implement multiple functions, for example, a home key on a mobile phone can have functions of fingerprint authentication and gesture recognition at the same time, and the like. Gestures that may be recognized include, for example: light touch, long touch, short press, long press, left-right slide, etc. Conflicts sometimes arise between multiple functions on a single key, thereby causing misreading of the user's intent. For example, when a user slides left and right on a home key, the user may slide through an application requiring authentication but does not want to enter the application, but the device may mistakenly enter the authentication program of the application, which may seriously affect the user experience.
Therefore, there is a need for a mechanism that can resolve, or at least mitigate, the above-mentioned conflicts.
Disclosure of Invention
According to a first aspect of the present invention, there is provided a method performed in a user equipment. The user device includes a touch area. The method comprises the following steps: receiving a first touch input in the touch area, wherein the touch area can respond to authentication of identity authentication when touched or perform manipulation on a system or an object of user equipment; and determining a response mode to the first touch input based on the currently running application.
In some embodiments, determining a response mode to the first touch input based on the currently running application includes: if the currently running application needs identity authentication information, determining to delay making a response to the first touch input; and/or if the currently running application does not require identity authentication information, determining that the response to the first touch input is to perform a manipulation of a system or object of the user device.
In some embodiments, the delaying responding to the first touch input comprises: monitoring a period of time after the first touch input; if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication; and/or determining to end the response to the first touch input if the listening result indicates that another touch input is received.
In some embodiments, the listening result indicating that no other touch input is received comprises: touch to the touch area is maintained for the period of time; or, no touch is made to the touch area within the period of time.
In some embodiments, the delaying responding to the first touch input comprises: displaying a waiting window until another touch input at the touch area is received or a waiting time expires, wherein the response to the first touch input is ended if another touch input is received within the waiting time.
In some embodiments, the delaying responding to the first touch input further comprises: displaying a fingerprint authentication prompt window when another touch input is not received within the waiting time and the waiting time expires.
According to a second aspect of the present invention, a user equipment is provided. The user equipment includes: the touch area can respond to the touch area to authenticate identity authentication when being touched, or execute the operation and control of a system or an object of the user equipment; a memory storing machine executable instructions; and a processor. The processor, when executing the instructions, is configured to: receiving a first touch input in the touch area; and determining a response mode to the first touch input based on the currently running application.
In some embodiments, the processor is further configured to: if the currently running application needs identity authentication information, determining to delay making a response to the first touch input; and/or if the currently running application does not require identity authentication information, determining that the response to the first touch input is to perform a manipulation of a system or object of the user device.
In some embodiments, the processor is further configured to, in the event that it is determined that delaying the response to the first touch input: monitoring a period of time after the first touch input; if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication; and/or determining to end the response to the first touch input if the listening result indicates that another touch input is received.
In some embodiments, the listening result indicating that no other touch input is received comprises: touch to the touch area is maintained for the period of time; or, no touch is made to the touch area within the period of time.
In some embodiments, the processor is further configured to, in the event that it is determined that delaying the response to the first touch input: displaying a waiting window until another touch input at the touch area is received or a waiting time expires, wherein the response to the first touch input is ended if another touch input is received within the waiting time.
In some embodiments, the processor is further configured to: displaying a fingerprint authentication prompt window when another touch input is not received within the waiting time and the waiting time expires.
According to another aspect of the application there is provided a non-volatile storage medium storing computer-executable instructions for implementing the method as described above when executed.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
some embodiments are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings.
Fig. 1 schematically shows a flow chart of a method performed in a user equipment according to an embodiment of the invention.
Fig. 2 schematically shows a block diagram of a user equipment according to an embodiment of the invention.
Fig. 3 schematically shows a block diagram of an example implementation of a user equipment according to an embodiment of the present invention.
Fig. 4 schematically shows a flow chart of an example implementation of a method according to an embodiment of the invention.
Fig. 5 schematically illustrates a block diagram of components of a machine capable of reading instructions from a machine-readable medium and performing any one or more of the methodologies discussed herein, in accordance with an embodiment of the invention.
Fig. 6A to 6F schematically show views of a plurality of screen displays according to an embodiment of the present invention.
In the drawings, like reference numerals designate like elements.
Detailed Description
Other aspects, advantages, and salient features of the disclosure will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the disclosure.
In the present disclosure, the terms "include" and "comprise," as well as derivatives thereof, mean inclusion without limitation; the term "or" is inclusive, meaning and/or.
In this specification, the various embodiments described below which are used to describe the principles of the present disclosure are by way of illustration only and should not be construed in any way to limit the scope of the disclosure. The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of exemplary embodiments of the present disclosure as defined by the claims and their equivalents. The following description includes various specific details to aid understanding, but such details are to be regarded as illustrative only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Moreover, descriptions of well-known functions and constructions are omitted for clarity and conciseness. Moreover, throughout the drawings, the same reference numerals are used for similar functions and operations.
Fig. 1 schematically shows a flow chart of a method 100 performed by a user equipment according to an exemplary embodiment of the present invention.
A user device according to an embodiment of the invention may be, for example, a mobile phone, a laptop computer, a tablet computer, etc. The user equipment is provided with a touch area which can respond to the touch area to perform authentication of identity authentication or perform operation and control on a system or an object of the user equipment. Preferably, both a biometric acquisition device (e.g. a fingerprint device) and one or more sensors may be arranged in the touch area. The biometric acquisition device is arranged for acquiring a biometric, such as a fingerprint, for performing an authentication of an identity. The one or more sensors are arranged to detect properties of a user's touch action, such as position, starting point, sustained trajectory, pressure, duration, etc., to recognize a touch-represented gesture (e.g., tap, left-slide, right-slide, press, etc.) to perform an operation on a system or object of the user device. The correspondence between the gesture and the operation of the system or object of the user device may be predetermined, e.g., the gesture command set may be preconfigured. For example, a tap indicates that an object is launched, a left slide indicates that a previous object in the candidate list is selected, a right slide indicates that a subsequent object in the candidate list is selected, and so on. Hereinafter, a device for implementing the above-described touch region is also referred to as a UTouch device.
In some embodiments, the touch area may be, for example, a home key on a mobile phone or tablet computer, the home key having a variety of functions including, but not limited to: biometric (e.g., fingerprint) recognition functionality and gesture recognition functionality.
Alternatively or additionally, the touch area may include a key or a touch command area having various functions (e.g., biometric recognition, gesture recognition, etc.) other than the home key. The touch command area may be, for example, a specific area on a touch display screen of the user device. In some embodiments, one or more of the upper left corner, the lower left corner, the upper right corner, the lower right corner, and the central region on the touch display screen may be used as a touch command region, and have both a fingerprint recognition function and a gesture recognition function.
As shown, in step S110, a first touch input in the touch area is received.
When a user touches a touch area of the user device, the user device will receive a first touch input. Depending on the nature of the user's touch action, such as touch location, starting point and duration trajectory, pressure, duration, etc., the user device may recognize the object and the represented gesture (e.g., flick, left-swipe, right-swipe, press, etc.) to which the first touch input is directed.
After receiving the first touch input, the method proceeds to step S120, and determines a response mode for the first touch input based on the currently running application.
In some embodiments, if the currently running application does not require authentication information, it is determined that the response to the first touch input is to perform a manipulation of a system or object of the user device. The manipulation corresponding to the gesture may then be performed on the system or object of the user device directly based on the gesture represented by the first touch input.
Alternatively or additionally, embodiments of the present invention provide that if the currently running application requires authentication information, the response to the first touch input is determined to be delayed. Specifically, if the currently running application requires authentication information, the response is not immediately made, but a period of time is waited after the first touch input. And monitoring whether the user performs another touch input or not in the waiting time. If the monitoring result indicates that another touch input is not received, the response to the first touch input is determined to be authenticated. The listening result indicating that another touch input is not received may include, for example: the touch to the touch area is kept for the waiting time (for example, the user does not lift the finger after the first touch input is executed); alternatively, there is no touch to the touch area for the period of time (e.g., the user lifts a finger after performing the first touch input and then does not touch the touch area again). On the other hand, if the listening result indicates that another touch input is received, it is determined to end the response to the first touch input. Then, the another touch input may be used as the received new first touch input, and step S120 is repeated to determine a response mode for the new first touch input based on the currently running application.
In a preferred embodiment, during the waiting time for delaying the response, i.e. during listening, the user device displays a waiting window to prompt the user until another touch input at the touch area is received or the waiting time expires. If another touch input is received within the waiting time, the response to the first touch input is ended, the another touch input is regarded as a new received first touch input, and step S120 is repeated. If another touch input is not received within the waiting time and the waiting time expires, the user equipment may display a fingerprint authentication prompt window to prompt the user to perform authentication for identity authentication.
In the embodiment of the present invention, the application that needs the identity authentication information may be, for example, an application (or called a locking application) in which the user sets identity authentication, such as a payment application, a personal gallery, and the like. The application that does not require authentication information may be an application for which authentication is not set by the user, such as a map application or the like.
According to some embodiments, when a user touches such a key or touch command area having multiple functions (e.g., biometric recognition, gesture recognition, etc.), the collection of biometric information (e.g., a fingerprint) may be performed simultaneously with the gesture recognition. Alternatively, in other embodiments, the collection of biometric information (e.g., a fingerprint) may be performed after determining that the response mode is authentication without authentication, and may not be performed if the response mode is authentication without authentication.
The manner in which a response to a touch input on a key or touch command area having multiple functions is determined based on an application running at present to reduce conflicts between functions on the keys or touch command area according to an embodiment of the present invention is schematically described above with reference to fig. 1. According to the embodiment of the invention, a time delay mechanism is introduced, so that the conflict among the functions of the keys or the touch command area is further reduced.
Fig. 2 schematically shows a block diagram of a user equipment 200 according to an exemplary embodiment of the present invention.
As described previously, the user device 200 according to an embodiment of the present invention may be, for example, a mobile phone, a laptop computer, a tablet computer, or the like.
As shown, the user device 200 may include a touch unit 210 and a processing unit 220.
The touch unit 210 includes a touch area, which is capable of performing authentication for identity authentication in response to being touched or performing manipulation on a system or an object of the user equipment. Preferably, both a biometric acquisition device (e.g. a fingerprint device) and one or more sensors may be arranged in the touch area. The biometric acquisition device is arranged for acquiring a biometric, such as a fingerprint, for performing an authentication of an identity. The one or more sensors are arranged to detect properties of a user's touch action, such as position, starting point, sustained trajectory, pressure, duration, etc., to recognize a touch-represented gesture (e.g., tap, left-slide, right-slide, press, etc.) to perform an operation on a system or object of the user device. The correspondence between the gesture and the operation of the system or object of the user device may be predetermined, e.g., the gesture command set may be preconfigured. For example, a tap indicates that an object is launched, a left slide indicates that a previous object in the candidate list is selected, a right slide indicates that a subsequent object in the candidate list is selected, and so on.
In some embodiments, the touch area may be, for example, a home key on a mobile phone or tablet computer, the home key having a variety of functions including, but not limited to: biometric (e.g., fingerprint) recognition functionality and gesture recognition functionality.
Alternatively or additionally, the touch area may include a key or a touch command area having various functions (e.g., biometric recognition, gesture recognition, etc.) other than the home key. The touch command area may be, for example, a specific area on a touch display screen of the user device. In some embodiments, one or more of the upper left corner, the lower left corner, the upper right corner, the lower right corner, and the central region on the touch display screen may be used as a touch command region, and have both a fingerprint recognition function and a gesture recognition function.
The processing unit 220 is configured to perform operations of the user equipment 200. In particular, the processing unit 220 may be configured to: receiving a first touch input in a touch area; and determining a response mode to the first touch input based on the currently running application.
In some embodiments, the processing unit 220 is further configured to: if the currently running application needs identity authentication information, delaying the response to the first touch input. Alternatively or additionally, the processing unit 220 is further configured to: if the currently running application does not require identity authentication information, determining that the response to the first touch input is to perform a manipulation of a system or object of the user device.
In some embodiments, the processing unit 220 is further configured to, in case it is determined to delay making the response to the first touch input: monitoring a period of time after the first touch input. And if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication. The listening result indicating that another touch input is not received may include, for example: touch to the touch area is maintained for the period of time; or, no touch is made to the touch area within the period of time. On the other hand, if the monitoring result indicates that another touch input is received, the response to the first touch input is determined to be finished, and the response mode to the another touch input is determined.
In some embodiments, the processing unit 220 is further configured to, during the waiting period in which the response is delayed, i.e., during the listening period, instruct the display screen to display a waiting window to prompt the user until another touch input at the touch area is received or the waiting time expires. If another touch input is received within the waiting time, the display of the waiting window may be ended and the response to the first touch input may be ended, the another touch input may be taken as a new received first touch input, and a response manner to the new first touch input may be determined. If another touch input is not received within the waiting time and the waiting time expires, the displaying of the waiting window may be ended, instead, the displaying of the fingerprint authentication prompt window may be ended to prompt the user to perform authentication of the identity authentication.
It is to be appreciated that the operations of user device 200 may be performed by processing unit 220 in conjunction with other components. Processing unit 220 may be implemented individually and/or collectively in hardware, software, firmware, or virtually any combination thereof in accordance with embodiments of the present invention. Alternatively, processing unit 220 may include one or more Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), Digital Signal Processors (DSPs), or other integrated devices. Alternatively or additionally, the processing unit 220 may include a processor (or microprocessor) and one or more computer programs stored on a memory that are executable by the processor, as described in more detail below with reference to fig. 5.
The user equipment 200 may be used to perform the method 100 described above. The detailed operation of the user equipment 200 can refer to the description of the method 100, and is not described herein again.
It should be understood that user equipment 200 in fig. 2 shows only the components relevant to the present invention to avoid obscuring the present invention. However, it will be understood by those skilled in the art that, although not shown in fig. 2, the user equipment according to the embodiment of the present invention may also include other basic units constituting the user equipment, such as a display screen and the like. The processing unit of the user equipment 200 may also be configured to perform other functions of the user equipment, such as communication with other devices, etc.
According to the embodiment of the invention, the response mode of the touch input on the key or the touch command area with multiple functions is determined based on the application running at present, so that the conflict among the functions on the key or the touch command area is reduced. According to the embodiment of the invention, a time delay mechanism is introduced, so that the conflict among the functions of the keys or the touch command area is further reduced.
Fig. 3 illustrates a block diagram of an example implementation of a user device 300, according to an embodiment of the invention.
In this embodiment, the user equipment 300 may be a mobile phone or a tablet computer with a UTouch device.
As shown, the user Device 300 may include a UTouch Device (UTouch Device)310, a UTouch Event listener (UTouch Event L iterator) 322, an Activity Manager Proxy (Activity Manager Proxy)324, an application/Service Interface (App/Service Interface)326, a Windows Scheduler (Windows Scheduler)328, and an application/Service 330.
The UTouch device 310 is shown as an example implementation of the touch-sensing unit 210, which is configured to detect a touch operation by a user. When touched, the user device 300 can perform authentication for identity authentication in response, or perform manipulation of a system or object of the user device. Examples of UTouch devices are the home (home) key on a mobile phone or tablet computer. The UTouch device may include a fingerprint acquisition device and a gesture recognition device. The fingerprint acquisition device is used for acquiring the fingerprint of a finger of a user placed on the UTouch device. The gesture recognition device may be composed of one or more sensors for detecting a touch operation of a user. When the UTouch device detects the touch operation of the user, the detection result is reported to the UTouch event monitor 322, and the UTouch event monitor 322 is told to detect the UTouch event, such as a light touch, a left slide, a right slide, a press, and the like.
The UTouch event listener 322 is configured to perform listening and determining of UTouch events and processing operations of corresponding events.
The campaign manager agent 324 is configured to wrap the information of the UTouch event and notify the upper layer application of the information related to the UTouchu event. In this process, the activity manager agent 324 further processes the UTouch event reported by the UTouch event listener, for example, determines whether the UTouch event is pressed twice, a long tap, or the like, and finally determines what the UTouch event is (for example, determines whether the event is a double-click operation, or determines whether the event is a left-right swipe). In the embodiment of the present invention, the sliding left and right operation will slide the window left and right in the previously run application list, as shown in fig. 6A. When a slide left or right operation is performed, in addition to launching the corresponding application, the security center is told that an application is to be launched by invoking the application/service interface 326.
The application/service interface 326 is configured to interact with information and notify applications of information with the campaign manager agent 324.
The Windows scheduler 328 is configured to determine whether an authentication interface (e.g., fingerprint authentication) needs to be initiated, whether an authentication wait is to be initiated, and the like.
The operations performed by the application/service interface 326 and the campaign manager agent 324 are typically run independently of each other, with information interaction between the two taking place via the application/service interface 326 and the campaign manager agent 324.
Applications/services 330 represent applications on the device, such as galleries, maps, and the like.
The following describes a response flow of the user equipment 300 by taking a left-right sliding operation performed by the user on the UTouch device as an example.
Fig. 4 shows a flow chart of a response flow 400 to a left-right swipe performed on the user device 300, according to a preferred embodiment of the present invention.
The home key of the user equipment 300 is a UTouch device according to an embodiment of the present invention. The user may slide the window left or right in the list of previously run application windows by sliding left or right over the home key.
In step S411, the event listener acquires an event, for example, a slide left-right event is received. FIG. 6A shows an example of a screen display when a user slides the window left or right by sliding left or right in a list of previously-run application windows.
In step S412, it is determined whether the acquired event is a UTouch event. If it is determined in step S412 that the acquired event is a UTouch event (i.e., an event from a UTouch device), it proceeds to step S413.
In step S413, information of the UTouch event is assembled to Activity-related data, and then proceeds to step S414.
In step S414, the activity-related data is reported to an upper layer interface (e.g., application/service interface 326).
Returning to step S412, if it is determined in step S412 that the acquired event is not a UTouch event, the process proceeds directly to step S414, where the activity-related data related to the acquired event is reported to an upper layer interface (e.g., the application/service interface 326).
In step S421, the reported activity-related information is obtained.
Then, in step S422, it is determined whether the application to be started indicated by the activity-related information is a locked application (i.e., an application requiring identity authentication).
If it is determined in step S422 that the application to be started is a locked application (such as a gallery), it proceeds to step S423.
In step S423, it is determined whether the application to be started is started from the UTouch device based on the activity-related information.
If it is determined in step S423 that the application to be started is started from the UTouch device, the flow proceeds to step S424.
In step S424, a waiting window is displayed for a period of time. This time, also referred to as latency, may be, for example, 1.5 seconds. Fig. 6B shows an example of a waiting window.
In step S425, it is determined whether the waiting time has expired.
If it is determined in step S425 that the waiting time has not expired, it proceeds to step S426.
In step S426, the user is allowed to perform the operation of sliding the window left and right using UTouch. If the user inputs a new slide left and right operation using UTouch, the response to the previously received slide left and right operation is ended. This new slide left and right operation will be acquired by the event listener so that the method restarts from step S411.
If it is determined in step S425 that the waiting time has expired, it proceeds to step S427.
In step S427, a fingerprint authentication prompt window is displayed to perform authentication of identity authentication (e.g., fingerprint authentication). Fig. 6C shows an example of a fingerprint authentication prompt window. If the authentication is passed, a corresponding application (e.g., gallery application) may be launched. FIG. 6D illustrates an example of a gallery application after startup. If authentication fails, the user may be prompted to re-authenticate, as shown in FIG. 6E. If the authentication fails for a predetermined number of times, the method ends.
Returning to step S423, if it is determined in step S423 that the application to be started is not started from the UTouch device, the flow directly proceeds to step S427 where a fingerprint authentication prompt window (as shown in fig. 6C) is displayed for authentication of the identity authentication.
Returning to step S422, if it is determined in step S422 that the application to be started is not a locked application (e.g., a set application), the process proceeds to step S428.
In step S428, the corresponding application window is displayed. Fig. 6F shows an example of the displayed setting application window.
The steps in the dashed box on the left side, as shown in the dashed box in fig. 4, may be performed, for example, by the Utouch time listener 322 and the activity manager agent 324 shown in fig. 3. The steps in the dashed box on the right may be performed, for example, by the Windows scheduler 328 shown in fig. 3. Preferably, the steps in the dashed box on the left are implemented independently from the steps in the dashed box on the right, and the information interaction between the two is implemented through the interfaces (such as the application service/interface 326) of the two.
According to the embodiment, by introducing the delay mechanism, the conflict among a plurality of functions of the UTouch device can be reduced.
Fig. 5 schematically shows a block diagram of an example implementation 520 of a processing unit of the user equipment 200 according to an embodiment of the present application.
As shown in fig. 5, the processing unit 520 includes a processor 526. The processor 526 may be a single unit or a combination of units for performing various operations in the user device, including a method of responding to touch input by the user device, such as methods 100 and 400. The processing unit 520 may further include: an input unit 522 for receiving signals from other devices or components; and an output unit 524 for providing signals to other devices or components. The input unit and the output unit may be arranged as one body.
Further, as shown, the processing unit 520 also includes a memory 528, and a computer program 529 is stored in the memory 528.
Computer program 529 may include code/computer-executable instructions that, when executed by processor 526, cause processor 526 to perform an operational procedure such as the method described above in connection with fig. 1-4, and any variations thereof.
Computer program 529 can be configured to have computer program code, for example, comprising computer program modules. For example, in an example embodiment, code in computer program 529 may include one or more program modules, including for example, module 529A, module 529B, … …. These program modules are used, for example, to implement a Utouch event listener 322, an activity manager agent 324, an application/service interface 326, a Windows scheduler 328, and the like, respectively. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, which when executed by the processor 526, enable the processor 526 to execute the method flows described above with reference to fig. 1-4 and any variations thereof.
The invention has been described above in connection with preferred embodiments. According to the embodiment of the invention, by introducing a time delay mechanism, the conflict among a plurality of functions of the UTouch device can be reduced. It will be appreciated that the apparatus and methods shown above are merely exemplary. The apparatus of the invention may include more or less components than those shown. The method of the present invention is not limited to the steps or sequence shown above. Many variations and modifications may occur to those skilled in the art in light of the teachings of the illustrated embodiments.
The above-described methods, apparatuses, units and/or modules according to embodiments of the application may be implemented by a user equipment having computing capabilities executing software containing computer instructions. The system may include storage devices to implement the various storage described above. The computing-capable user equipment may include, but is not limited to, general-purpose processors, digital signal processors, special-purpose processors, reconfigurable processors, etc., capable of executing computer instructions. Execution of such instructions causes the user equipment to be configured to perform the operations described above in accordance with the present application. The above devices and/or modules may be implemented in one user equipment, or may be implemented in different user equipments. Such software may be stored in a computer readable storage medium. The computer readable storage medium stores one or more programs (software modules) comprising instructions which, when executed by one or more processors in the user equipment, cause the user equipment to perform the methods of the present application.
Such software may be stored in the form of volatile memory or non-volatile storage (such as storage devices like ROM), whether erasable or rewritable, or in the form of memory (e.g. RAM, memory chips, devices or integrated circuits), or on optically or magnetically readable media (such as CD, DVD, magnetic disks or tapes, etc.). It should be appreciated that the storage devices and storage media are embodiments of machine-readable storage suitable for storing one or more programs, the one or more programs comprising instructions, which when executed, implement embodiments of the present application. Embodiments provide a program and a machine-readable storage device storing such a program, the program comprising code for implementing an apparatus or method as claimed in any one of the claims of the present application. Further, these programs may be delivered electronically via any medium (e.g., communication signals carried via a wired connection or a wireless connection), and embodiments suitably include these programs.
The methods, apparatus, units and/or modules according to embodiments of the present application may also be implemented using hardware or firmware, such as Field Programmable Gate Arrays (FPGAs), programmable logic arrays (P L A), systems on a chip, systems on a substrate, systems on a package, Application Specific Integrated Circuits (ASICs), or any other reasonable means for integrating or packaging a circuit, or any suitable combination of three implementations, including software, hardware and firmware.
While the present application has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the application as defined by the appended claims and their equivalents. Accordingly, the scope of the present application should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (12)

1. A method performed in a user device, the user device including a touch area, the method comprising:
receiving a first touch input in the touch area, wherein the touch area can respond to authentication of identity authentication when touched or perform manipulation on a system or an object of user equipment;
determining a manner of response to the first touch input based on the currently running application,
wherein determining a manner of response to the first touch input based on the currently running application comprises:
if the currently running application needs identity authentication information, determining to delay making a response to the first touch input, and monitoring whether the user performs another touch input within the waiting time;
and if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication.
2. The method of claim 1, wherein determining a manner of response to the first touch input based on the currently running application comprises:
if the currently running application needs identity authentication information, determining to delay making a response to the first touch input; and/or
If the currently running application does not require identity authentication information, determining that the response to the first touch input is to perform a manipulation of a system or object of the user device.
3. The method of claim 2, wherein the delaying responding to the first touch input comprises:
monitoring a period of time after the first touch input;
if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication; and/or
And if the monitoring result indicates that another touch input is received, determining to end the response to the first touch input.
4. The method of claim 3, wherein the listening result indicating that no other touch input is received comprises:
touch to the touch area is maintained for the period of time; or
No touch is made to the touch area during the period of time.
5. The method of claim 2, wherein the delaying responding to the first touch input comprises:
displaying a waiting window until another touch input at the touch area is received or a waiting time expires, wherein the response to the first touch input is ended if another touch input is received within the waiting time.
6. The method of claim 5, wherein the delaying responds to the first touch input, further comprising:
displaying a fingerprint authentication prompt window when another touch input is not received within the waiting time and the waiting time expires.
7. A user equipment, the user equipment comprising:
the touch area can respond to the touch area to authenticate identity authentication when being touched, or execute the operation and control of a system or an object of the user equipment;
a memory storing machine executable instructions; and
a processor, which when executing the instructions, is configured to:
receiving a first touch input in the touch area; and
if the currently running application needs identity authentication information, determining to delay making a response to the first touch input, and monitoring whether the user performs another touch input within the waiting time;
and if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication.
8. The user equipment of claim 7, wherein the processor is further configured to:
if the currently running application needs identity authentication information, determining to delay making a response to the first touch input; and/or
If the currently running application does not require identity authentication information, determining that the response to the first touch input is to perform a manipulation of a system or object of the user device.
9. The user device of claim 8, wherein the processor is further configured to, in an instance in which it is determined to delay making a response to the first touch input:
monitoring a period of time after the first touch input;
if the monitoring result indicates that another touch input is not received, judging that the response to the first touch input is authentication for identity authentication; and/or
And if the monitoring result indicates that another touch input is received, determining to end the response to the first touch input.
10. The user device of claim 9, wherein the listening result indicating that no other touch input is received comprises:
touch to the touch area is maintained for the period of time; or
No touch is made to the touch area during the period of time.
11. The user device of claim 8, wherein the processor is further configured to, in an instance in which it is determined to delay making a response to the first touch input:
displaying a waiting window until another touch input at the touch area is received or a waiting time expires, wherein the response to the first touch input is ended if another touch input is received within the waiting time.
12. The user equipment of claim 11, wherein the processor is further configured to:
displaying a fingerprint authentication prompt window when another touch input is not received within the waiting time and the waiting time expires.
CN201710205147.8A 2017-03-30 2017-03-30 User equipment with fingerprint authentication function and operation method thereof Active CN107015741B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710205147.8A CN107015741B (en) 2017-03-30 2017-03-30 User equipment with fingerprint authentication function and operation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710205147.8A CN107015741B (en) 2017-03-30 2017-03-30 User equipment with fingerprint authentication function and operation method thereof

Publications (2)

Publication Number Publication Date
CN107015741A CN107015741A (en) 2017-08-04
CN107015741B true CN107015741B (en) 2020-07-24

Family

ID=59445665

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710205147.8A Active CN107015741B (en) 2017-03-30 2017-03-30 User equipment with fingerprint authentication function and operation method thereof

Country Status (1)

Country Link
CN (1) CN107015741B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134279B (en) * 2019-05-16 2022-05-13 Oppo广东移动通信有限公司 Control method and related product
WO2024015034A1 (en) * 2022-07-14 2024-01-18 Novayen Enerji̇ Yazilim Üreti̇m Dağitim Pazarlama Li̇mi̇ted Şi̇rketi̇ Scrollable and time sensitive six biometric key password generation and authentication machine

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105094342A (en) * 2015-09-21 2015-11-25 武汉精测电子技术股份有限公司 Sliding fingerprint identification and volume control system and method
CN105279415A (en) * 2015-10-23 2016-01-27 广东欧珀移动通信有限公司 Terminal equipment control method and control system
CN105867789A (en) * 2016-03-28 2016-08-17 努比亚技术有限公司 Method and method for preventing misoperation
CN106155514A (en) * 2015-04-23 2016-11-23 中兴通讯股份有限公司 A kind of method and apparatus realizing touch-control
CN106227446A (en) * 2016-07-21 2016-12-14 珠海市魅族科技有限公司 The control method of electronic equipment and associated electronic device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020193142A1 (en) * 2001-05-14 2002-12-19 Bengt Stavenow System and method for controlling access to personal information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106155514A (en) * 2015-04-23 2016-11-23 中兴通讯股份有限公司 A kind of method and apparatus realizing touch-control
CN105094342A (en) * 2015-09-21 2015-11-25 武汉精测电子技术股份有限公司 Sliding fingerprint identification and volume control system and method
CN105279415A (en) * 2015-10-23 2016-01-27 广东欧珀移动通信有限公司 Terminal equipment control method and control system
CN105867789A (en) * 2016-03-28 2016-08-17 努比亚技术有限公司 Method and method for preventing misoperation
CN106227446A (en) * 2016-07-21 2016-12-14 珠海市魅族科技有限公司 The control method of electronic equipment and associated electronic device

Also Published As

Publication number Publication date
CN107015741A (en) 2017-08-04

Similar Documents

Publication Publication Date Title
US10546178B2 (en) Fingerprint verification method and electronic device for performing the same
EP3312752B1 (en) Electronic device and method for acquiring fingerprint information
EP3480816B1 (en) Method for voice recognition and electronic device for performing the same
US10466830B2 (en) Electronic device and method of controlling electronic device
US10241617B2 (en) Apparatus and method for obtaining coordinate through touch panel thereof
KR102552312B1 (en) Electronic device having multiple fingerprint sensing mode and method for controlling the same
US10551987B2 (en) Multiple screen mode in mobile terminal
US9448652B2 (en) Method and terminal for activating application based on handwriting input
WO2020088167A1 (en) Application activation method, device, terminal and storage medium
KR102135160B1 (en) Information processing apparatus, information processing method and storage medium
US11073942B2 (en) Touch recognition method and electronic device executing same
US10509530B2 (en) Method and apparatus for processing touch input
EP3287922A1 (en) Unlocking control method and terminal device
JP2019504566A (en) Information image display method and apparatus
TWI675329B (en) Information image display method and device
EP3488372B1 (en) Method for protecting personal information and electronic device thereof
CN109726539B (en) Application starting method, device, terminal and storage medium
US10636398B2 (en) Wearable electronic device and method for controlling application being executed in electronic device
CN107015741B (en) User equipment with fingerprint authentication function and operation method thereof
WO2016173307A1 (en) Message copying method and device, and smart terminal
US9122390B2 (en) Method, application and/or service to collect more fine-grained or extra event data from a user sensor device
EP3249878B1 (en) Systems and methods for directional sensing of objects on an electronic device
EP3513269B1 (en) Electronic device comprising electromagnetic interference sensor
US20190244586A1 (en) Content display method and electonic device for performing same
EP3441924A1 (en) Payment method and electronic device for performing same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant