CN107480493B - Information processing method and related product - Google Patents

Information processing method and related product Download PDF

Info

Publication number
CN107480493B
CN107480493B CN201710595108.3A CN201710595108A CN107480493B CN 107480493 B CN107480493 B CN 107480493B CN 201710595108 A CN201710595108 A CN 201710595108A CN 107480493 B CN107480493 B CN 107480493B
Authority
CN
China
Prior art keywords
unlocking
mode
information
modes
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710595108.3A
Other languages
Chinese (zh)
Other versions
CN107480493A (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710595108.3A priority Critical patent/CN107480493B/en
Publication of CN107480493A publication Critical patent/CN107480493A/en
Application granted granted Critical
Publication of CN107480493B publication Critical patent/CN107480493B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an information processing method and a related product, wherein the method comprises the following steps: starting at least two unlocking modes in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information; and when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user. The embodiment of the invention can improve the safety of the terminal equipment.

Description

Information processing method and related product
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to an information processing method and a related product.
Background
With the continuous development of electronic technology, terminal devices (such as smart phones and the like) have become an indispensable part of people's lives, and people can use the terminal devices to shop, make calls, send mails, send short messages, communicate with other people for chatting, watch videos, browse webpages and the like. The more transactions that the terminal device can handle relate to the privacy of the user, the more important the security of the terminal device is, and therefore how to improve the security of the terminal device is a technical problem to be solved.
Disclosure of Invention
The embodiment of the invention provides an information processing method and a related product, which are used for improving the safety of terminal equipment.
In a first aspect, an embodiment of the present invention provides a terminal device, including a processor and a memory connected to the processor, wherein,
the processor is used for starting at least two unlocking modes in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information;
the memory is used for storing the first information;
the processor is further configured to enter a first mode when the at least two unlocking modes are both successfully unlocked, wherein when the terminal device is in the first mode, first information which needs to be hidden and is set by a user is displayed.
In a second aspect, an embodiment of the present invention provides an information processing method, including:
starting at least two unlocking modes in parallel;
parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information;
and when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user.
In a third aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes a processing unit, where:
the processing unit is used for starting at least two unlocking modes in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information; and when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user.
In a fourth aspect, an embodiment of the present invention provides a terminal device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in the method described in the second aspect of the embodiment of the present invention.
In a fifth aspect, the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in the second aspect of the present invention, and the computer includes a terminal device.
In a sixth aspect, the present invention provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps described in the second aspect of the present invention. The computer program product may be a software installation package, the computer comprising the terminal device.
In the scheme, at least two unlocking modes are started in parallel, and when the unlocking of the at least two unlocking modes is successful, the terminal equipment displays all information, so that the safety of the terminal equipment is improved.
These and other aspects of the invention are apparent from and will be elucidated with reference to the embodiments described hereinafter.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or the background art of the present invention, the drawings required to be used in the embodiments or the background art of the present invention will be described below.
Fig. 1 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
FIG. 2 is a flow chart of an information processing method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an interface provided by an embodiment of the present invention;
FIG. 4 is a flow chart illustrating another information processing method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another terminal device provided in the embodiment of the present invention;
fig. 6 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following are detailed below.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of the invention and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
A terminal device, also called a User Equipment (UE), is a device providing voice and/or data connectivity to a User, for example, a handheld device with a wireless connection function, a vehicle-mounted device, and so on. Common terminals include, for example: the mobile phone includes a mobile phone, a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), and a wearable device such as a smart watch, a smart bracelet, a pedometer, and the like.
The terminal equipment described in the embodiment of the invention is provided with a biological information acquisition device, wherein the biological information acquisition device specifically comprises a fingerprint information acquisition device, an iris information acquisition device and a face information acquisition device, wherein the fingerprint information acquisition device can be a fingerprint sensor module; the iris information acquisition device can comprise an infrared light source and an iris camera; the facial information acquisition device may be a general camera module, such as a front-facing camera.
The embodiments of the present invention will be described below with reference to the drawings.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a terminal device 100 according to an embodiment of the present invention, where the terminal device 100 includes: the mobile phone comprises a shell 10, a main board 20, a touch display screen 30, a battery 40 and an auxiliary board 50, wherein an infrared light source 21, an iris camera 22, a front camera 23, a processor 24, a memory 25, a SIM card slot 26 and the like are arranged on the main board 20, a vibrator 51, an integrated sound cavity 52, a VOOC flash charging interface 53 and a fingerprint module 54 are arranged on the auxiliary board, the infrared light source 21 and the iris camera 22 form an iris information acquisition device of the terminal equipment 100, the front camera 23 forms a facial information acquisition device of the terminal equipment 100, the fingerprint sensor module 24 forms a fingerprint information acquisition device of the terminal equipment 100, and the iris information acquisition device, the facial information acquisition device and the fingerprint information acquisition device are collectively called as a biological information acquisition device of the terminal equipment 100.
The processor 24 is configured to start at least two unlocking modes in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information;
the memory 25 is used for storing the first information;
the processor 24 is further configured to enter a first mode when the at least two unlocking manners are both successfully unlocked, where the first information that needs to be hidden and is set by the user is displayed when the terminal device is in the first mode.
In an example, the processor 24 is further configured to enter a second mode when at least one of the at least two unlocking manners is unsuccessful, where the first information is hidden when the terminal device is in the second mode.
In one example, the terminal device further comprises a biological information collecting device, and if the first information comprises an application icon, after entering the first mode,
the processor 24 is further configured to, when a click instruction set by a user as an application icon needing to be hidden is detected, acquire at least one piece of biological information that is acquired last time by the biological information acquisition device; and when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, starting the application corresponding to the application icon, and controlling the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed.
In an example, the processor 24 is further configured to, when at least one of the at least one type of biological information does not match with biological information of a specific authorizer of the terminal device, start an application corresponding to the application icon, and control the application to enter a fourth mode, where when the application is in the fourth mode, the second information is hidden.
In one example, prior to initiating at least two unlocking modes in parallel,
the processor 24 is further configured to display a prompt box, where the prompt box is used to prompt whether to display hidden information; and when a confirmation instruction input aiming at the prompt box is detected, at least two unlocking modes are started in parallel.
The embodiments of the present invention will be described below with reference to the drawings.
Referring to fig. 2, fig. 2 is a schematic flow chart of an information processing method according to an embodiment of the present invention, where the method includes the following steps:
step S201: and the terminal equipment starts at least two unlocking modes in parallel.
The unlocking mode comprises a biological unlocking mode and a common unlocking mode, wherein the biological unlocking mode comprises a fingerprint unlocking mode, an iris unlocking mode, a face unlocking mode, a palm print unlocking mode, a voiceprint unlocking mode and the like. Common unlocking modes include a digital password unlocking mode, a pattern password unlocking mode and the like.
In one example, the at least two unlocking modalities include at least one biological unlocking modality. For example, the at least two unlocking modes include a digital password unlocking mode and an iris unlocking mode. For another example, the at least two unlocking manners include a facial unlocking manner and an iris unlocking manner.
Specifically, assuming that the at least two unlocking modes include an iris unlocking mode and a face unlocking mode, specific embodiments of the terminal device for starting the at least two unlocking modes in parallel include: and the terminal equipment starts the iris unlocking mode on a first thread and starts the face unlocking mode on a second thread. And executing an action A on a first thread, wherein the action A is starting the iris unlocking mode, executing an action B on a second thread, and the action B is starting the face unlocking mode, wherein the 2 actions can be performed simultaneously or another action can be executed in the process of executing one action.
Step S202: and the terminal equipment acquires the started unlocking verification information of the at least two unlocking modes in parallel and identifies the acquired unlocking verification information in parallel.
In one example, if the at least two unlocking manners include at least one biological unlocking manner, the unlocking verification information acquired in parallel includes at least one biological information. For example, if the at least two unlocking modes include a digital password unlocking mode and an iris unlocking mode, the unlocking verification information acquired in parallel includes data password information and iris information.
In one example, the at least two unlocking modes include an iris unlocking mode and a face unlocking mode, the unlocking verification information corresponding to the iris unlocking mode is iris information, and the unlocking verification information corresponding to the face unlocking mode is face information; the specific implementation modes of the terminal device for acquiring the started unlocking verification information of the at least two unlocking modes in parallel and performing identification processing on the acquired unlocking verification information in parallel are as follows: the terminal equipment starts an iris information acquisition device on a first thread to acquire iris information and starts a face information acquisition device on a second thread to acquire face information; after the iris information is collected, the terminal equipment identifies the collected iris information on a first thread, and after the facial information is collected, the terminal equipment identifies the collected facial information on a second thread.
Further, the specific implementation manner of the terminal device performing identification processing on the acquired iris information on the first thread includes: and the terminal equipment matches the acquired iris information with the stored iris template set on the first thread.
Further, the specific implementation manner of the terminal device performing the identification processing on the collected face information on the second thread is as follows: and the terminal equipment matches the collected face information with the stored face template set on the second thread.
When the acquired iris information is matched with the iris template i and the acquired face information is matched with the face template j, the terminal equipment determines that the unlocking of the at least two unlocking modes is successful; otherwise, the terminal equipment determines that at least one unlocking failure exists in the at least two unlocking modes.
Wherein the set of iris templates includes at least one iris template, and the face template includes at least one face template.
The iris information template is an iris data template, and the iris data template is a collective image of correspondence between the positions of characteristic points of the iris of the registered user and characteristic values (the characteristic values may be capacitances, inductances, voltages, currents, relative values, and the like) of specific points.
The face information template is a face data template, and the fingerprint data template is a set of correspondence between positions of feature points of the face of the registered user and feature values of the feature points (the feature values may be capacitances, inductances, voltages, currents, relative values, and the like).
Step S203: and when the unlocking of the at least two unlocking modes is successful, the terminal equipment enters a first mode, wherein when the terminal equipment is in the first mode, first information which needs to be hidden and is set by a user is displayed.
The first information includes application icons, files, folders, photos, videos, address books, and the like.
In an example, when at least one of the at least two unlocking manners is unsuccessful, the terminal device enters a second mode, wherein the first information is hidden when the terminal device is in the second mode.
For example, it is assumed that the at least two unlocking manners include an iris unlocking manner and a face unlocking manner, the first information includes an application icon, and the application icon set by the user to be hidden includes a QQ application icon and a wechat application icon. If both the iris unlocking mode and the face unlocking mode are successfully unlocked, the terminal device enters a first mode, the terminal device can display the QQ application icon and the WeChat application icon in the first mode, if at least one of the iris unlocking mode and the face unlocking mode is not successfully unlocked, the terminal device enters a second mode, and the QQ application icon and the WeChat application icon are hidden by the terminal device in the second mode.
Therefore, in the scheme, at least two unlocking modes are started in parallel, and when the unlocking of the at least two unlocking modes is successful, the terminal equipment displays all information, so that the safety of the terminal equipment is improved.
In an example, if the first information includes an application icon, after the entering the first mode, the method further includes:
when a click instruction set as an application icon needing to be hidden by a user is detected, the terminal equipment acquires at least one piece of biological information acquired last time;
and when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, the terminal equipment starts the application corresponding to the application icon and controls the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed.
Specifically, the terminal device acquires at least one first biological information collected last time according to the current system time and the record information of the biological information. The at least one first biological information acquired last time refers to the biological information acquired by the biological information acquisition device at the time closest to the current system time. For example, the biological information recorded in the biological information recording device has 3 time biological information collected by the biological information collecting device, and the 3 time biological information has time 1, time 2 and time 3, respectively, the biological information collecting device collects fingerprint information at time 1, the biological information collecting device collects iris information and facial information at time 2, and the biological information collecting device collects iris information and facial information at time 3. Wherein, the time 2 is closest to the current system time, and then the at least one first biological information collected at the last time is the iris information and facial information input by the user at the time 2.
In one example, the at least one first biological information includes iris information and facial information, the method further comprising:
the terminal equipment matches the iris information with a stored iris template set and matches the face information with a stored face template set;
if the iris information is matched with one of the iris templates in the iris template set and the face information is matched with one of the face templates in the face template set, the terminal equipment determines that the at least one first biological information is matched with biological information of a designated authorizer of the terminal equipment;
if the iris information does not match one of the iris templates in the iris template set and/or the face information does not match one of the face templates in the face template set, the terminal device determines that at least one type of biological information in the at least one type of first biological information does not match biological information of a designated authorizer of the terminal device.
Wherein the second information comprises chat log information, contact information, favorite information, circle of friends, wallet, user information, and the like. The chat record information may be the chat records of all the contacts, the chat records of some contacts, and the like. The contact information may be information of all contacts in the address book, or may be contact information of some contacts, and the like. The collection information may be information collected by the user in the last period of time, or may be all information collected by the user, and the like.
Further, the method further comprises:
when at least one type of biological information in the at least one type of biological information is not matched with the biological information of the appointed authorizer of the terminal device, starting an application corresponding to the application icon, and controlling the application to enter a fourth mode, wherein when the application is in the fourth mode, the second information is hidden.
For example, it is assumed that at least one type of biological information collected last time includes iris information 1 and facial information 2, the first information includes an application icon, the application icon set by the user to be hidden has a QQ application icon, and the second information includes a chat record of contact a and contact information of contact a. When a click command for the QQ application icon is detected, determining whether the iris information 1 and the face information 2 match with the biological information of the designated authorizer of the terminal device, if so, starting the QQ application and controlling the QQ application to enter a third mode, and in the third mode, displaying the chat record of the contact A and the contact information of the contact A. And if the iris information 1 and the face information 2 do not match with the biological information of the appointed authorized person of the terminal equipment, starting the QQ application, and controlling the QQ application to enter a fourth mode, wherein the chat record of the contact A and the contact information of the contact A are hidden.
In one example, the input time of the at least one first biological information is less than a preset threshold from the current system time.
Further, the preset threshold is smaller than or equal to the difference between the time of last successful unlocking and the current system time.
The latest successful unlocking time refers to the time of successful unlocking closest to the current system time, for example, there are 3 times of successful unlocking in the recorded information of the unlocking time in the terminal device, where the 3 times have time 1, time 2, and time 3, respectively, where time 2 is closest to the current system time, and then the latest successful unlocking time is time 2.
For example, assume that the current system time is 12:44pm, and the time of the last successful unlock is 12:10pm, the preset threshold is less than or equal to 30 min. If the input time of the at least one first biological information is 12:10pm and the current system time is 12:44pm, the input time of the at least one first biological information is less than or equal to a preset threshold value from the current system time, and the terminal device performs the step of matching the at least one biological information with the biological information of the appointed authorizer of the terminal device. And if the input time of the at least one type of first biological information is 11:50pm and the current system time is 12:44pm, if the distance between the input time of the at least one type of first biological information and the current system time is greater than a preset threshold value and does not meet the requirement, the terminal device executes a step of starting an application corresponding to the application icon and controls the application to enter a fourth mode.
Therefore, the input time of the at least one first biological information is limited in the time period of using the terminal device this time, so that the timeliness of the at least one first biological information can be ensured, and the safety of the terminal device is further ensured.
Now, people have higher requirements for protecting personal privacy in terminal equipment, if an application icon is information which needs to be hidden and is set by a user, the application is an application related to more personal privacy, in order to prevent the problem of information leakage, when a subsequent user needs to open the application, further verification needs to be performed, the content in the application can be normally displayed after the verification is passed, otherwise, some information related to personal privacy in the application is hidden, and the security of the terminal equipment is further improved.
In an example, before the parallel initiating of at least two unlocking manners, the method further includes:
the terminal equipment displays a prompt box, wherein the prompt box is used for prompting a user whether to display hidden information;
and when the user inputs a confirmation instruction for the prompt box, the terminal equipment starts at least two unlocking modes in parallel.
Further, the method further comprises:
when the terminal equipment is in a black screen state and the terminal equipment is detected to be taken up, the terminal equipment displays a prompt box; alternatively, the first and second electrodes may be,
when the terminal equipment is in a black screen state and the operation of lightening the screen of the terminal equipment is detected, the terminal equipment displays a prompt box; alternatively, the first and second electrodes may be,
and when the terminal equipment is in a bright screen state and the terminal equipment is in an unlocked state, the terminal equipment displays a prompt box.
Whether the terminal equipment is picked up or not is detected through a gyroscope of the terminal equipment, or the terminal equipment is detected through a handheld sensor arranged on the side face of the terminal equipment.
For example, please refer to fig. 3, fig. 3 is a schematic interface diagram according to an embodiment of the present invention. When the terminal equipment is in a black screen state and the terminal equipment is detected to be taken up, the terminal equipment displays a prompt box on a screen, the prompt box prompts a user whether to display hidden information, if the user clicks 'yes', the terminal equipment starts at least two unlocking modes in parallel, and if the user clicks 'no', the terminal equipment starts one unlocking mode. For example, the most frequently used unlocking mode of the user is fingerprint unlocking, and then after the user clicks "no", the terminal device starts the fingerprint unlocking mode.
The embodiment of the present invention further provides another more detailed method flow, as shown in fig. 4, including:
step S401: the terminal equipment displays a prompt box, and the prompt box is used for prompting whether the hidden information needs to be displayed or not.
Step S402: when the fact that a confirmation instruction is input aiming at the prompt box is detected, the terminal equipment starts at least two unlocking modes in parallel, wherein the at least two unlocking modes comprise at least one biological unlocking mode.
Step S403: the terminal equipment parallelly acquires the started unlocking verification information of the at least two unlocking modes, and parallelly identifies the acquired unlocking verification information, wherein the parallelly acquired unlocking verification information comprises at least one type of biological information.
Step S404: and when the unlocking of the at least two unlocking modes is successful, the terminal equipment enters a first mode, wherein when the terminal equipment is in the first mode, first information which needs to be hidden and is set by a user is displayed. After step S404 is executed, step S406 to step S408 are executed.
Step S405: and when at least one unlocking failure exists in the at least two unlocking modes, the terminal equipment enters a second mode, wherein the first information is hidden when the terminal equipment is in the second mode.
Step S406: and if the first information comprises an application icon, when a click command set as the application icon needing to be hidden by the user is detected, the terminal equipment acquires at least one type of biological information acquired at the last time.
Step S407: and when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, the terminal equipment starts the application corresponding to the application icon and controls the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed.
Step S408: and when at least one type of biological information in the at least one type of biological information is not matched with the biological information of the appointed authorizer of the terminal device, the terminal device starts the application corresponding to the application icon and controls the application to enter a fourth mode, wherein when the application is in the fourth mode, the second information is hidden.
It should be noted that, the specific implementation of the steps of the method shown in fig. 4 can refer to the specific implementation described in the above method, and will not be described here.
The method of embodiments of the present invention is set forth above in detail and the apparatus of embodiments of the present invention is provided below.
Referring to fig. 5, fig. 5 is a terminal device 500 according to an embodiment of the present invention, including: at least one processor, at least one memory, and at least one communication interface; and one or more programs;
the one or more programs are stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps of:
starting at least two unlocking modes in parallel;
parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information;
and when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user.
In an example, the program includes instructions for further performing the steps of:
and when at least one unlocking failure exists in the at least two unlocking modes, entering a second mode, wherein the first information is hidden when the terminal equipment is in the second mode.
In an example, if the first information includes an application icon, after entering the first mode, the program includes instructions further for:
when a click command set as an application icon needing to be hidden by a user is detected, acquiring at least one piece of biological information collected at the last time;
and when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, starting the application corresponding to the application icon, and controlling the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed.
In an example, the program includes instructions for further performing the steps of:
when at least one type of biological information in the at least one type of biological information is not matched with the biological information of the appointed authorizer of the terminal device, starting an application corresponding to the application icon, and controlling the application to enter a fourth mode, wherein when the application is in the fourth mode, the second information is hidden.
In one example, prior to initiating at least two unlocking modes in parallel, the program includes instructions further for:
displaying a prompt box, wherein the prompt box is used for prompting whether the hidden information needs to be displayed or not;
and when a confirmation instruction input aiming at the prompt box is detected, at least two unlocking modes are started in parallel.
The above description has introduced the solution of the embodiment of the present invention mainly from the perspective of the method-side implementation process. It is understood that the terminal device includes hardware structures and/or software modules for performing the respective functions in order to implement the functions. Those of skill in the art will readily appreciate that the present invention can be implemented in hardware or a combination of hardware and computer software, with the exemplary elements and algorithm steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The embodiment of the present invention may perform the division of the functional units for the mobile terminal according to the method example described above, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In case of integrated units, fig. 6 shows a block diagram of a possible functional unit composition of the terminal device involved in the above embodiments. The terminal device 600 includes: a biological information acquisition unit 601, a processing unit 602, a storage unit 603, and a communication unit 604. The biological information acquisition unit 601 is used for acquiring biological information. The processing unit 602 is used for controlling and managing the actions of the terminal device, and the storage unit 603 is used for storing program codes and data of the mobile terminal. The communication unit 604 is used to support communication between the terminal device and other devices. It should be noted that the above units (the biological information acquisition unit 601, the processing unit 602, the storage unit 603, and the communication unit 604) are used for executing the relevant steps of the above method.
The processing unit 602 is configured to start at least two unlocking manners in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information; and when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user.
In an example, the processing unit 602 is further configured to enter a second mode when at least one of the at least two unlocking manners is unsuccessful, where the first information is hidden when the terminal device is in the second mode.
In one example, if the first information includes an application icon, after entering the first mode,
the processing unit 602 is further configured to, when a click instruction set by the user as an application icon that needs to be hidden is detected, acquire at least one type of biological information that is acquired last time by the biological information acquisition unit 601; and when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, starting the application corresponding to the application icon, and controlling the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed.
In an example, the processing unit 602 is further configured to, when at least one piece of biological information in the at least one piece of biological information does not match with biological information of a specific authorizer of the terminal device, start an application corresponding to the application icon and control the application to enter a fourth mode, where when the application is in the fourth mode, the second information is hidden.
In an example, before starting at least two unlocking manners in parallel, the processing unit 602 is further configured to display a prompt box, where the prompt box is used to prompt whether to display hidden information; and when a confirmation instruction input aiming at the prompt box is detected, at least two unlocking modes are started in parallel.
The processing Unit 602 may be a Processor or a controller (e.g., a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof). The biological information collecting unit 601 may be a biological information collecting device such as an iris information collecting device, a face information collecting device, a fingerprint information collecting device, etc., the storage unit 603 may be a memory, and the communication unit 602 may be a transceiver, a transceiver circuit, a radio frequency chip, a communication interface, etc.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes a terminal device.
Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as recited in the above method embodiments. The computer program product may be a software installation package, said computer comprising terminal equipment.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (9)

1. A terminal device comprising a processor and a memory coupled to the processor, wherein,
the processor is configured to: starting at least two unlocking modes in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information;
the memory is used for storing first information;
the processor is further configured to enter a first mode when the at least two unlocking modes are both successfully unlocked, wherein the first information which needs to be hidden and is set by a user is displayed when the terminal device is in the first mode;
the processor is further configured to enter a second mode when at least one of the at least two unlocking manners is unsuccessful, wherein the first information is hidden when the terminal device is in the second mode;
the terminal equipment further comprises a biological information acquisition device, if the first information comprises an application icon, after the first mode is entered, the processor is further used for acquiring at least one type of biological information acquired by the biological information acquisition device last time when a click instruction of the application icon which is set by a user to be hidden is detected; when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, starting the application corresponding to the application icon, and controlling the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed;
the first information also comprises files, folders, photos, videos and address lists;
wherein, the parallel starting at least two unlocking modes comprise: starting a first mode on a first thread and simultaneously starting a second mode on a second thread;
the method for acquiring the unlocking verification information of the at least two unlocking modes in parallel comprises the following steps: starting a first acquisition device on the first thread to acquire first unlocking verification information corresponding to the first mode, and simultaneously starting a second acquisition device on the second thread to acquire second unlocking verification information corresponding to the second mode;
the parallel identification processing of the acquired unlocking verification information comprises the following steps: identifying the collected first unlocking verification information on the first thread, and identifying the collected second unlocking verification information on the second thread; the unlocking mode comprises a biological unlocking mode and a common unlocking mode, wherein the biological unlocking mode comprises a fingerprint unlocking mode, an iris unlocking mode, a face unlocking mode, a palm print unlocking mode or a voiceprint unlocking mode; the common unlocking mode comprises a digital password unlocking mode or a pattern password unlocking mode.
2. The terminal device of claim 1,
the processor is further configured to, when at least one type of biological information in the at least one type of biological information does not match with biological information of a specific authorizer of the terminal device, start an application corresponding to the application icon and control the application to enter a fourth mode, where when the application is in the fourth mode, the second information is hidden.
3. Terminal device according to claim 1, characterized in that, before the parallel initiation of at least two unlocking modes,
the processor is further configured to display a prompt box, where the prompt box is used to prompt whether the hidden information needs to be displayed; and when a confirmation instruction input aiming at the prompt box is detected, at least two unlocking modes are started in parallel.
4. An information processing method characterized by comprising:
starting at least two unlocking modes in parallel;
parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information;
when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user;
when at least one unlocking failure exists in the at least two unlocking modes, entering a second mode, wherein the first information is hidden when the terminal equipment is in the second mode;
if the first information includes an application icon, after entering the first mode, the method further includes:
when a click command set as an application icon needing to be hidden by a user is detected, acquiring at least one piece of biological information collected at the last time;
when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, starting the application corresponding to the application icon, and controlling the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed;
the first information also comprises files, folders, photos, videos and address lists;
wherein, the parallel starting at least two unlocking modes comprise: starting a first mode on a first thread and simultaneously starting a second mode on a second thread;
the method for acquiring the unlocking verification information of the at least two unlocking modes in parallel comprises the following steps: starting a first acquisition device on the first thread to acquire first unlocking verification information corresponding to the first mode, and simultaneously starting a second acquisition device on the second thread to acquire second unlocking verification information corresponding to the second mode;
the parallel identification processing of the acquired unlocking verification information comprises the following steps: identifying the collected first unlocking verification information on the first thread, and identifying the collected second unlocking verification information on the second thread; the unlocking mode comprises a biological unlocking mode and a common unlocking mode, wherein the biological unlocking mode comprises a fingerprint unlocking mode, an iris unlocking mode, a face unlocking mode, a palm print unlocking mode or a voiceprint unlocking mode; the common unlocking mode comprises a digital password unlocking mode or a pattern password unlocking mode.
5. The method of claim 4, further comprising:
when at least one type of biological information in the at least one type of biological information is not matched with the biological information of the appointed authorizer of the terminal device, starting an application corresponding to the application icon, and controlling the application to enter a fourth mode, wherein when the application is in the fourth mode, the second information is hidden.
6. The method of claim 4, wherein prior to the concurrently initiating at least two unlocking modes, the method further comprises:
displaying a prompt box, wherein the prompt box is used for prompting whether the hidden information needs to be displayed or not;
and when a confirmation instruction input aiming at the prompt box is detected, at least two unlocking modes are started in parallel.
7. A terminal device, characterized in that the terminal device comprises a processing unit and a biological information acquisition unit, wherein:
the processing unit is configured to: starting at least two unlocking modes in parallel; parallelly acquiring unlocking verification information of the at least two started unlocking modes, and parallelly identifying the acquired unlocking verification information; when the unlocking of the at least two unlocking modes is successful, entering a first mode, wherein when the terminal equipment is in the first mode, displaying first information which needs to be hidden and is set by a user;
when at least one unlocking failure exists in the at least two unlocking modes, entering a second mode, wherein the first information is hidden when the terminal equipment is in the second mode;
if the first information comprises an application icon, after the first mode is entered, the processing unit is further used for acquiring at least one type of biological information which is acquired last time by the biological information acquisition unit when a click instruction of the application icon which is set by a user to be hidden is detected; when the at least one type of biological information is matched with the biological information of the appointed authorizer of the terminal equipment, starting the application corresponding to the application icon, and controlling the application to enter a third mode, wherein when the application is in the third mode, second information which needs to be hidden and is set by a user is displayed;
the first information comprises a return file, a folder, a photo, a video and an address book; wherein, the parallel starting at least two unlocking modes comprise: for initiating a first mode on a first thread and simultaneously initiating a second mode on a second thread;
the method for acquiring the unlocking verification information of the at least two unlocking modes in parallel comprises the following steps: starting a first acquisition device on the first thread to acquire first unlocking verification information corresponding to the first mode, and simultaneously starting a second acquisition device on the second thread to acquire second unlocking verification information corresponding to the second mode;
the parallel identification processing of the acquired unlocking verification information comprises the following steps: identifying the collected first unlocking verification information on the first thread, and identifying the collected second unlocking verification information on the second thread; the unlocking mode comprises a biological unlocking mode and a common unlocking mode, wherein the biological unlocking mode comprises a fingerprint unlocking mode, an iris unlocking mode, a face unlocking mode, a palm print unlocking mode or a voiceprint unlocking mode; the common unlocking mode comprises a digital password unlocking mode or a pattern password unlocking mode.
8. A terminal device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps of the method of any of claims 4-6.
9. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to execute the method according to any one of claims 4-6, the computer comprising a terminal device.
CN201710595108.3A 2017-07-19 2017-07-19 Information processing method and related product Expired - Fee Related CN107480493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710595108.3A CN107480493B (en) 2017-07-19 2017-07-19 Information processing method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710595108.3A CN107480493B (en) 2017-07-19 2017-07-19 Information processing method and related product

Publications (2)

Publication Number Publication Date
CN107480493A CN107480493A (en) 2017-12-15
CN107480493B true CN107480493B (en) 2020-05-05

Family

ID=60596785

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710595108.3A Expired - Fee Related CN107480493B (en) 2017-07-19 2017-07-19 Information processing method and related product

Country Status (1)

Country Link
CN (1) CN107480493B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866752A (en) * 2015-05-12 2015-08-26 广东欧珀移动通信有限公司 Application protection method and user terminal
CN105320870A (en) * 2015-10-28 2016-02-10 广东欧珀移动通信有限公司 Fingerprint unlocking method and apparatus and mobile terminal
CN105989259A (en) * 2015-03-06 2016-10-05 阿里巴巴集团控股有限公司 User identity authentication method and device as well as system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106161397A (en) * 2015-04-21 2016-11-23 富泰华工业(深圳)有限公司 There is the electronic installation of Anti-addiction function, Anti-addiction management system and method
CN104915582B (en) * 2015-05-28 2017-12-22 努比亚技术有限公司 unlocking method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989259A (en) * 2015-03-06 2016-10-05 阿里巴巴集团控股有限公司 User identity authentication method and device as well as system
CN104866752A (en) * 2015-05-12 2015-08-26 广东欧珀移动通信有限公司 Application protection method and user terminal
CN105320870A (en) * 2015-10-28 2016-02-10 广东欧珀移动通信有限公司 Fingerprint unlocking method and apparatus and mobile terminal

Also Published As

Publication number Publication date
CN107480493A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
US9904774B2 (en) Method and device for locking file
EP3104311A1 (en) Mobile terminal and control method thereof
EP3206150A1 (en) Fingerprint input information processing method, system and mobile terminal
CN106778175B (en) Interface locking method and device and terminal equipment
US9626505B2 (en) Method and apparatus for managing authentication
JP6793732B2 (en) Information image display method and equipment
CN104794382A (en) Application starting method and device
CN104866750A (en) Method and device for starting application
CN105407098A (en) Identity verification method and device
CN104732380A (en) Method and device for conducting account transfer processing
US9940448B2 (en) Unlock processing method and device
CN107832595B (en) Locking method and related equipment
CN104484593B (en) terminal verification method and device
CN107622232B (en) Unlocking control method and related product
CN107643818B (en) Function opening method and device
JP2018538608A (en) Face verification method and electronic device
CN107480998B (en) Information processing method and related product
CN112215025B (en) Radio frequency card function calling method and device
EP3428780B1 (en) Method for enabling biometric recognition pattern and related products
CN107454251B (en) Unlocking control method and related product
CN105263126A (en) Method, device and system for short message verification
CN110099167B (en) Unlocking method and device, terminal equipment and storage medium
CN107808081B (en) Reminding method and related equipment
KR102096824B1 (en) Apparatus and method for providing a security environment
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200505