CN107483716B - File control method and related product - Google Patents

File control method and related product Download PDF

Info

Publication number
CN107483716B
CN107483716B CN201710560188.9A CN201710560188A CN107483716B CN 107483716 B CN107483716 B CN 107483716B CN 201710560188 A CN201710560188 A CN 201710560188A CN 107483716 B CN107483716 B CN 107483716B
Authority
CN
China
Prior art keywords
data volume
event
current user
mobile terminal
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710560188.9A
Other languages
Chinese (zh)
Other versions
CN107483716A (en
Inventor
周意保
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710560188.9A priority Critical patent/CN107483716B/en
Publication of CN107483716A publication Critical patent/CN107483716A/en
Application granted granted Critical
Publication of CN107483716B publication Critical patent/CN107483716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The embodiment of the invention discloses a file control method and a related product. The method comprises the following steps: when a processing event aiming at a target file is detected, determining a preset data volume threshold value associated with the processing event; when the data volume of the target file is detected to be larger than the preset data volume threshold value, acquiring biological information of a current user; and when the current user is identified as the non-registered user according to the biological information, the processing event is not executed. The embodiment of the invention is beneficial to improving the security of the processing event of the mobile terminal file.

Description

File control method and related product
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a file control method and a related product.
Background
With the development of smart phones, more and more applications are installed in the mobile phones of users, and people's clothes and eating houses are inseparable from the mobile phones, such as reading, paying, playing, listening to music, and the like.
At present, a smart phone can be normally used by an unregistered user in an unlocked state, that is, a non-registered book can perform processing operations on files in the smart phone, including file browsing, file downloading, file uploading, file transferring and the like.
Disclosure of Invention
The embodiment of the invention provides a file control method and a related product, which can improve the safety and flexibility of file processing of a mobile terminal.
In a first aspect, an embodiment of the present invention provides a mobile terminal, including a biological information collecting device and a processor, where the biological information collecting device is connected to the processor,
the processor is used for determining a preset data volume threshold value associated with a processing event when the processing event aiming at the target file is detected;
the processor is further configured to acquire, by the biological information acquisition device, biological information of a current user when it is detected that the data volume of the target file is greater than the preset data volume threshold;
the processor is further configured to not execute the processing event any more when the current user is identified as a non-registered user based on the biometric information.
In a second aspect, an embodiment of the present invention provides a file control method, including:
when a processing event aiming at a target file is detected, determining a preset data volume threshold value associated with the processing event;
when the data volume of the target file is detected to be larger than the preset data volume threshold value, acquiring the biological information of the current user;
and when the current user is identified as the non-registered user according to the biological information, the processing event is not executed.
In a third aspect, an embodiment of the present invention provides a mobile terminal, including a processing unit and a collecting unit,
the processing unit is used for determining a preset data volume threshold value associated with a processing event when the processing event aiming at the target file is detected;
the processing unit is further configured to acquire, by the acquisition unit, biological information of a current user when it is detected that the data volume of the target file is greater than the preset data volume threshold;
the processing unit is further configured to not execute the processing event any more when the current user is identified as a non-registered user according to the biometric information.
In a fourth aspect, an embodiment of the present invention provides a mobile terminal, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method in the first aspect of the embodiment of the present invention.
In a fifth aspect, the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program enables a computer to perform some or all of the steps described in any one of the methods according to the first aspect of the present invention, and the computer includes a mobile terminal.
In a sixth aspect, the present invention provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps described in any one of the methods according to the first aspect of the embodiments of the present invention. The computer program product may be a software installation package, the computer comprising a mobile terminal.
It can be seen that, in the embodiment of the present invention, the mobile terminal first determines the preset data volume threshold associated with the processing event when detecting the processing event for the target file, then, the mobile terminal collects the biological information of the current user when detecting that the data volume of the target file is greater than the preset data volume threshold, and finally, the mobile terminal does not execute the processing event when identifying that the current user is an unregistered user according to the biological information. Therefore, when the processed target file is larger than the associated preset data volume threshold value, whether the current user is a registered user is judged, whether the target file needs to be processed is determined, a large amount of files in the mobile terminal are prevented from being deleted or changed in a transfer mode by non-registered users, and the use safety of the files is improved.
Drawings
Reference will now be made in brief to the accompanying drawings in which embodiments of the invention are illustrated.
Fig. 1 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a file control method according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a file control method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile terminal disclosed in the embodiment of the present invention;
fig. 5 is a block diagram of functional units of a mobile terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," and the like in the description and claims of the present invention and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The Mobile terminal according to the embodiment of the present invention may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and the like, which have wireless communication functions. For convenience of description, the above-mentioned devices are collectively referred to as a mobile terminal.
The mobile terminal described in the embodiment of the invention is provided with a biological information acquisition device, and the biological information acquisition device specifically comprises a fingerprint information acquisition device, an iris information acquisition device and a face information acquisition device, wherein the fingerprint information acquisition device can be a fingerprint sensor module, the iris information acquisition device can comprise an infrared light source and an iris camera, and the face information acquisition device can be a universal camera module, such as a front camera. The following describes embodiments of the present invention in detail.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a mobile terminal 100 according to an embodiment of the present invention, where the mobile terminal 100 includes: the mobile terminal comprises a shell, a touch display screen, a main board, a battery and an auxiliary board, wherein an infrared light source 21, an iris camera 22, a front camera 23, a processor 110, a memory 120, a SIM card slot and the like are arranged on the main board, a vibrator, an integrated sound cavity, a VOOC flash charging interface and a fingerprint module 24 are arranged on the auxiliary board, the infrared light source 21 and the iris camera 22 form an iris information acquisition device of the mobile terminal 100, the front camera 23 forms a facial information acquisition device of the mobile terminal 100, the fingerprint sensor module 24 forms a fingerprint information acquisition device of the mobile terminal 100, the iris information acquisition device, the facial information acquisition device and the fingerprint information acquisition device are collectively called as a biological information acquisition device of the mobile terminal 100, wherein,
the processor 110 is configured to determine a preset data amount threshold associated with a processing event when the processing event for the target file is detected;
the processor 110 is further configured to, when detecting that the data size of the target file is greater than the preset data size threshold, acquire, by the biological information acquisition device, biological information of a current user;
when the biological information acquisition device is an iris information acquisition device, the infrared light source 21 is used for emitting infrared light to irradiate the iris of a user to form reflected light, the iris camera 22 is used for collecting the reflected light to form an iris image, and after the processor 110 acquires the iris image, the processing procedures of iris image quality evaluation, iris region positioning (including coarse positioning and fine positioning), iris preprocessing, iris feature point extraction, iris template generation and the like are executed aiming at the iris image, and the generated iris template is the biological information.
A specific implementation of acquiring the biological information may be that the biological information acquisition device acquires a biological image of the user.
The processor 110 is further configured to not execute the processing event again when the current user is identified as a non-registered user according to the biometric information.
It can be seen that, in the embodiment of the present invention, the mobile terminal first determines the preset data volume threshold associated with the processing event when detecting the processing event for the target file, then, the mobile terminal collects the biological information of the current user when detecting that the data volume of the target file is greater than the preset data volume threshold, and finally, the mobile terminal does not execute the processing event when identifying that the current user is an unregistered user according to the biological information. Therefore, when the processed target file is larger than the associated preset data volume threshold value, whether the current user is a registered user is judged, whether the target file needs to be processed is determined, a large amount of files in the mobile terminal are prevented from being deleted or changed in a transfer mode by non-registered users, and the use safety of the files is improved.
In one possible example, in the above-mentioned aspect of acquiring the biological information of the current user, the processor 110 is specifically configured to: when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user through the biological information acquisition device; or when the distance between the current user and the mobile terminal is detected to be within a second preset distance range, the face information of the current user is acquired through the biological information acquisition device.
In one possible example, in the above-mentioned aspect of acquiring the biological information of the current user, the processor 110 is specifically configured to: when detecting that the current position of the mobile terminal is a historical use land, acquiring face information of a current user through the biological information acquisition device; and the biological information acquisition device is used for acquiring the face information and the iris information of the current user when the current position of the mobile terminal is detected to be a non-historical use place.
In one possible example, the processor 110 is further configured to switch from the unlock state to the lock state after the processing event is no longer executed; or, the target file is switched to a processing prohibition state.
In one possible example, the processing event comprises at least one of: uploading an event, downloading the event and deleting the event.
In one possible example, in the aspect of determining the preset data amount threshold associated with the processing event, the processor 110 is specifically configured to: determining the safety level corresponding to the processing event; and a preset data volume threshold value corresponding to the safety level is determined.
Referring to fig. 2, fig. 2 is a schematic flowchart of a file control method according to an embodiment of the present invention, which is applied to a mobile terminal, and as shown in the figure, the file control method includes:
s201, when the mobile terminal detects a processing event aiming at the target file, determining a preset data volume threshold value related to the processing event.
The target file may be a picture file, a video file, an audio file, an application file, and the like, which is not limited herein.
Wherein the processing event includes file uploading, such as file backup (e.g. copying file, backing up to cloud, etc.), file transmission (e.g. transmission via WiFi, transmission via mobile network, transmission via bluetooth, etc.), file processing (e.g. changing file format, adding file label, etc.),
the processing event includes file downloading, such as video downloading, audio downloading, and the like.
The processing event includes file transfer, such as file deletion.
The determination of the preset data amount threshold value related to the processing event may be performed before the processing event is executed, or may be performed during the processing event is executed.
And S202, when the mobile terminal detects that the data volume of the target file is larger than the preset data volume threshold value, acquiring the biological information of the current user.
The method comprises the steps of collecting biological information of a current user, wherein the biological information comprises any one or more of fingerprint information, iris information and face information.
S203, the mobile terminal does not execute the processing event when the current user is identified as the unregistered user according to the biometric information.
If the current user is identified to be a non-registered user before the event processing is executed, the mobile terminal does not execute the processing event, and if the current user is identified to be the non-registered user in the event processing executing process, the mobile terminal does not execute the processing event any more.
For example, when it is detected that the mobile terminal is downloading a video file, a preset data amount threshold associated with a downloading event is determined, if the threshold is 60 megabytes, if the video file is found to be greater than 60 megabytes, biometric information of a current user who executes downloading operation is acquired, biometric identification is performed on the current user, whether the current user is a registered user is judged, and if the current user is identified to be a non-registered user, a processing event of the video file is cancelled or stopped, so that other people are prevented from downloading any file at the mobile terminal without permission of the registered user, and the security of the mobile terminal is improved.
It can be seen that, in the embodiment of the present invention, the mobile terminal first determines the preset data volume threshold associated with the processing event when detecting the processing event for the target file, then, the mobile terminal collects the biological information of the current user when detecting that the data volume of the target file is greater than the preset data volume threshold, and finally, the mobile terminal does not execute the processing event when identifying that the current user is an unregistered user according to the biological information. Therefore, when the processed target file is larger than the associated preset data volume threshold value, whether the current user is a registered user is judged, whether the target file needs to be processed is determined, a large amount of files in the mobile terminal are prevented from being deleted or changed in a transfer mode by non-registered users, and the use safety of the files is improved.
In one possible example, the acquiring the biological information of the current user includes: when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user; or when the distance between the current user and the mobile terminal is detected to be within a second preset distance range, acquiring the face information of the current user.
The distance between the face of the current user and the mobile terminal is determined through a distance sensor of the mobile terminal, the first preset distance range is an iris recognition effective distance range, the second preset distance range is a face recognition effective distance range, no overlapping part exists between the first preset distance range and the second preset distance range, and the distance in the first preset distance range is smaller than the distance in the second preset distance range.
Therefore, in this example, the mobile terminal determines whether to acquire iris information or face information of the current user according to the difference in distance between the current user and the mobile terminal, and then matches the iris information of the current user with a pre-stored face information template, or matches the face information of the current user with the pre-stored face information template to determine whether the current user is a registered user, so as to determine whether to execute a processing event for a target file, which is beneficial to improving accuracy and flexibility of biometric identification.
In one possible example, the acquiring the biological information of the current user includes: when detecting that the current position of the mobile terminal is a historical use place, acquiring face information of a current user; and when detecting that the current position of the mobile terminal is a non-historical use place, acquiring the face information and the iris information of the current user.
Before collecting the biological information of the current user, judging whether the position of the mobile terminal is in a historical use place or not, if so, only collecting the face information of the current user, matching the face information with the pre-stored face information, and determining that the current user is a registered user if the matching is successful; if the current user is in a non-historical use place, the face information and the iris information of the current user need to be collected at the same time, and the current user can be determined to be a registered user only when the face information is successfully matched with the pre-stored face information template and the iris information is successfully matched with the pre-stored iris information template.
As can be seen, in this example, according to whether the mobile terminal is in the historical use area, if the mobile terminal is in the historical use area, only face recognition needs to be performed, and if the mobile terminal is in the non-historical use area, face recognition and iris recognition need to be performed at the same time, which is beneficial to improving the use safety of the mobile terminal and improving the accuracy of biometric recognition.
In one possible example, after the processing event is no longer executed, the method further includes: switching from the unlocking state to the screen locking state; or, the target file is switched to a processing prohibition state.
After the processing event is no longer executed, the mobile terminal enters a screen locking state from an unlocking state, the mobile terminal can be continuously used only after authentication is carried out and passed, namely, a non-registered user can not use the mobile terminal any more, or the state of the target file is switched from a processing state to a processing prohibition state, namely, the non-registered user can not perform any processing operation on the target file.
As can be seen, in this example, after it is determined that the current user is a non-registered user and the mobile terminal does not execute any processing event, the current user cannot use the mobile terminal any more or cannot perform any operation on the target file any more, which is beneficial to improving the security of the target file.
Referring to fig. 3, fig. 3 is a flowchart illustrating a file control method according to an embodiment of the present invention, and the file control method is applied to a mobile terminal. As shown, the control method of this document includes:
s301, when detecting a processing event aiming at a target file, the mobile terminal determines a security level corresponding to the processing event.
For example, when the processing event includes an upload event, a download event, and a delete event, different events may correspond to different security levels. For example, the security level is a deletion event, an upload event, and a download event in order from high to low.
And S302, the mobile terminal determines a preset data volume threshold corresponding to the security level.
Different preset data volume thresholds correspond to different processing events, for example, the preset data volume threshold of a deletion event is 20 megabits, the preset data volume threshold of an upload event is 40 megabits, and the data volume threshold of a download event is 60 megabits, and after a current processing event is determined, the corresponding preset data volume threshold can be determined.
The registered user can set a smaller preset data volume threshold for the processing event with high security level so as to improve the possibility of carrying out biological identification on the current user.
And S303, when the mobile terminal detects that the data volume of the target file is larger than the preset data volume threshold value, acquiring the biological information of the current user.
S304, when the mobile terminal identifies the current user as a non-registered user according to the biometric information, the mobile terminal does not execute the processing event.
It can be seen that, in the embodiment of the present invention, the mobile terminal first determines, when detecting a processing event for a target file, a security level corresponding to the processing event, and determines a preset data amount threshold corresponding to the security level, and then, when detecting that the data amount of the target file is greater than the preset data amount threshold, the mobile terminal collects biological information of a current user, and finally, when identifying that the current user is an unregistered user according to the biological information, the mobile terminal does not execute the processing event. Therefore, when the processed target file is larger than the associated preset data volume threshold value, whether the current user is a registered user is judged, whether the target file needs to be processed is determined, a large amount of files in the mobile terminal are prevented from being deleted or changed in a transfer mode by non-registered users, and the use safety of the files is improved.
In addition, the mobile terminal determines a preset data volume threshold value associated with the processing event according to the difference of the processing event, and then judges whether the biological information of the current user is collected, so that the flexibility of biological identification is improved.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, which is consistent with the embodiments shown in fig. 2 and fig. 3, as shown in the figure, the mobile terminal includes: a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the following steps;
when a processing event aiming at a target file is detected, determining a preset data volume threshold value associated with the processing event;
when the data volume of the target file is detected to be larger than the preset data volume threshold value, acquiring the biological information of the current user;
and when the current user is identified as the non-registered user according to the biological information, the processing event is not executed.
It can be seen that, in the embodiment of the present invention, the mobile terminal first determines the preset data volume threshold associated with the processing event when detecting the processing event for the target file, then, the mobile terminal collects the biological information of the current user when detecting that the data volume of the target file is greater than the preset data volume threshold, and finally, the mobile terminal does not execute the processing event when identifying that the current user is an unregistered user according to the biological information. Therefore, when the processed target file is larger than the associated preset data volume threshold value, whether the current user is a registered user is judged, whether the target file needs to be processed is determined, a large amount of files in the mobile terminal are prevented from being deleted or changed in a transfer mode by non-registered users, and the use safety of the files is improved.
In one possible example, in the above-mentioned aspect of acquiring the biometric information of the current user, the instructions in the above-mentioned program are specifically configured to: when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user; or when the distance between the current user and the mobile terminal is detected to be within a second preset distance range, acquiring the face information of the current user.
In one possible example, in the above-mentioned aspect of acquiring the biometric information of the current user, the instructions in the above-mentioned program are specifically configured to: when detecting that the current position of the mobile terminal is a historical use place, acquiring face information of a current user; and when detecting that the current position of the mobile terminal is a non-historical use place, acquiring the face information and the iris information of the current user.
In one possible example, the program further includes instructions for performing the steps of: after the processing event is not executed, switching from an unlocking state to a screen locking state; or, the target file is switched to a processing prohibition state.
In one possible example, the processing event comprises at least one of: uploading an event, downloading the event and deleting the event.
In one possible example, in the determining of the preset data volume threshold associated with the processing event, the instructions in the program are specifically configured to: determining the safety level corresponding to the processing event; and a preset data volume threshold value corresponding to the safety level is determined.
The above description has introduced the solution of the embodiment of the present invention mainly from the perspective of the method-side implementation process. It is understood that the mobile terminal includes hardware structures and/or software modules for performing the respective functions in order to implement the above-described functions. Those of skill in the art will readily appreciate that the present invention can be implemented in hardware or a combination of hardware and computer software, with the exemplary elements and algorithm steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The embodiment of the present invention may perform the division of the functional units for the mobile terminal according to the method example described above, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In case of an integrated unit, fig. 5 shows a block diagram of one possible functional unit composition of the mobile terminal involved in the above embodiment. The mobile terminal 500 includes: a processing unit 502 and a communication unit 403. Processing unit 502 is configured to control and manage the actions of the mobile terminal, e.g., processing unit 502 is configured to support the mobile terminal to perform steps S201-S203 in fig. 2, steps S301-S304 in fig. 3, and/or other processes for the techniques described herein. The communication unit 403 is used for supporting communication between the mobile terminal and other devices. The mobile terminal may further include a storage unit 501 for storing program codes and data of the mobile terminal.
The processing unit 502 is configured to determine a preset data amount threshold associated with a processing event when the processing event for a target file is detected; and is used for collecting the biological information of the current user through the communication unit 403 when detecting that the data volume of the target file is greater than the preset data volume threshold; and the processing unit is used for not executing the processing event when the current user is identified as the non-registered user according to the biological information.
In one possible example, in the above-mentioned aspect of acquiring the biological information of the current user, the processing unit 502 is specifically configured to: when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user; and the face information acquisition module is used for acquiring the face information of the current user when the distance between the current user and the mobile terminal is detected to be within a second preset distance range.
In one possible example, in the above-mentioned aspect of acquiring the biological information of the current user, the processing unit 502 is specifically configured to: when detecting that the current position of the mobile terminal is a historical use place, acquiring face information of a current user; and the mobile terminal is used for collecting the face information and the iris information of the current user when detecting that the current position of the mobile terminal is a non-historical use place.
In a possible example, after the processing event is no longer executed, the processing unit 502 is further configured to switch from the unlock state to the lock state; and switching the target file to a processing disabled state.
In a possible example, in terms of the determining the preset data amount threshold associated with the processing event, the processing unit 502 is specifically configured to: determining the safety level corresponding to the processing event; and a preset data volume threshold value corresponding to the safety level is determined.
The processing unit 502 may be a processor or a controller, the communication unit 403 may be a biological information acquisition device, such as an iris information acquisition device, a face information acquisition device, a fingerprint information acquisition device, and the like, and the storage unit 501 may be a memory.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes a mobile terminal.
Embodiments of the present invention also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising a mobile terminal.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above methods according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (12)

1. A mobile terminal is characterized by comprising a biological information acquisition device and a processor, wherein the biological information acquisition device is connected with the processor,
the processor is used for determining a preset data volume threshold value associated with a processing event when the processing event for a target file is detected, wherein the processing event comprises at least one of the following: uploading an event, downloading the event and deleting the event;
the determining the preset data volume threshold associated with the processing event comprises: the processor determines a security level corresponding to the processing event and is used for determining a preset data volume threshold corresponding to the security level, wherein different processing events correspond to different preset data volume thresholds, the preset data volume threshold of the deletion event is smaller than the preset data volume threshold of the upload event, the preset data volume threshold of the upload event is smaller than the data volume threshold of the download event, the preset data volume threshold corresponding to the processing event at a high security level is smaller, and the data volume is the number of data corresponding to the processing event;
the processor is further configured to acquire biological information of a current user through the biological information acquisition device when detecting that the data volume of the target file is greater than the preset data volume threshold;
the processor is further configured to not execute the processing event any more when the current user is identified as a non-registered user based on the biometric information.
2. The mobile terminal of claim 1, wherein in said collecting biometric information of the current user, the processor is specifically configured to:
when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user through the biological information acquisition device;
or when the distance between the current user and the mobile terminal is detected to be within a second preset distance range, acquiring the face information of the current user through the biological information acquisition device.
3. The mobile terminal of claim 1, wherein in said collecting biometric information of the current user, the processor is specifically configured to:
when the current position of the mobile terminal is detected to be a historical use land, acquiring face information of a current user through the biological information acquisition device; and
and the biological information acquisition device is used for acquiring the face information and the iris information of the current user when the current position of the mobile terminal is detected to be a non-historical use place.
4. The mobile terminal according to any of claims 1 to 3, wherein the processor is further configured to switch from the unlock state to the lock state after the processing event is no longer executed; alternatively, the first and second electrodes may be,
and switching the target file into a processing prohibition state.
5. A file control method, comprising:
when a processing event aiming at a target file is detected, determining a preset data volume threshold value associated with the processing event, wherein the processing event comprises at least one of the following: uploading an event, downloading the event and deleting the event;
the determining the preset data volume threshold associated with the processing event comprises: the processor determines a security level corresponding to the processing event and is used for determining a preset data volume threshold corresponding to the security level, wherein different processing events correspond to different preset data volume thresholds, the preset data volume threshold of the deletion event is smaller than the preset data volume threshold of the upload event, the preset data volume threshold of the upload event is smaller than the data volume threshold of the download event, the preset data volume threshold corresponding to the processing event at a high security level is smaller, and the data volume is the number of data corresponding to the processing event;
when the data volume of the target file is detected to be larger than the preset data volume threshold value, acquiring biological information of a current user;
and when the current user is identified as the non-registered user according to the biological information, the processing event is not executed.
6. The method of claim 5, wherein the collecting the current user's biometric information comprises:
when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user; alternatively, the first and second electrodes may be,
and when the distance between the current user and the mobile terminal is detected to be within a second preset distance range, acquiring the face information of the current user.
7. The method of claim 5, wherein the collecting the current user's biometric information comprises:
when the current position of the mobile terminal is detected to be a historical use place, acquiring face information of a current user;
and when detecting that the current position of the mobile terminal is a non-historical use place, acquiring the face information and the iris information of the current user.
8. The method of any of claims 5 to 7, wherein after said processing event is no longer performed, the method further comprises:
switching from the unlocking state to the screen locking state; alternatively, the first and second electrodes may be,
and switching the target file into a processing prohibition state.
9. A mobile terminal is characterized by comprising a processing unit and an acquisition unit,
the processing unit is configured to, when a processing event for a target file is detected, determine a preset data volume threshold associated with the processing event, where the processing event includes at least one of: uploading an event, downloading the event and deleting the event;
the determining the preset data volume threshold associated with the processing event comprises: the processor determines a security level corresponding to the processing event and is used for determining a preset data volume threshold corresponding to the security level, wherein different processing events correspond to different preset data volume thresholds, the preset data volume threshold of the deletion event is smaller than the preset data volume threshold of the upload event, the preset data volume threshold of the upload event is smaller than the data volume threshold of the download event, the preset data volume threshold corresponding to the processing event at a high security level is smaller, and the data volume is the number of data corresponding to the processing event;
the processing unit is further used for acquiring biological information of the current user through the acquisition unit when the data volume of the target file is detected to be larger than the preset data volume threshold;
the processing unit is further configured to not execute the processing event any more when the current user is identified as the non-registered user according to the biological information.
10. The mobile terminal according to claim 9, wherein in the aspect of collecting the biometric information of the current user, the processing unit is specifically configured to: when the distance between the current user and the mobile terminal is detected to be within a first preset distance range, acquiring iris information of the current user through the acquisition unit; or when the distance between the current user and the mobile terminal is detected to be within a second preset distance range, acquiring the face information of the current user through the acquisition unit.
11. A mobile terminal comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory, and wherein the programs, when executed by the processor, implement the steps of the method of any of claims 5-8.
12. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program, when executed by a processor, implements the steps of the method of any one of claims 5-8.
CN201710560188.9A 2017-07-11 2017-07-11 File control method and related product Active CN107483716B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710560188.9A CN107483716B (en) 2017-07-11 2017-07-11 File control method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710560188.9A CN107483716B (en) 2017-07-11 2017-07-11 File control method and related product

Publications (2)

Publication Number Publication Date
CN107483716A CN107483716A (en) 2017-12-15
CN107483716B true CN107483716B (en) 2020-05-05

Family

ID=60596243

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710560188.9A Active CN107483716B (en) 2017-07-11 2017-07-11 File control method and related product

Country Status (1)

Country Link
CN (1) CN107483716B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737649A (en) * 2018-05-10 2018-11-02 Oppo广东移动通信有限公司 A kind of method, apparatus and computer storage media sending file

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373528A (en) * 2007-08-21 2009-02-25 联想(北京)有限公司 Electronic payment system, device and method based on position authentication
CN104933344A (en) * 2015-07-06 2015-09-23 北京中科虹霸科技有限公司 Mobile terminal user identity authentication device and method based on multiple biological feature modals
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN106778132A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 The control method of file process, device and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8528064B2 (en) * 2007-06-22 2013-09-03 Springo Incorporated Web based system that allows users to log into websites without entering username and password information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101373528A (en) * 2007-08-21 2009-02-25 联想(北京)有限公司 Electronic payment system, device and method based on position authentication
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN104933344A (en) * 2015-07-06 2015-09-23 北京中科虹霸科技有限公司 Mobile terminal user identity authentication device and method based on multiple biological feature modals
CN106778132A (en) * 2016-11-30 2017-05-31 广东欧珀移动通信有限公司 The control method of file process, device and mobile terminal

Also Published As

Publication number Publication date
CN107483716A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN107450708B (en) Unlocking control method and related product
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
CN107832670B (en) Face recognition method and related product
CN107808127B (en) Face recognition method and related product
CN108429879B (en) Electronic apparatus, camera control method, camera control apparatus, and computer-readable storage medium
CN107527021B (en) Biometric pattern opening method and related product
CN107480601B (en) Detection method and related product
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
CN109819114B (en) Screen locking processing method and device, electronic equipment and storage medium
CN109523672B (en) Access control method and device
CN107451453B (en) Unlocking control method and related product
CN107622191B (en) Unlocking control method and related product
CN107527019B (en) Unlocking control method and related product
CN107491672B (en) Unlocking processing method and related product
EP3454251B1 (en) Unlocking control methods and related products
CN107437016B (en) Application control method and related product
CN107454251B (en) Unlocking control method and related product
US10831873B2 (en) Method for enabling biometric recognition pattern and related products
WO2019011106A1 (en) State control method and related product
CN107592408B (en) Mobile terminal control method and related product
CN107402787B (en) Iris recognition mode starting method and related product
CN107657219B (en) Face detection method and related product
CN107517298B (en) Unlocking method and related product
CN107483716B (en) File control method and related product
CN107832669B (en) Face detection method and related product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

GR01 Patent grant
GR01 Patent grant