CN107644072B - Data deleting method and device - Google Patents

Data deleting method and device Download PDF

Info

Publication number
CN107644072B
CN107644072B CN201710841890.2A CN201710841890A CN107644072B CN 107644072 B CN107644072 B CN 107644072B CN 201710841890 A CN201710841890 A CN 201710841890A CN 107644072 B CN107644072 B CN 107644072B
Authority
CN
China
Prior art keywords
fingerprint
terminal
data
area
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710841890.2A
Other languages
Chinese (zh)
Other versions
CN107644072A (en
Inventor
杨颂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710841890.2A priority Critical patent/CN107644072B/en
Publication of CN107644072A publication Critical patent/CN107644072A/en
Application granted granted Critical
Publication of CN107644072B publication Critical patent/CN107644072B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The application discloses a data deleting method and device, and belongs to the technical field of terminals. The method comprises the following steps: when a deletion operation on data is detected, acquiring a fingerprint corresponding to the deletion operation; comparing the fingerprint with a pre-stored fingerprint; when the fingerprint does not match the pre-stored fingerprint, ignoring the delete operation. According to the method and the device, the fingerprint corresponding to the deleting operation is compared with the fingerprint stored in advance, so that the identity of the user who performs the deleting operation is verified. If the current fingerprint does not match the pre-stored fingerprint, the deletion operation is not performed by the owner of the terminal, so that the terminal can not delete the data. The mode of verifying the identity of the user who performs the deleting operation through fingerprint matching and determining whether to execute the deleting operation according to the verification result can avoid that other people delete data on the terminal under the condition that the owner of the terminal does not know, and the safety is improved.

Description

Data deleting method and device
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a data deletion method and apparatus.
Background
With the increasing frequency of the terminal, during the process of using the terminal by the user, the terminal may automatically record various data of the user, such as short messages sent or received by the user. Of course, the user may also actively record some data on the terminal, such as recording daily events in a note application of the terminal. When the user no longer needs certain data, the user can delete the data to trigger the terminal to delete the data.
Currently, a method for deleting data by a terminal is as follows: the user can carry out long-time pressing operation on a certain data record, the terminal can display a deleting button for the data record when detecting the long-time pressing operation, the user can further carry out clicking operation on the deleting button to trigger the terminal to delete the data, and the terminal can delete the data record when detecting the clicking operation.
In the process of implementing the present application, the inventor finds that the prior art has at least the following problems:
in the above technology, the terminal deletes data when detecting a click operation on a delete button, and since the click operation can be performed by any user, the deletion of data may be performed without the knowledge of the owner of the terminal, which is poor in security.
Disclosure of Invention
The embodiment of the application provides a data deleting method and device, and the problem of poor safety in the prior art can be solved. The technical scheme is as follows:
in a first aspect, a data deleting method is provided, including:
when a deletion operation on data is detected, acquiring a fingerprint corresponding to the deletion operation;
comparing the fingerprint with a pre-stored fingerprint;
when the fingerprint does not match the pre-stored fingerprint, ignoring the delete operation.
In a first implementation manner of the first aspect, the obtaining, when a deletion operation on data is detected, a fingerprint corresponding to the deletion operation includes:
and when the trigger operation of the deletion button corresponding to the data is detected, acquiring the fingerprint corresponding to the trigger operation.
In a second implementation manner of the first aspect, the acquiring, when a trigger operation on a delete button corresponding to the data is detected, a fingerprint corresponding to the trigger operation includes:
when the trigger operation is detected, starting a fingerprint acquisition function of an area where the delete button is located;
and acquiring the fingerprint corresponding to the trigger operation based on the fingerprint acquisition function.
In a third implementation manner of the first aspect, after comparing the fingerprint with a pre-stored fingerprint, the method further includes:
and when the fingerprint is matched with the pre-stored fingerprint, responding to the deleting operation and deleting the data.
In a fourth implementation manner of the first aspect, before the acquiring, when a deletion operation on data is detected, a fingerprint corresponding to the deletion operation, the method further includes:
displaying a fingerprint input interface, and starting a fingerprint acquisition function of a designated area in the fingerprint input interface, wherein the fingerprint input interface is used for prompting to input a fingerprint in the designated area;
acquiring a fingerprint input in the designated area based on a fingerprint acquisition function of the designated area;
and storing the acquired fingerprint.
In a second aspect, a data deleting device is provided, which includes:
the acquisition module is used for acquiring a fingerprint corresponding to a deletion operation when the deletion operation of data is detected;
the comparison module is used for comparing the fingerprint with a pre-stored fingerprint;
an execution module to ignore the delete operation when the fingerprint does not match the pre-stored fingerprint.
In a first implementation manner of the second aspect, the obtaining module is configured to, when a trigger operation on a delete button corresponding to the data is detected, obtain a fingerprint corresponding to the trigger operation.
In a second implementation manner of the second aspect, the obtaining module is configured to start a fingerprint acquisition function of an area where the delete button is located when the trigger operation is detected; and acquiring the fingerprint corresponding to the trigger operation based on the fingerprint acquisition function.
In a third implementation manner of the second aspect, the execution module is further configured to delete the data in response to the deletion operation when the fingerprint matches the pre-stored fingerprint.
In a fourth implementation form of the second aspect, the apparatus further comprises:
the display module is used for displaying a fingerprint input interface and starting a fingerprint acquisition function of a designated area in the fingerprint input interface, and the fingerprint input interface is used for prompting to input a fingerprint in the designated area;
the acquisition module is used for acquiring the fingerprint input in the designated area based on the fingerprint acquisition function of the designated area;
and the storage module is used for storing the acquired fingerprints.
In a third aspect, a terminal is provided that includes a processor and a memory; the memory is used for storing a computer program; the processor is configured to execute the computer program stored in the memory to implement the method steps of any one of the implementation manners of the first aspect.
In a fourth aspect, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any of the implementations of the first aspect.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
when the data deletion operation is detected, the fingerprint corresponding to the deletion operation is acquired, and the fingerprint is compared with the fingerprint stored in advance, so that the identity of the user who performs the deletion operation is verified. The pre-stored fingerprint is recorded by the owner of the terminal, if the current fingerprint is not matched with the pre-stored fingerprint, the deletion operation is not performed by the owner of the terminal, so that the terminal can not delete the data, and if the current fingerprint is matched with the pre-stored fingerprint, the deletion operation is actually performed by the owner of the terminal, so that the terminal can delete the data in time. The mode of verifying the identity of the user who performs the deleting operation through fingerprint matching and determining whether to execute the deleting operation according to the verification result can avoid that other people delete data on the terminal under the condition that the owner of the terminal does not know, and the safety is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a block diagram illustrating a terminal 100 according to an embodiment of the present disclosure;
fig. 2 is a block diagram illustrating a structure of a terminal 100 according to an embodiment of the present disclosure;
FIG. 3 is a schematic view of a full-face screen provided by an embodiment of the present application;
FIG. 4 is a schematic view of a curved screen provided by an embodiment of the present application;
FIG. 5 is a schematic view of a profiled screen provided by an embodiment of the present application;
FIG. 6 is a schematic view of a profiled screen provided by embodiments of the present application;
FIG. 7 is a schematic view of a profiled screen provided by an embodiment of the present application;
FIG. 8 is a schematic view of a profiled screen provided by an embodiment of the present application;
fig. 9 is a flowchart of a data deleting method provided in an embodiment of the present application;
fig. 10 is a flowchart of a data deleting method provided in an embodiment of the present application;
FIG. 11 is a schematic diagram of a delete button provided by an embodiment of the present application;
FIG. 12 is a schematic diagram of a trigger operation provided by an embodiment of the present application;
fig. 13 is a schematic structural diagram of a data deletion method apparatus according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of a data deletion method device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Referring to fig. 1 and 2, a block diagram of a terminal 100 according to an exemplary embodiment of the present application is shown. The terminal 100 may be a mobile phone, a tablet computer, a notebook computer, an e-book, etc. The terminal 100 in the present application may include one or more of the following components: a processor 110, a memory 120, and a touch display screen 130.
Processor 110 may include one or more processing cores. The processor 110 connects various parts within the overall terminal 100 using various interfaces and lines, and performs various functions of the terminal 100 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 120 and calling data stored in the memory 120. Alternatively, the processor 110 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 110 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content to be displayed by the touch display screen 130; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 110, but may be implemented by a single chip.
The Memory 120 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 120 includes a non-transitory computer-readable medium. The memory 120 may be used to store instructions, programs, code sets, or instruction sets. The memory 120 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like; the storage data area may store data (such as audio data, a phonebook) created according to the use of the terminal 100, and the like.
Taking an operating system as an Android (Android) system as an example, programs and data stored in the memory 120 are shown in fig. 1, and a Linux kernel layer 220, a system runtime layer 240, an application framework layer 260, and an application layer 280 are stored in the memory 120. The Linux kernel layer 220 provides underlying drivers for various hardware of the terminal 100, such as a display driver, an audio driver, a camera driver, a bluetooth driver, a Wi-Fi driver, power management, and the like. The system runtime library layer 240 provides the main feature support for the android system through some C/C + + libraries. For example, the SQLite library provides support for a database, the OpenGL/ES library provides support for 6 drawings, the Webkit library provides support for a browser kernel, and the like. Also provided in the system Runtime layer 240 is an Android Runtime library (Android Runtime), which mainly provides some core libraries that can allow developers to write Android applications using the Java language. The application framework layer 260 provides various APIs that may be used in building applications, and developers may build their own applications by using these APIs, such as activity management, window management, view management, notification management, content provider, package management, session management, resource management, and location management. At least one application program runs in the application layer 280, and the application programs may be a contact program, a short message program, a clock program, a camera application, etc. of the operating system; or an application program developed by a third-party developer, such as an instant messaging program, a photo beautification program, and the like.
Taking an operating system as an IOS system as an example, programs and data stored in the memory 120 are shown in fig. 2, and the IOS system includes: a Core operating system Layer 320(Core OSlayer), a Core Services Layer 340(Core Services Layer), a Media Layer 360(Media Layer), and a touchable Layer 380(Cocoa Touch Layer). The kernel operating system layer 320 includes an operating system kernel, drivers, and underlying program frameworks that provide functionality closer to hardware for use by program frameworks located in the kernel services layer 340. The core services layer 340 provides system services and/or program frameworks, such as a Foundation framework, an account framework, an advertisement framework, a data storage framework, a network connection framework, a geographic location framework, a motion framework, and so forth, that are needed by the application. The media layer 360 provides audiovisual interfaces for applications, such as graphics-related interfaces, audio-related interfaces, video-related interfaces, and audio/video transmission technology wireless broadcast (AirPlay) interfaces. The touchable layer 380 provides various common interface-related frameworks for application development, and the touchable layer 380 is responsible for user touch interaction operations on the terminal 100. Such as a local notification service, a remote push service, an advertising framework, a game tool framework, a messaging User Interface (UI) framework, a User Interface UIKit framework, a map framework, and so forth.
In the framework shown in FIG. 2, the framework associated with most applications includes, but is not limited to: a base framework in the core services layer 340 and a UIKit framework in the touchable layer 380. The base framework provides many basic object classes and data types, provides the most basic system services for all applications, and is UI independent. While the class provided by the UIKit framework is a basic library of UI classes for creating touch-based user interfaces, iOS applications can provide UIs based on the UIKit framework, so it provides an infrastructure for applications for building user interfaces, drawing, processing and user interaction events, responding to gestures, and the like.
The touch display screen 130 is used for receiving a touch operation of a user on or near the touch display screen using any suitable object such as a finger, a touch pen, or the like, and displaying a user interface of each application program. The touch display 130 is generally disposed on a front panel of the terminal 130. The touch display screen 130 may be designed as a full-face screen, a curved screen, or a profiled screen. The touch display screen 130 can also be designed as a combination of a full-screen and a curved screen, and a combination of a special-shaped screen and a curved screen, which is not limited in this embodiment. Wherein:
full screen
A full screen may refer to a screen design where the touch display screen 130 occupies a screen fraction of the front panel of the terminal 100 that exceeds a threshold (e.g., 80% or 90% or 95%). One way of calculating the screen occupation ratio is as follows: (area of touch display 130/area of front panel of terminal 100) × 100%; another way to calculate the screen ratio is: (area of actual display area in touch display 130/area of front panel of terminal 100) × 100%; another calculation method of the screen occupation ratio is as follows: (diagonal of touch display screen 130/diagonal of front panel at terminal 100) × 100%. In the example shown schematically in fig. 3, nearly all areas on the front panel of the terminal 100 are the touch display 130, and all areas on the front panel 40 of the terminal 100 except for the edge created by the bezel 41 are the touch display 130. The four corners of the touch display screen 130 may be right angles or rounded.
A full-screen may also be a screen design that integrates at least one front panel component within or underneath the touch screen display 130. Optionally, the at least one front panel component comprises: cameras, fingerprint sensors, proximity light sensors, distance sensors, etc. In some embodiments, other components on the front panel of the conventional terminal are integrated in all or a part of the area of the touch display screen 130, such as after splitting the light sensing element in the camera into a plurality of light sensing pixels, each light sensing pixel is integrated in a black area in each display pixel in the touch display screen 130. The full-screen has a higher screen-to-screen ratio due to the integration of at least one front panel component inside the touch display screen 130.
Of course, in other embodiments, the front panel component of the front panel of the conventional terminal may be disposed at the side or back of the terminal 100, such as disposing the ultrasonic fingerprint sensor below the touch screen 130, disposing the bone conduction receiver inside the terminal 130, and disposing the camera head in a pluggable structure at the side of the terminal.
In some optional embodiments, when the terminal 100 employs a full-screen, a single side, or two sides (e.g., two left and right sides), or four sides (e.g., four upper, lower, left and right sides) of the middle frame of the terminal 100 is provided with an edge touch sensor 120, and the edge touch sensor 120 is configured to detect at least one of a touch operation, a click operation, a press operation, a slide operation, and the like of a user on the middle frame. The edge touch sensor 120 may be any one of a touch sensor, a thermal sensor, a pressure sensor, and the like. The user may apply operations on the edge touch sensor 120 to control applications in the terminal 100.
Curved surface screen
A curved screen refers to a screen design where the screen area of touch display screen 130 does not lie in one plane. Generally, curved screens present at least one such section: the section is in a curved shape, and the projection of the curved screen in any plane direction perpendicular to the section is a planar screen design, wherein the curved shape can be U-shaped. Alternatively, a curved screen refers to a screen design where at least one side is curved. Alternatively, the curved screen means that at least one side edge of the touch display screen 130 extends to cover the middle frame of the terminal 100. Since the side of the touch display screen 130 extends to cover the middle frame of the terminal 100, that is, the middle frame which does not have the display function and the touch function originally is covered as the displayable area and/or the operable area, the curved screen has a higher screen occupation ratio. Alternatively, as in the example shown in fig. 4, the curved screen refers to a screen design in which the left and right sides 42 are curved; or, the curved screen refers to a screen design in which the upper and lower sides are curved; or, the curved screen refers to a screen design in which the upper side, the lower side, the left side and the right side are all in a curved shape. In an alternative embodiment, the curved screen is made of a touch screen material with certain flexibility.
Special-shaped screen
The special-shaped screen is a touch display screen with an irregular shape, and the irregular shape is not a rectangle or a rounded rectangle. Optionally, the irregular screen refers to a screen design in which a protrusion, a notch and/or a hole is/are formed on the rectangular or rounded rectangular touch display screen 130. Alternatively, the protrusions, indentations, and/or cutouts may be located at the edges of the touch screen display 130, at the center of the screen, or both. When the protrusion, the notch and/or the dug hole are arranged on one edge, the protrusion, the notch and/or the dug hole can be arranged in the middle or at two ends of the edge; when the projection, notch and/or cutout is provided in the center of the screen, it may be provided in one or more of an upper region, an upper left region, a left side region, a lower left region, a lower right region, a right side region, and an upper right region of the screen. When the projections, the notches and the dug holes are arranged in a plurality of areas, the projections, the notches and the dug holes can be distributed in a concentrated mode or in a dispersed mode; the distribution may be symmetrical or asymmetrical. Optionally, the number of projections, indentations and/or cutouts is also not limited.
The special-shaped screen covers the upper forehead area and/or the lower forehead area of the touch display screen as the displayable area and/or the operable area, so that the touch display screen occupies more space on the front panel of the terminal, and the special-shaped screen also has a larger screen occupation ratio. In some embodiments, the indentation and/or cutout is configured to receive at least one front panel component therein, the front panel component including at least one of a camera, a fingerprint sensor, a proximity light sensor, a distance sensor, an earpiece, an ambient light level sensor, and a physical key.
For example, the notch may be provided on one or more edges, and the notch may be a semicircular notch, a right-angled rectangular notch, a rounded rectangular notch, or an irregularly shaped notch. In the example shown in fig. 5, the special-shaped screen may be a screen design in which a semicircular notch 43 is formed at the center of the upper edge of the touch display screen 130, and the semicircular notch 43 is used to accommodate at least one front panel component of a camera, a distance sensor (also called a proximity sensor), an earpiece, and an ambient light sensor; as schematically shown in fig. 6, the irregular screen may be a screen design in which a semicircular notch 44 is formed at a central position of a lower edge of the touch display screen 130, and the semicircular notch 44 is free for accommodating at least one of a physical key, a fingerprint sensor, and a microphone; in an exemplary embodiment as shown in fig. 7, the special-shaped screen may be a screen design in which a semi-elliptical notch 45 is formed in the center of the lower edge of the touch display screen 130, and a semi-elliptical notch is also formed on the front panel of the terminal 100, and the two semi-elliptical notches form an elliptical area for accommodating a physical key or a fingerprint recognition module; in the illustrative example shown in fig. 8, the contoured screen may be a screen design having at least one aperture 45 in the upper half of the touch screen display 130, the aperture 45 being free to receive at least one of a camera, a distance sensor, an earpiece, and an ambient light level sensor.
In addition, those skilled in the art will appreciate that the configuration of terminal 100 as illustrated in the above-described figures is not intended to be limiting of terminal 100, and that terminals may include more or less components than those illustrated, or some components may be combined, or a different arrangement of components. For example, the terminal 100 further includes a radio frequency circuit, an input unit, a sensor, an audio circuit, a Wireless Fidelity (WiFi) module, a power supply, a bluetooth module, and other components, which are not described herein again.
Fig. 9 is a flowchart of a data deleting method according to an embodiment of the present application. Referring to fig. 9, the method includes:
901. when the deletion operation of the data is detected, the fingerprint corresponding to the deletion operation is acquired.
902. The fingerprint is compared with a pre-stored fingerprint.
903. When the fingerprint does not match the pre-stored fingerprint, the delete operation is ignored.
According to the method provided by the embodiment of the application, when the deletion operation of the data is detected, the fingerprint corresponding to the deletion operation is obtained, and the fingerprint is compared with the fingerprint stored in advance, so that the identity of the user who performs the deletion operation is verified. The pre-stored fingerprint is recorded by the owner of the terminal, if the current fingerprint is not matched with the pre-stored fingerprint, the deletion operation is not performed by the owner of the terminal, so that the terminal can not delete the data, and if the current fingerprint is matched with the pre-stored fingerprint, the deletion operation is actually performed by the owner of the terminal, so that the terminal can delete the data in time. The mode of verifying the identity of the user who performs the deleting operation through fingerprint matching and determining whether to execute the deleting operation according to the verification result can avoid that other people delete data on the terminal under the condition that the owner of the terminal does not know, and the safety is improved.
In one possible implementation manner, when a deletion operation on data is detected, acquiring a fingerprint corresponding to the deletion operation includes:
and when the trigger operation of the deletion button corresponding to the data is detected, acquiring the fingerprint corresponding to the trigger operation.
In a possible implementation manner, when a trigger operation of a delete button corresponding to the data is detected, acquiring a fingerprint corresponding to the trigger operation, including:
when the trigger operation is detected, starting a fingerprint acquisition function of an area where the delete button is located;
and acquiring a fingerprint corresponding to the trigger operation based on the fingerprint acquisition function.
In one possible implementation, after comparing the fingerprint with the pre-stored fingerprint, the method further includes:
when the fingerprint matches the pre-stored fingerprint, the data is deleted in response to the delete operation.
In a possible implementation manner, when a deletion operation on data is detected, before acquiring a fingerprint corresponding to the deletion operation, the method further includes:
displaying a fingerprint input interface, and starting a fingerprint acquisition function of a specified area in the fingerprint input interface, wherein the fingerprint input interface is used for prompting to input a fingerprint in the specified area;
acquiring a fingerprint input in the designated area based on the fingerprint acquisition function of the designated area;
and storing the acquired fingerprint.
All the above optional technical solutions may be combined arbitrarily to form optional embodiments of the present application, and are not described herein again.
Fig. 10 is a flowchart of a data deleting method according to an embodiment of the present application. The method is executed by a terminal, a screen of the terminal is a touch screen, the touch screen has a fingerprint acquisition function, the terminal can acquire a fingerprint corresponding to an operation when the operation on the touch screen is detected based on the fingerprint acquisition function of the touch screen, and then the fingerprint is identified, if the currently acquired fingerprint is compared with a preset stored fingerprint, whether the current fingerprint is matched with the pre-stored fingerprint is determined, and corresponding operation is executed according to a matching result. Referring to fig. 10, the method includes:
1001. when the deletion operation of the data is detected, the fingerprint corresponding to the deletion operation is acquired.
The data may be data in an application on the terminal, such as a record in a memo application, a short message in a short message application, a photo in a photo album application or a photo in a photo album, which is not limited in this embodiment of the present application.
In the embodiment of the application, when the user wants to delete the data, the data can be deleted. In one possible implementation, the deletion operation may be triggered by a user's trigger operation of a deletion button corresponding to the data. For example, the user may perform a trigger operation on an application icon of an application where the data is located, the terminal may display a data list of the application when detecting the trigger operation, the user may perform a long-press operation or another operation (such as a left-slide operation) that triggers display of a delete button on the data in the data list, and when detecting the long-press operation, the terminal may display the delete button corresponding to the data. Referring to fig. 11, a schematic diagram of a delete button is provided, and the terminal may display a "delete" button to the right of the data (e.g., the third piece of data in application 1). Referring to fig. 12, a schematic diagram of a trigger operation is provided, in which during a process that the terminal displays a delete button corresponding to the data, a user may perform a trigger operation on the delete button, such as clicking, pressing, or touching the delete button with a finger. When the trigger operation of the delete button corresponding to the data is detected, the terminal can acquire the fingerprint corresponding to the trigger operation, that is, the fingerprint of the finger of the user performing the trigger operation.
In a possible implementation manner, the process of the terminal acquiring the fingerprint corresponding to the trigger operation may include: when the trigger operation is detected, the terminal can start the fingerprint acquisition function of the area where the delete button is located; and acquiring a fingerprint corresponding to the trigger operation based on the fingerprint acquisition function. The area where the delete button is located may be a display area of the delete button.
Because the triggering operation is the triggering operation of the terminal on the deleting button, namely the triggering operation of the terminal on the area where the deleting button is located, the terminal can start the fingerprint acquisition function of the area when detecting the triggering operation so as to acquire the fingerprint of the user who performs the triggering operation in the area. When the operation related to the user data security is detected, such as the triggering operation of the delete button, the terminal immediately starts the fingerprint acquisition function of the corresponding area (such as the area where the delete button is located), so that unnecessary power consumption caused by the fact that the terminal always starts the fingerprint acquisition function or starts the fingerprint acquisition functions of all areas on a screen can be avoided.
It should be noted that, in the foregoing possible implementation manner, the terminal only starts the fingerprint collection function of the area where the delete button is located, and in fact, the terminal may also start the fingerprint collection function of a larger area including the area where the delete button is located, or even start the fingerprint collection function of all areas of the terminal screen, so as to collect the fingerprint corresponding to the trigger operation. Therefore, when the user triggers the delete button, even if the contact area between the finger of the user and the terminal screen does not completely fall into the display area of the delete button, the terminal can acquire more complete fingerprints, so that the fingerprint matching accuracy is improved, and the success rate of user operation is increased.
1002. The fingerprint is compared with a pre-stored fingerprint.
In the embodiment of the application, after the terminal acquires the fingerprint corresponding to the deletion operation, the fingerprint can be compared with the pre-stored fingerprint according to a fingerprint comparison algorithm to obtain a comparison result. The comparison result may be that the fingerprint matches a pre-stored fingerprint, or that the fingerprint does not match a pre-stored fingerprint. When the fingerprint matches a pre-stored fingerprint, a subsequent step 1003 is performed, and when the fingerprint does not match a pre-stored fingerprint, a subsequent step 1004 is performed.
The fingerprint prestored in the terminal may be a fingerprint entered by a user (owner of the terminal) in advance on the terminal, and the prestored fingerprint may be used to verify a fingerprint currently acquired by the terminal, so as to determine whether the fingerprint currently acquired by the terminal is the fingerprint of the owner of the terminal, thereby completing authentication of the user using the terminal.
In one possible implementation, the entering process of the pre-stored fingerprint may include: displaying a fingerprint input interface, and starting a fingerprint acquisition function of a specified area in the fingerprint input interface, wherein the fingerprint input interface is used for prompting to input a fingerprint in the specified area; acquiring a fingerprint input in the designated area based on the fingerprint acquisition function of the designated area; and storing the acquired fingerprint. The terminal displays the fingerprint input interface and can be triggered by clicking operation of a user on a fingerprint setting option. This fingerprint is typeeed the interface and can provide the fingerprint and type in and guide for the user can type in the fingerprint on this fingerprint is typeeed the interface according to this fingerprint, and the terminal can save the fingerprint of gathering, thereby accomplishes typing in of fingerprint. The designated area in the fingerprint entry interface may be a circular area, or may be an area of other shapes, which is not limited in the embodiment of the present application.
Through when the fingerprint is input to needs, the fingerprint acquisition function of the designated area for inputting the fingerprint in the fingerprint input interface is started to acquire the fingerprint of a user who inputs the fingerprint in the designated area, so that unnecessary power consumption caused by the fact that the terminal starts the fingerprint acquisition function of all areas in the fingerprint input interface can be avoided.
It should be noted that, because all the areas of the terminal touch screen can have the fingerprint collecting function, the terminal can guide the user to directly record the fingerprint on the fingerprint recording interface in the possible implementation mode, and compared with the prior art that the user needs to record the fingerprint in the fingerprint collecting area at the back of the terminal, the method for directly recording the fingerprint on the terminal screen is more natural and more convenient.
In addition, considering that a user only needs a part of the area of the terminal screen for inputting the fingerprint, in order to save power consumption, the terminal in the possible implementation mode can only start the fingerprint acquisition function of the specified area in the fingerprint input interface. In fact, the terminal can also directly start the fingerprint acquisition function of the full screen (all areas of the touch screen), so that the user can enter the fingerprint in any area of the terminal screen, and the flexibility of the user in entering the fingerprint is improved.
By comparing the fingerprint corresponding to the currently detected deletion operation with the pre-stored fingerprint, because the pre-stored fingerprint is input by the owner of the terminal, the terminal can verify the identity of the user performing the deletion operation according to the comparison result, that is, determine whether the deletion operation is performed by the owner of the terminal, and further determine whether to execute the deletion operation.
1003. When the fingerprint does not match the pre-stored fingerprint, the delete operation is ignored.
In the embodiment of the application, if the fingerprint corresponding to the deletion operation currently detected by the terminal is not matched with the pre-stored fingerprint, the terminal can confirm that the deletion operation is not performed by the owner of the terminal, so that the terminal can ignore the deletion operation of the data, namely, the data is not deleted.
Optionally, when the fingerprint does not match the pre-stored fingerprint, the terminal may display a fingerprint error prompt message to prompt the user that the fingerprint error needs to be re-operated. After seeing the fingerprint error prompt message, if the user continues to delete the data, the user can delete the data again, and the terminal can match the fingerprint corresponding to the deletion operation with the fingerprint stored in advance again. If the data match, the current deletion operation is performed by the owner of the terminal, and the last deletion operation may be performed by the owner of the terminal, but the fingerprints are not matched due to improper operation (such as the case that a finger is stained with water), and at this time, the terminal can directly delete the data. If there is still no match, the terminal may again display a fingerprint error prompt message. Certainly, in order to avoid that a user other than the owner of the terminal repeatedly deletes the data, and the terminal displays the fingerprint error prompt message for multiple times due to fingerprint error to bring larger resource consumption, the terminal may count the number of times of the fingerprint error, and when the number of times of the fingerprint error reaches a certain threshold, the terminal may not display the fingerprint error prompt message any more, and the terminal may exit the display interface of the data, or even directly turn off the screen or lock the machine, so as to avoid unnecessary resource consumption.
The step 1003 is a processing manner that the terminal adopts for the deletion operation with respect to one comparison result of the step 1002, and the terminal can adopt the processing manner shown in the subsequent step 1004 for the deletion operation with respect to another comparison result of the step 1002.
1004. When the fingerprint matches the pre-stored fingerprint, the data is deleted in response to the delete operation.
In the embodiment of the application, if the fingerprint corresponding to the deletion operation currently detected by the terminal is matched with the pre-stored fingerprint, the terminal can confirm that the deletion operation is performed by the owner of the terminal, so that the terminal can respond to the deletion operation of the data, namely delete the data, and the function that a user deletes the data through the deletion operation can be normally realized.
By acquiring the fingerprint corresponding to the deletion operation when the deletion operation of the data is detected, and not deleting the data when the fingerprint is not matched with the pre-stored fingerprint, compared with the prior art that the data is directly deleted once the deletion operation is detected, the method for verifying the identity of the user who performs the deletion operation through fingerprint matching can avoid that other people delete the data on the terminal under the condition that the owner of the terminal does not know, the safety is improved, and the interaction mode of the user fingerprint and the touch screen of the terminal is natural.
It should be noted that, in the embodiment of the present application, the terminal verifies the identity of the user who performs the deletion operation in a fingerprint matching manner for the deletion operation of the data. In fact, since the full screen (all areas of the touch screen) of the terminal has the fingerprint collection function, the terminal may also collect fingerprints of other operations for other operations on the touch screen, match the fingerprints with the pre-stored fingerprints, and determine whether to execute the operations according to the matching result, which is not limited in the embodiment of the present application.
According to the method provided by the embodiment of the application, when the deletion operation of the data is detected, the fingerprint corresponding to the deletion operation is obtained, and the fingerprint is compared with the fingerprint stored in advance, so that the identity of the user who performs the deletion operation is verified. The pre-stored fingerprint is recorded by the owner of the terminal, if the current fingerprint is not matched with the pre-stored fingerprint, the deletion operation is not performed by the owner of the terminal, so that the terminal can not delete the data, and if the current fingerprint is matched with the pre-stored fingerprint, the deletion operation is actually performed by the owner of the terminal, so that the terminal can delete the data in time. The mode of verifying the identity of the user who performs the deleting operation through fingerprint matching and determining whether to execute the deleting operation according to the verification result can avoid that other people delete data on the terminal under the condition that the owner of the terminal does not know, and the safety is improved.
Fig. 13 is a schematic structural diagram of a data deletion apparatus according to an embodiment of the present application. Referring to fig. 13, the apparatus includes:
an obtaining module 1301, configured to, when a deletion operation on data is detected, obtain a fingerprint corresponding to the deletion operation;
a comparison module 1302, configured to compare the fingerprint with a pre-stored fingerprint;
and an executing module 1303, configured to ignore the deleting operation when the fingerprint does not match the pre-stored fingerprint.
In a possible implementation manner, the obtaining module 1301 is configured to, when a trigger operation of a delete button corresponding to the data is detected, obtain a fingerprint corresponding to the trigger operation.
In a possible implementation manner, the obtaining module 1301 is configured to, when the trigger operation is detected, start a fingerprint acquisition function of an area where the delete button is located; and acquiring a fingerprint corresponding to the trigger operation based on the fingerprint acquisition function.
In one possible implementation, the executing module 1303 is further configured to delete the data in response to the deleting operation when the fingerprint matches the pre-stored fingerprint.
In one possible implementation, referring to fig. 14, the apparatus further includes:
the display module 1304 is configured to display a fingerprint entry interface, and start a fingerprint acquisition function of a specified area in the fingerprint entry interface, where the fingerprint entry interface is configured to prompt that a fingerprint is entered in the specified area;
an acquiring module 1305, configured to acquire, based on a fingerprint acquisition function of the designated area, a fingerprint entered in the designated area;
and a storage module 1306, configured to store the acquired fingerprint.
In the embodiment of the application, when the deletion operation of the data is detected, the fingerprint corresponding to the deletion operation is acquired, and the fingerprint is compared with the fingerprint stored in advance, so that the identity of the user who performs the deletion operation is verified. The pre-stored fingerprint is recorded by the owner of the terminal, if the current fingerprint is not matched with the pre-stored fingerprint, the deletion operation is not performed by the owner of the terminal, so that the terminal can not delete the data, and if the current fingerprint is matched with the pre-stored fingerprint, the deletion operation is actually performed by the owner of the terminal, so that the terminal can delete the data in time. The mode of verifying the identity of the user who performs the deleting operation through fingerprint matching and determining whether to execute the deleting operation according to the verification result can avoid that other people delete data on the terminal under the condition that the owner of the terminal does not know, and the safety is improved.
It should be noted that: in the data deleting device provided in the above embodiment, only the division of the above functional modules is taken as an example for data deletion, and in practical applications, the above function distribution may be completed by different functional modules as needed, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the data deleting device and the data deleting method provided by the above embodiment belong to the same concept, and the specific implementation process thereof is detailed in the method embodiment and is not described herein again.
In an exemplary embodiment, a computer readable storage medium, such as a memory, storing a computer program is also provided, which when executed by a processor implements the data deletion method in the embodiments shown in fig. 9 or fig. 10. For example, the computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a Compact disc-Read-Only Memory (CD-ROM), a magnetic tape, a floppy disk, an optical data storage device, and the like.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The present invention is not intended to be limited to the particular embodiments shown and described, but is to be accorded the widest scope consistent with the principles and novel features herein disclosed.

Claims (8)

1. A data deleting method is characterized in that the method is used in a terminal with a touch screen as a screen, and the touch screen has a fingerprint collecting function; the method comprises the following steps:
when the triggering operation of a deleting button corresponding to the data is detected, starting a fingerprint acquisition function of a target area; the target area is larger than and comprises the area where the delete button is located and smaller than the whole area of the touch screen, and the area where the delete button is located is a display area of the delete button;
acquiring a fingerprint corresponding to the trigger operation based on the fingerprint acquisition function of the display area of the delete button;
comparing the fingerprint with a pre-stored fingerprint;
when the fingerprint does not match the pre-stored fingerprint, ignoring the delete operation.
2. The method of claim 1, wherein after comparing the fingerprint to a pre-stored fingerprint, the method further comprises:
and when the fingerprint is matched with the pre-stored fingerprint, responding to the deleting operation and deleting the data.
3. The method according to claim 1, wherein when the deletion operation on the data is detected, before the fingerprint corresponding to the deletion operation is acquired, the method further comprises:
displaying a fingerprint input interface, and starting a fingerprint acquisition function of a designated area in the fingerprint input interface, wherein the fingerprint input interface is used for prompting to input a fingerprint in the designated area;
acquiring a fingerprint input in the designated area based on a fingerprint acquisition function of the designated area;
and storing the acquired fingerprint.
4. A data deleting device is characterized in that the device is used in a terminal with a touch screen as a screen, and the touch screen has a fingerprint acquisition function; the device comprises:
the acquisition module is used for starting a fingerprint acquisition function of a target area when the trigger operation of a deletion button corresponding to data is detected, wherein the target area is larger than and contains the area where the deletion button is located and is smaller than all areas of the touch screen, the area where the deletion button is located is a display area of the deletion button, and a fingerprint corresponding to the trigger operation is acquired based on the fingerprint acquisition function of the display area of the deletion button;
the comparison module is used for comparing the fingerprint with a pre-stored fingerprint;
an execution module to ignore the delete operation when the fingerprint does not match the pre-stored fingerprint.
5. The apparatus of claim 4, wherein the execution module is further configured to delete the data in response to the delete operation when the fingerprint matches the pre-stored fingerprint.
6. The apparatus of claim 4, further comprising:
the display module is used for displaying a fingerprint input interface and starting a fingerprint acquisition function of a designated area in the fingerprint input interface, and the fingerprint input interface is used for prompting to input a fingerprint in the designated area;
the acquisition module is used for acquiring the fingerprint input in the designated area based on the fingerprint acquisition function of the designated area;
and the storage module is used for storing the acquired fingerprints.
7. A terminal comprising a processor and a memory; the memory is used for storing a computer program; the processor, configured to execute the computer program stored on the memory, implements the method steps of any of claims 1-3.
8. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1-3.
CN201710841890.2A 2017-09-18 2017-09-18 Data deleting method and device Active CN107644072B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710841890.2A CN107644072B (en) 2017-09-18 2017-09-18 Data deleting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710841890.2A CN107644072B (en) 2017-09-18 2017-09-18 Data deleting method and device

Publications (2)

Publication Number Publication Date
CN107644072A CN107644072A (en) 2018-01-30
CN107644072B true CN107644072B (en) 2020-06-26

Family

ID=61111878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710841890.2A Active CN107644072B (en) 2017-09-18 2017-09-18 Data deleting method and device

Country Status (1)

Country Link
CN (1) CN107644072B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857505A (en) * 2019-01-31 2019-06-07 Oppo广东移动通信有限公司 Execution method, apparatus, terminal and the storage medium of operation

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10360249B2 (en) * 2015-04-10 2019-07-23 Trendminder N.V. System and method for creation and detection of process fingerprints for monitoring in a process plant
CN105335053A (en) * 2015-12-14 2016-02-17 联想(北京)有限公司 Control method and electronic device
CN105701383B (en) * 2015-12-30 2019-11-15 魅族科技(中国)有限公司 A kind of function triggering method, device and terminal
CN105653924A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Touch screen operation method and device
CN106843727B (en) * 2017-01-05 2020-06-09 北京数科网维技术有限责任公司 Method and system for preventing character from being deleted by mistake
CN107103224B (en) * 2017-05-12 2020-02-18 维沃移动通信有限公司 Unlocking method and mobile terminal
CN107153784A (en) * 2017-06-29 2017-09-12 上海与德科技有限公司 The unlocking method and terminal of a kind of terminal

Also Published As

Publication number Publication date
CN107644072A (en) 2018-01-30

Similar Documents

Publication Publication Date Title
CN108958681B (en) Split screen display method, device, terminal and storage medium
CN109034115B (en) Video image recognizing method, device, terminal and storage medium
CN107704744B (en) Identity verification method and device and mobile terminal
CN107491683B (en) Application decryption method and device, terminal and computer readable storage medium
CN107688422B (en) Notification message display method and device
CN107506123B (en) It adjusts operation and executes method, apparatus and terminal
CN107491315B (en) Message prompting method, device and terminal
CN107562361B (en) Message treatment method, device and terminal
CN107547750B (en) Control method, device and the storage medium of terminal
US11449591B2 (en) Method and device for triggering function of function widget based on fingerprint recognition, terminal, and storage medium
WO2019047908A1 (en) Fingerprint recognition method and device, mobile terminal, and storage medium
CN107608615B (en) Fingerprint identification function starting method and device, terminal and storage medium
WO2020088167A1 (en) Application activation method, device, terminal and storage medium
CN109862187B (en) Message processing method, device, terminal and storage medium
CN107632874B (en) Interface display method and device and terminal
WO2020156199A1 (en) Application login method and device, terminal and storage medium
WO2019047738A1 (en) Message display method, device, mobile terminal and storage medium
CN109117060B (en) Pull-down notification bar display method, device, terminal and storage medium
CN107688430B (en) Wallpaper replacing method, device, terminal and storage medium
CN107608550B (en) Touch operation response method and device
CN109656445B (en) Content processing method, device, terminal and storage medium
WO2019047728A1 (en) Method for opening shortcut function, device, mobile terminal, and storage medium
CN107526477B (en) Unlocking screen method, apparatus and terminal
CN109726539B (en) Application starting method, device, terminal and storage medium
CN111526290B (en) Image processing method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS CORP., Ltd.

GR01 Patent grant
GR01 Patent grant