CN108710806A - A kind of terminal unlock method, mobile terminal - Google Patents
A kind of terminal unlock method, mobile terminal Download PDFInfo
- Publication number
- CN108710806A CN108710806A CN201810412066.XA CN201810412066A CN108710806A CN 108710806 A CN108710806 A CN 108710806A CN 201810412066 A CN201810412066 A CN 201810412066A CN 108710806 A CN108710806 A CN 108710806A
- Authority
- CN
- China
- Prior art keywords
- input
- target
- mobile terminal
- application icon
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
Abstract
The invention discloses the mobile terminal of a kind of terminal unlock method and application this method, this method includes:Receive the first input of user;In response to the first input, shows and the associated target object of target permission, target permission are associated with the input parameter of the first input;Input parameter includes at least one of input direction and input opereating specification.Based on this method, user can first carry out the first input, mobile terminal can determine associated target permission based on the input parameter of the first input, then show and the associated target object of target permission in advance when by other people are lent outside mobile terminal.At this time, the input parameter that permission associated by target object is inputted with first is corresponding, user can execute matched first input according to the identity of borrower, so that the identities match of the target permission and borrower associated by target object, borrower can only operate the target object of user's permission under target permission, avoid borrower that the privacy information of user leaks.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of terminal unlock method, mobile terminals.
Background technology
With more popularizing for mobile terminal, mobile terminal stores a large amount of privacy information of user, for example, photograph album application
In be stored with the secret photo of user, payment application memory contains the money account information of user.How to ensure on mobile terminal
The safety of user privacy information also becomes the emphasis paid close attention in the industry.
Current mobile terminal generally all protects the safety of user privacy information by way of unlocking pin is arranged.
However, in some scenarios, user uses after may unlocking mobile terminal for other people, such as parent may will move eventually
It is used to child after the unlock of end, at this time probably because the maloperation of child causes user privacy information to leak, and then gives user
It causes damages.
Invention content
The embodiment of the present invention provides a kind of terminal unlock method, to solve not ensureing privacy of user after mobile terminal unlocks
The problem of information security.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, providing a kind of terminal unlock method, it is applied to mobile terminal, the method includes:
Receive the first input of user;
In response to first input, display and the associated target object of target permission, the target permission and described the
The input parameter of one input is associated;
Wherein, the input parameter includes the associated target power of at least one of input direction and input opereating specification
Limit.
Second aspect provides a kind of mobile terminal, which includes:
First input receiving module, the first input for receiving user;
First input respond module, for being inputted in response to described first, display and the associated target object of target permission,
The target permission is associated with the input parameter of the first input;
Wherein, the input parameter includes the associated target power of at least one of input direction and input opereating specification
Limit.
The third aspect provides a kind of mobile terminal, which includes processor, memory and be stored in described deposit
On reservoir and the computer program that can run on the processor, the computer program are realized when being executed by the processor
The step of method as described in relation to the first aspect.
Fourth aspect provides a kind of computer readable storage medium, which is characterized in that the computer-readable storage medium
Computer program is stored in matter, and the step of method as described in relation to the first aspect is realized when the computer program is executed by processor
Suddenly.
In embodiments of the present invention, user can first carry out the first input in advance when by other people are lent outside mobile terminal, move
Dynamic terminal can determine associated target permission based on the input parameter of the first input, then show and the associated target of target permission
Object.At this point, the permission associated by target object is corresponding with the input parameter of the first input, user can be according to borrower
Identity execute it is matched first input so that the identities match of target permission and borrower associated by target object, borrow
People can only operate the target object of user's permission under target permission, avoid borrower that the privacy information of user leaks.
Description of the drawings
Fig. 1 is the flow diagram of terminal unlock method in one embodiment of the present of invention.
Fig. 2 is the user interface schematic diagram that terminal unlock method is applicable in one embodiment of the present of invention.
Fig. 3 is the flow diagram of terminal unlock method in an alternative embodiment of the invention.
Fig. 4 is the user interface schematic diagram that terminal unlock method is applicable in an alternative embodiment of the invention.
Fig. 5 is the module diagram of mobile terminal in one embodiment of the present of invention.
Fig. 6 is the module diagram of mobile terminal in an alternative embodiment of the invention.
Fig. 7 be the present invention another embodiment in mobile terminal module diagram.
Fig. 8 is the hardware architecture diagram of mobile terminal in one embodiment of the present of invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts
Example, shall fall within the protection scope of the present invention.
The technical solution provided below in conjunction with attached drawing, each embodiment that the present invention will be described in detail.It should be noted that describing
When specific embodiment, the size of the serial number of each process is not meant that the order of the execution order, and the execution of each process sequence should be with
Its function and internal logic determine that the implementation process of the embodiments of the invention shall not be constituted with any limitation.
Fig. 1 is the flow diagram of terminal unlock method in one embodiment of the present of invention, and Fig. 2 is the reality of the present invention
Apply the user interface schematic diagram that terminal unlock method in example is applicable in.The terminal unlock method can be applied to such as smart mobile phone
Mobile terminal, this method may include steps of.
S101, the first input for receiving user.
In practical applications, user can lend other people in use, being held in advance to mobile terminal 10 outside mobile terminal 10
Row first inputs.After mobile terminal 10 receives the first input, screen wake actions, terminal unlocking action, system can be executed
The arbitrary combination of permission switching action or above-mentioned action.For example, mobile terminal 10 can receive the first input in the case where ceasing screen state,
And screen wake actions are executed based on the first input.
It can be that user is advance that first input and mobile terminal, which receive the incidence relation of performed action after the first input,
Setting, can also be that mobile terminal 10 is automatically generated and selected for user.It is connect by establishing the first input and mobile terminal
Receive the incidence relation of performed action after the first input, user can be controlled by certain types of first input it is mobile eventually
End 10 executes associated action, to improve the operating efficiency of mobile terminal 10.
In embodiments of the present invention, the first input can be any type of behaviour that user executes on mobile terminal 10
Make, such as can be for the touch operation of the screen 11 of mobile terminal, for the fingerprint of fingerprint identification module on mobile terminal
Identification operates, for the face recognition operation of photographing module on mobile terminal or the arbitrary combination of aforesaid operations.First input tool
There are input parameter, input parameter to be used to describe the characteristics such as direction, the position of the first input;It is inputted based on different types of first,
Its input parameter would also vary from.
By taking the first input is for the slide of the screen 11 of mobile terminal as an example, the input parameter of the first input can be with
It is at least one in input direction and input opereating specification including the first input.
Glide direction when input direction can be the screen 11 of user's finger touch mobile terminal.Such as user's finger exists
It is moved horizontally on screen 11, then input direction is then the horizontal glide direction;It as an example, can also be to by user's finger
Glide direction in some set regards as same input direction, for example, screen 11 can be divided into 4 quadrants,
3 parts will be divided into according to angle in first quartile, by the glide direction in 0 to 30 ° delimit for the first input direction,
It is third input that glide direction in 30 ° to 60 °, which delimited and delimited for the glide direction in the second input direction, 60 ° to 90 °,
Direction.
Input opereating specification can be the region that user's finger is touched in 11 sliding process of screen of mobile terminal.Example
Such as, screen can be divided into multiple subregions by user in advance, and the subregion that user's finger is touched is operated as input
Range.Wherein, a variety of examples of mode of screen 11 are divided, for example, can be by the screen 11 of mobile terminal according to four-quadrant
Quadrant area obtained by classifying, the quadrant area that user's finger is touched is as the input opereating specification of user.
In embodiments of the present invention, after mobile terminal 10 receives the first input, it is also necessary to be carried out by unlocking operation
Subscriber authentication can just carry out terminal unlocking operation, to ensure the importance of privacy information in mobile terminal 10.Citing comes
It says, unlock operation can be password unlock, pattern unlock, fingerprint recognition unlock, Application on Voiceprint Recognition unlock, iris recognition unlock, face
The types such as portion's identification unlock, can also be the arbitrary combination of aforementioned all types of operations.
By taking unlock operation is fingerprint recognition unlock as an example, mobile terminal 10, which is provided with the fingerprint for detecting user fingerprints, to be known
Other module, fingerprint identification module can be set to the lower section of screen 11, when user's finger touches corresponding region on screen 11, fingerprint
Identification module can then get the finger print information of user's finger.In the embodiment of invention, it can show on the screen default
Mark 12, default mark 12 may remind the user that finger being positioned over can be realized fingerprint recognition unlock herein.
Optionally, as an example, unlock operation be aforementioned user's finger touch screen 11 on preset mark 12 with
For the mode being unlocked, it can limit only in the screen 11 of terminal unlocking and user's finger without departing from mobile terminal,
Slide of the user's finger on screen 11 is just received, slide and unlock operation at this time are sequence, and movement is eventually
End 10 can keep monitoring to slide on screen after detecting unlock operation, if there is coherent with unlock operation
Slide, then receive the slide, on the contrary then think that the slide is user misoperation.
Based on foregoing teachings it is found that since slide and unlock operation are sequence, user can operate in unlock
Slide is directly done afterwards, no longer needs to do waste motion, the user experience is improved;And mobile terminal can only monitor unlock behaviour
Slide after work, slide at this time is for adjusting mobile terminal system permission, improving received sliding
The accuracy of operation;And mobile terminal reduces the power consumption of mobile terminal without monitoring slide on screen in real time
And processor resource consumption.
Certainly, in other embodiments of the invention, it is for fingerprint identification module on mobile terminal in the first input
When fingerprint recognition operates, the input parameter of the first input still may include the input direction and input opereating specification of the first input
In it is at least one.Wherein.Wherein, input direction can be the glide direction of user's touch fingerprint identification module, such as can be
Horizontal glide direction relative to fingerprint identification module or vertical sliding direction;Input opereating specification can be that user carries out fingerprint
The finger type of identification, such as can be thumb or index finger.Do not make expansion narration herein.
S102, it is inputted in response to described first, display and the associated target object of target permission, the target permission and institute
The input parameter for stating the first input is associated.
Mobile terminal 10 is after receiving the first input, it is first determined the input parameter with the first input, then based on input
Parameter determines associated target permission.Target permission refers to the operating right that user is directed to target object, such as can be mesh
Mark the startup permission, display permission, deletion permission etc. of object.User can preset the association of input parameter and target permission
Relationship, it is only necessary to ensure that the input parameter of each first input can determine that out unique target permission.
Mobile terminal 10 after determining target permission associated with the input parameter of the first input, with target weigh by display
Associated target object is limited, target object can be any type of object by the screen display of mobile terminal.Due to mesh
It is associated to mark object and target permission, user is only capable of operating target object under target permission, with realize by target permission come
Limit operation behavior of the user to target object.
In practical applications, user can first carry out the first input in advance when by other people are lent outside mobile terminal 10, mobile
Terminal can determine associated target permission based on the input parameter of the first input, then show and the associated target pair of target permission
As.At this point, the permission associated by target object is corresponding with the input parameter of the first input, user can be according to borrower's
Identity executes matched first input so that the identities match of target permission and borrower associated by target object, borrower
The target object that user's permission can only be operated under target permission, avoids borrower that the privacy information of user leaks.
In embodiments of the present invention, target object can be the application icon 13 shown by the screen 11 of mobile terminal,
Application icon 13 can be the icon of mounted application program in mobile terminal.Since target object is related to target permission
Connection, user can only be in the application icon 13 of target permission limited shown by operation display 11.
By taking input parameter is input direction as an example, multigroup associated input direction and target permission, example can be preset
It can such as be set according to following incidence relation:It is complete system permission by the associated target authority setting of first direction,
It can be used based on any application program in the mobile terminal under the permission, mobile terminal at this time can be for public use to complete
The people of trust uses;It is limitation system permission by the associated target authority setting of second direction, based on the movement under the permission
Terminal has certain applications program that can not use, such as the application of the photograph album with secret photo or the payment with money account information
Using these application programs can be locked or hide, and mobile terminal at this time can lend the people's use trusted part, example outside
Such as child;It is emergency system permission by the associated target authority setting of third direction, only based on the mobile terminal under the permission
There is the general communication application such as call, short message that can use, mobile terminal at this time can lend stranger's use outside.
By the way that the application icon 13 shown by screen 11 to be associated with target permission, user can be according to the body of borrower
Part, the operating right of the application program corresponding to application icon 13 is set, certain application programs is prevented to be activated or maliciously grasped
Make, leads to the leakage of user privacy information.
Optionally, as an example, described the can also be obtained before showing application icon 13 based on the first input
The input trajectory 14 of one input.Still by taking the first input is for the slide of the screen 11 of mobile terminal as an example, input trajectory
14 be sliding trace of the user's finger on screen 11, sliding trace can be straight line, can also be for example circular arc, annulus,
The complex patterns such as square ring.
Subsequently, it after determining the input trajectory 14 of the first input, can be shown in the default side of input trajectory 14 and institute
The associated N number of application icon 13 of target permission is stated, the number N of the application icon 13 is related to the length of the input trajectory 14
Connection.For example, application icon 13 can be arranged in the both sides of input trajectory 14 or some set unilateral side, application icon 13 can edges
The extending direction for input trajectory 14 is arranged at equal intervals.Also, the application icon positioned at 14 both sides of input trajectory can also be according to
Some icon ordered arrangement, such as can determine figure according to the frequency of usage of the application program corresponding to these application icons
Mark sequence, comes foremost, user can be in slide, preferentially by the application icon of the highest application program of frequency of usage
Choose the highest application icon of frequency of usage.Certainly, icon sequence can also be other types, such as the class according to application program
Type is ranked up or is ranked up according to the color of application icon.
Since application icon 13 is located at the default side of input trajectory 14, user can observe desired application program
Icon when, select application icon 13 at the first time.
Optionally, as another example, first can also be obtained before showing application icon 13 based on the first input
The input opereating specification of input.Still by taking the first input is for the slide of the screen 11 of mobile terminal as an example, input operation
Range can be quadrant area of the screen 11 according to four-quadrant classification gained, and the quadrant area that user's finger is touched is as use
The input opereating specification at family, and application icon 13 is shown in the quadrant area.
Since the touch area of user's finger on the screen is to input opereating specification, application icon 13 is located at input and operates
Corresponding display area in range, user can be selected at the first time to be somebody's turn to do when observing the icon of desired application program
Application icon 13.
Certainly, in other embodiments of the invention, target object can be mobile terminal with target interface, target interface
Screen 11 show all types of user interface, such as can be system desktop, standby interface, notification bar interface, user lock move
Shown interface when dynamic terminal 10, some preset application program application interface, some preset redirect interface etc..
By the way that the target interface shown by screen 11 is associated with target permission, user can according to the identity of borrower,
The interface that can see of setting borrower and borrower can prevent certain with privacy of user the operating right at the interface
Interface is borrowed people and sees, leads to the leakage of privacy of user.
Fig. 3 is the flow diagram of terminal unlock method in an alternative embodiment of the invention, and Fig. 4 is the another of the present invention
The user interface schematic diagram that terminal unlock method is applicable in a embodiment.The terminal unlock method can be applied to aforementioned intelligent
The mobile terminal of mobile phone, this method may include steps of.
S201, the first input for receiving user.
S202, it is inputted in response to described first, display and the associated N number of application icon of target permission, the target permission
It is associated with the input parameter of the first input.
Here step S201 and S202 can refer to the content of step S101 and S102 in previous embodiment, not do herein
It repeats.
S203, the second input for receiving the selection target application icon from N number of application icon.
User can be directed to mobile terminal execution second and input, the second input can be needle when viewing application icon
Can also be the push action for some physical button on mobile terminal, very to the touch action of the screen 11 of mobile terminal
It selectes and acts to the voice that can also be for mobile terminal.After mobile terminal 10 receives the second input, the second input is determined
Targeted intended application icon.
Still by taking the first input is for the slide of the screen 11 of mobile terminal as an example, user can be moved through in finger
The intended application icon for wanting to choose is moved in journey.The default side of input trajectory 14 is especially arranged in application icon 13
When, user can observe the application icon 13 oneself thought corresponding to application program to be started, change sliding side immediately
Always it is moved to the top of the application icon, to choose the intended application icon.
S204, it is inputted in response to described second, starts the corresponding destination application of the intended application icon.
After showing that application icon, user can determine target permission with the first input on the screen, pass through the second input
Destination application directly is chosen, to improve the starting efficiency of application program, improves user experience.
It is described in detail according to the method for the embodiment of the present invention above in association with Fig. 1 to Fig. 4.It is retouched in detail below in conjunction with Fig. 5
State mobile terminal according to the ... of the embodiment of the present invention.As shown in figure 5, mobile terminal 300 includes:
First input receiving module 301, the first input for receiving user;
First input respond module 302, in response to first input, display and the associated target pair of target permission
As the target permission is associated with the input parameter of the first input;
Wherein, the input parameter includes at least one of input direction and input opereating specification.
In one embodiment, the first input respond module 302, including:
First acquisition unit 321, in response to first input, obtaining the input parameter phase with first input
Associated target permission;
First display unit 322, for showing and the associated target interface of target permission.
In one embodiment, the first input respond module 302, including:
First acquisition unit 321, in response to first input, obtaining the input parameter phase with first input
Associated target permission;
Second display unit 323, for showing and the associated N number of application icon of the target permission.
Mobile terminal provided in an embodiment of the present invention can realize that mobile terminal is realized each in the embodiment of the method for Fig. 1
Process, to avoid repeating, which is not described herein again.
In embodiments of the present invention, user can first carry out the first input in advance when by other people are lent outside mobile terminal, move
Dynamic terminal can determine associated target permission based on the input parameter of the first input, then show and the associated target of target permission
Object.At this point, the permission associated by target object is corresponding with the input parameter of the first input, user can be according to borrower
Identity execute it is matched first input so that the identities match of target permission and borrower associated by target object, borrow
People can only operate the target object of user's permission under target permission, avoid borrower that the privacy information of user leaks.
Fig. 6 is the module diagram of the mobile terminal in another embodiment of the present invention, mobile whole compared with previous embodiment
End 300 further includes track acquisition module 303 and range acquisition module 304, the two modules have following application.
In one embodiment, the track acquisition module 303, in the display and the associated N of target permission
Before a application icon, the input trajectory of first input is obtained;
The first input respond module 302, is weighed for being shown in the default side of the input trajectory with the target
Associated N number of application icon is limited, the number N of the application icon is associated with the length of the input trajectory.
In one embodiment, the range acquisition module, for the display with the target permission is associated N number of answers
Before icon, the input opereating specification of first input is obtained;
The first input respond module, for being shown and the mesh in the corresponding display area of the input opereating specification
Mark the associated N number of application icon of permission.
Mobile terminal provided in an embodiment of the present invention can realize that mobile terminal is realized each in the embodiment of the method for Fig. 1
Process, to avoid repeating, which is not described herein again.
In embodiments of the present invention, user can first carry out the first input in advance when by other people are lent outside mobile terminal, move
Dynamic terminal can determine associated target permission based on the input parameter of the first input, then show and the associated target of target permission
Object.At this point, the permission associated by target object is corresponding with the input parameter of the first input, user can be according to borrower
Identity execute it is matched first input so that the identities match of target permission and borrower associated by target object, borrow
People can only operate the target object of user's permission under target permission, avoid borrower that the privacy information of user leaks.
Fig. 7 is the module diagram of the mobile terminal in further embodiment of this invention, mobile whole compared with previous embodiment
End 300 further includes the second input receiving module 305 and second input respond module 306, the two modules have following application.
Second input receiving module 305, for it is described display with the associated N number of application icon of the target permission it
Afterwards, the second input of the selection target application icon from N number of application icon is received;
Second input respond module 306, in response to second input, it is corresponding to start the intended application icon
Destination application.
Mobile terminal provided in an embodiment of the present invention can realize that mobile terminal is realized each in the embodiment of the method for Fig. 3
Process, to avoid repeating, which is not described herein again.
In embodiments of the present invention, user can first carry out the first input in advance when by other people are lent outside mobile terminal, move
Dynamic terminal can determine associated target permission based on the input parameter of the first input, then show and the associated target of target permission
Object.At this point, the permission associated by target object is corresponding with the input parameter of the first input, user can be according to borrower
Identity execute it is matched first input so that the identities match of target permission and borrower associated by target object, borrow
People can only operate the target object of user's permission under target permission, avoid borrower that the privacy information of user leaks.
A kind of hardware architecture diagram of Fig. 8 mobile terminals of each embodiment to realize the present invention, the mobile terminal 400
Including but not limited to:Radio frequency unit 401, audio output unit 403, input unit 404, sensor 405, is shown network module 402
Show the components such as unit 406, user input unit 407, interface unit 408, memory 409, processor 410 and power supply 411.
It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 8 does not constitute the restriction to mobile terminal, it is mobile whole
End may include either combining certain components or different components arrangement than illustrating more or fewer components.In the present invention
In embodiment, mobile terminal includes but not limited to mobile phone, tablet computer, laptop, palm PC, car-mounted terminal, can wear
Wear equipment and pedometer etc..
Wherein, processor 410 are used for:
In response to the first input that user input unit 407 receives, the display of control display unit 406 is associated with target permission
Target object, the target permission with it is described first input input parameter it is associated;
Wherein, the input parameter includes at least one of input direction and input opereating specification.
To sum up, in embodiments of the present invention, it is defeated can to first carry out first when by other people are lent outside mobile terminal in advance by user
Enter, mobile terminal can determine associated target permission based on the input parameter of the first input, then show and be associated with target permission
Target object.At this point, the permission associated by target object is corresponding with the input parameter of the first input, user can basis
The identity of borrower executes matched first input so that the identity of target permission and borrower associated by target object
Match, borrower can only operate the target object of user's permission under target permission, avoid borrower will be outside the privacy information of user
It lets out.
It should be understood that the embodiment of the present invention in, radio frequency unit 401 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 410 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 401 includes but not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 401 can also by radio communication system and network and other set
Standby communication.
Mobile terminal has provided wireless broadband internet to the user by network module 402 and has accessed, and such as user is helped to receive
Send e-mails, browse webpage and access streaming video etc..
It is that audio output unit 403 can receive radio frequency unit 401 or network module 402 or in memory 409
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 403 can also be provided and be moved
The relevant audio output of specific function that dynamic terminal 400 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 403 includes loud speaker, buzzer and receiver etc..
Input unit 404 is for receiving audio or video signal.Input unit 404 may include graphics processor
(Graphics Processing Unit, GPU) 4041 and microphone 4042, graphics processor 4041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 406.Through graphics processor 4041, treated that picture frame can be deposited
Storage is sent in memory 409 (or other storage mediums) or via radio frequency unit 401 or network module 402.Mike
Wind 4042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be
The format output of mobile communication base station can be sent to via radio frequency unit 401 by being converted in the case of telephone calling model.
Mobile terminal 400 further includes at least one sensor 405, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 4061, and proximity sensor can close when mobile terminal 400 is moved in one's ear
Display panel 4061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify mobile terminal posture (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes
Sensor 405 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet
Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 406 is for showing information input by user or being supplied to the information of user.Display unit 406 can wrap
Display panel 4061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 4061.
User input unit 407 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family is arranged and the related key signals input of function control.Specifically, user input unit 407 include touch panel 4071 and
Other input equipments 4072.Touch panel 4071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 4071 or in touch panel 4071
Neighbouring operation).Touch panel 4071 may include both touch detecting apparatus and touch controller.Wherein, touch detection
Device detects the touch orientation of user, and detects the signal that touch operation is brought, and transmits a signal to touch controller;Touch control
Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 410, receiving area
It manages the order that device 410 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc.
Type realizes touch panel 4071.In addition to touch panel 4071, user input unit 407 can also include other input equipments
4072.Specifically, other input equipments 4072 can include but is not limited to physical keyboard, function key (such as volume control button,
Switch key etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 4071 can be covered on display panel 4061, when touch panel 4071 is detected at it
On or near touch operation after, send processor 410 to determine the type of touch event, be followed by subsequent processing device 410 according to touch
The type for touching event provides corresponding visual output on display panel 4061.Although in fig. 8, touch panel 4071 and display
Panel 4061 is to realize the function that outputs and inputs of mobile terminal as two independent components, but in some embodiments
In, can be integrated by touch panel 4071 and display panel 4061 and realize the function that outputs and inputs of mobile terminal, it is specific this
Place does not limit.
Interface unit 408 is the interface that external device (ED) is connect with mobile terminal 400.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 408 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in mobile terminal 400 or can be used in 400 He of mobile terminal
Transmission data between external device (ED).
Memory 409 can be used for storing software program and various data.Memory 409 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 409 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 410 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 409, and calls and is stored in storage
Data in device 409 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Reason device 410 may include one or more processing units;Preferably, processor 410 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 410.
Mobile terminal 400 can also include the power supply 411 (such as battery) powered to all parts, it is preferred that power supply 411
Can be logically contiguous by power-supply management system and processor 410, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, mobile terminal 400 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 410, and memory 409 is stored in
On memory 409 and the computer program that can be run on the processor 410, the computer program are executed by processor 410
Each process of the above-mentioned terminal unlock method embodiments of Shi Shixian, and identical technique effect can be reached, to avoid repeating, here
It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned terminal unlock method embodiment, and energy when being executed by processor
Reach identical technique effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence " including one ... ", it is not excluded that including
There is also other identical elements in the process of the element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within the protection of the present invention.
Claims (14)
1. a kind of terminal unlock method is applied to mobile terminal, which is characterized in that including:
Receive the first input of user;
In response to first input, display and the associated target object of target permission, the target permission and described first defeated
The input parameter entered is associated;
Wherein, the input parameter includes at least one of input direction and input opereating specification.
2. according to the method described in claim 1, it is characterized in that, described in response to first input, display is weighed with target
Associated target object is limited, including:
In response to first input, target permission associated with the input parameter of the first input is obtained;
Display and the associated target interface of target permission.
3. according to the method described in claim 1, it is characterized in that, described in response to first input, display is weighed with target
Associated target object is limited, including:
In response to first input, target permission associated with the input parameter of the first input is obtained;
Display and the associated N number of application icon of the target permission.
4. according to the method described in claim 3, it is characterized in that, the display and the associated N number of application of the target permission
After icon, the method further includes:
Receive the second input of the selection target application icon from N number of application icon;
In response to second input, start the corresponding destination application of the intended application icon.
5. according to the method described in claim 3, it is characterized in that, it is described receive user first input after, the display
Before the associated N number of application icon of the target permission, the method further includes:
Obtain the input trajectory of first input;
The display and the associated N number of application icon of the target permission, including:
It is shown and the associated N number of application icon of the target permission, the application icon in the default side of the input trajectory
Number N it is associated with the length of the input trajectory.
6. according to the method described in claim 3, it is characterized in that, it is described receive user first input after, the display
Before the associated N number of application icon of the target permission, the method further includes:
Obtain the input opereating specification of first input;
The display and the associated N number of application icon of the target permission, including:
It is shown and the associated N number of application icon of the target permission in the corresponding display area of the input opereating specification.
7. a kind of mobile terminal, which is characterized in that including:
First input receiving module, the first input for receiving user;
First input respond module, for being inputted in response to described first, display and the associated target object of target permission are described
Target permission is associated with the input parameter of the first input;
Wherein, the input parameter includes at least one of input direction and input opereating specification.
8. mobile terminal according to claim 7, which is characterized in that the first input respond module, including:
First acquisition unit, it is associated with the input parameter of the first input in response to first input, obtaining
Target permission;
First display unit, for showing and the associated target interface of target permission.
9. mobile terminal according to claim 7, which is characterized in that the first input respond module, including:
First acquisition unit, it is associated with the input parameter of the first input in response to first input, obtaining
Target permission;
Second display unit, for showing and the associated N number of application icon of the target permission.
10. mobile terminal according to claim 9, which is characterized in that the mobile terminal further includes:
Second input receiving module, for it is described display with the associated N number of application icon of the target permission after, receive from
Second input of selection target application icon in N number of application icon;
Second input respond module, in response to second input, starting the corresponding target of the intended application icon and answering
Use program.
11. mobile terminal according to claim 9, which is characterized in that the mobile terminal further includes track acquisition module;
The track acquisition module is used for after the first input of the reception user, the display and the target permission
Before associated N number of application icon, the input trajectory of first input is obtained;
Second display unit, it is associated N number of with the target permission for being shown in the default side of the input trajectory
Application icon, the number N of the application icon are associated with the length of the input trajectory.
12. mobile terminal according to claim 9, which is characterized in that the mobile terminal further includes range acquisition module;
The range acquisition module is used for after the first input of the reception user, the display and the target permission
Before associated N number of application icon, the input opereating specification of first input is obtained;
Second display unit is closed for being shown in the corresponding display area of the input opereating specification with the target permission
N number of application icon of connection.
13. a kind of mobile terminal, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 6 is realized when the computer program is executed by the processor
Any one of described in terminal unlock method the step of.
14. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes such as terminal unlock method according to any one of claims 1 to 6 when the computer program is executed by processor
The step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810412066.XA CN108710806B (en) | 2018-04-28 | 2018-04-28 | Terminal unlocking method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810412066.XA CN108710806B (en) | 2018-04-28 | 2018-04-28 | Terminal unlocking method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108710806A true CN108710806A (en) | 2018-10-26 |
CN108710806B CN108710806B (en) | 2021-07-30 |
Family
ID=63868639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810412066.XA Active CN108710806B (en) | 2018-04-28 | 2018-04-28 | Terminal unlocking method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108710806B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109766680A (en) * | 2018-12-27 | 2019-05-17 | 维沃移动通信有限公司 | Authority control method and terminal |
CN111027107A (en) * | 2019-12-10 | 2020-04-17 | 维沃移动通信有限公司 | Object display control method and electronic equipment |
CN111435386A (en) * | 2018-12-26 | 2020-07-21 | 深圳富泰宏精密工业有限公司 | Electronic equipment and unlocking method |
CN113282899A (en) * | 2021-04-01 | 2021-08-20 | 维沃移动通信有限公司 | Object management method and device, electronic equipment and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744506A (en) * | 2013-12-26 | 2014-04-23 | 乐视致新电子科技(天津)有限公司 | Electronic device and gesture unlocking method |
CN104503689A (en) * | 2014-11-21 | 2015-04-08 | 小米科技有限责任公司 | Method and device for displaying application interface |
CN104751071A (en) * | 2015-03-16 | 2015-07-01 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105117141A (en) * | 2015-07-23 | 2015-12-02 | 美国掌赢信息科技有限公司 | Application program starting method and electronic device |
CN107704168A (en) * | 2017-09-21 | 2018-02-16 | 维沃移动通信有限公司 | A kind of application program launching method and mobile terminal |
-
2018
- 2018-04-28 CN CN201810412066.XA patent/CN108710806B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103744506A (en) * | 2013-12-26 | 2014-04-23 | 乐视致新电子科技(天津)有限公司 | Electronic device and gesture unlocking method |
CN104503689A (en) * | 2014-11-21 | 2015-04-08 | 小米科技有限责任公司 | Method and device for displaying application interface |
CN104751071A (en) * | 2015-03-16 | 2015-07-01 | 联想(北京)有限公司 | Information processing method and electronic equipment |
CN105117141A (en) * | 2015-07-23 | 2015-12-02 | 美国掌赢信息科技有限公司 | Application program starting method and electronic device |
CN107704168A (en) * | 2017-09-21 | 2018-02-16 | 维沃移动通信有限公司 | A kind of application program launching method and mobile terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111435386A (en) * | 2018-12-26 | 2020-07-21 | 深圳富泰宏精密工业有限公司 | Electronic equipment and unlocking method |
CN111435386B (en) * | 2018-12-26 | 2023-09-29 | 深圳富泰宏精密工业有限公司 | Electronic equipment and unlocking method |
CN109766680A (en) * | 2018-12-27 | 2019-05-17 | 维沃移动通信有限公司 | Authority control method and terminal |
CN109766680B (en) * | 2018-12-27 | 2021-01-08 | 维沃移动通信有限公司 | Authority control method and terminal |
CN111027107A (en) * | 2019-12-10 | 2020-04-17 | 维沃移动通信有限公司 | Object display control method and electronic equipment |
CN113282899A (en) * | 2021-04-01 | 2021-08-20 | 维沃移动通信有限公司 | Object management method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108710806B (en) | 2021-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109918930A (en) | A kind of information protecting method and terminal device | |
CN109407917A (en) | A kind of method and apparatus that Application Status is set | |
US11176228B2 (en) | Application interface display method, apparatus, and terminal, and storage medium | |
CN108021825A (en) | A kind of method for protecting privacy, mobile terminal | |
CN108710806A (en) | A kind of terminal unlock method, mobile terminal | |
CN109002340A (en) | A kind of screen locking method and electronic equipment | |
CN109284150A (en) | A kind of method and terminal starting application program | |
WO2020199987A1 (en) | Message display method and mobile terminal | |
CN108416203A (en) | A kind of unlocking screen method and mobile terminal | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN108174012A (en) | A kind of authority control method and mobile terminal | |
CN108196740A (en) | A kind of icon display method, device and mobile terminal | |
CN110035183A (en) | Information sharing method and terminal | |
CN108376096A (en) | A kind of message display method and mobile terminal | |
CN108664818A (en) | A kind of unlock control method and device | |
CN109800606A (en) | A kind of display control method and mobile terminal | |
CN108762641A (en) | A kind of method for editing text and terminal device | |
CN108055400A (en) | A kind of wallpaper switching method and mobile terminal | |
CN108959963A (en) | A kind of management method and terminal device of application program | |
CN109992939A (en) | A kind of login method and terminal device | |
CN110096893A (en) | A kind of object method for limiting and terminal device | |
CN109547330A (en) | A kind of information sharing method and device | |
CN109460649A (en) | A kind of document handling method and terminal device | |
CN109446794A (en) | A kind of cipher-code input method and its mobile terminal | |
CN108810276A (en) | A kind of method and mobile terminal of face recognition |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |