CN108959888B - Terminal operation control method and device - Google Patents

Terminal operation control method and device Download PDF

Info

Publication number
CN108959888B
CN108959888B CN201810745658.3A CN201810745658A CN108959888B CN 108959888 B CN108959888 B CN 108959888B CN 201810745658 A CN201810745658 A CN 201810745658A CN 108959888 B CN108959888 B CN 108959888B
Authority
CN
China
Prior art keywords
terminal
collected
information
face information
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810745658.3A
Other languages
Chinese (zh)
Other versions
CN108959888A (en
Inventor
赵萌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201810745658.3A priority Critical patent/CN108959888B/en
Publication of CN108959888A publication Critical patent/CN108959888A/en
Application granted granted Critical
Publication of CN108959888B publication Critical patent/CN108959888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The disclosure relates to a terminal operation control method and device. The terminal operation control method comprises the following steps: when the terminal is in an unlocking state, acquiring face information and/or fingerprint information; determining whether to limit the operation of the terminal according to the acquired face information and/or fingerprint information; and when the operation of the terminal is determined to be limited, prohibiting the specific operation of the terminal. According to the terminal operation control method and device, operation control of a stranger on the terminal can be avoided, privacy information stored in the terminal is protected, and the safety of the terminal is improved.

Description

Terminal operation control method and device
Technical Field
The present disclosure relates to the field of terminal technologies, and in particular, to a terminal operation control method and apparatus.
Background
With the development of scientific technology, terminals such as mobile phones and Pad (tablet personal computers) are becoming more and more popular in people's daily life. At present, a terminal has a single function of calling, short messages and the like, and also has a composite function of photographing, Global Positioning System (GPS), various applications (applications) and the like. Terminals have become a common tool for preserving important private information of users.
Disclosure of Invention
In order to overcome the problems in the related art, the present disclosure provides a terminal operation control method and apparatus.
According to a first aspect of the embodiments of the present disclosure, there is provided a terminal operation control method, applied to a terminal, the method including:
when the terminal is in an unlocking state, acquiring face information and/or fingerprint information;
determining whether to limit the operation of the terminal according to the acquired face information and/or fingerprint information;
and when the operation of the terminal is determined to be limited, prohibiting the specific operation of the terminal.
In a possible implementation manner, when the terminal is in an unlocked state, acquiring face information and/or fingerprint information includes:
when the terminal is in an unlocked state, if the photo album of the terminal is detected to be in a browsing state, acquiring face information and/or fingerprint information.
In a possible implementation manner, determining whether to limit the operation of the terminal according to the acquired face information includes:
when single face information is collected, if the collected single face information does not belong to a verified face, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information does not belong to the face which passes the verification, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
In a possible implementation manner, determining whether to limit the operation of the terminal according to the acquired face information includes:
when single face information is collected, if the collected single face information does not belong to a current display image and/or an image to be displayed of an album which passes the face verification and does not exist in the terminal, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information do not belong to the current display image and/or the image to be displayed of the photo album which passes the verification of the face and does not exist in the terminal, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
In one possible implementation manner, determining whether to limit the operation of the terminal according to the acquired fingerprint information includes:
determining to limit the operation of the terminal when the acquired fingerprint information does not belong to a verified fingerprint; or
And when the effective fingerprint information is not acquired, determining to limit the operation of the terminal.
In one possible implementation manner, determining whether to limit the operation of the terminal according to the acquired face information and fingerprint information includes:
when the fingerprint information and the single face information are collected, if the collected single face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In one possible implementation manner, determining whether to limit the operation of the terminal according to the acquired face information and fingerprint information includes:
when fingerprint information and single face information are collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face or does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information in the collected face information does not belong to the verified face or the photo album current display image and/or the image to be displayed of the terminal and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In one possible implementation, the acquiring face information includes:
face information is collected by structured light.
In one possible implementation, collecting fingerprint information includes:
and fingerprint information is collected through a display screen of the terminal.
In one possible implementation, the specific operation includes at least one of a click operation, a slide operation, a pinch operation, a return operation, and an exit operation.
According to a second aspect of the embodiments of the present disclosure, there is provided a terminal operation control apparatus applied to a terminal, the apparatus including:
the terminal comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring face information and/or fingerprint information when the terminal is in an unlocked state;
the determining module is used for determining whether to limit the operation on the terminal according to the acquired face information and/or fingerprint information;
and the prohibiting module is used for prohibiting specific operation on the terminal when the operation on the terminal is determined to be limited.
In one possible implementation manner, the acquisition module is configured to:
when the terminal is in an unlocked state, if the photo album of the terminal is detected to be in a browsing state, acquiring face information and/or fingerprint information.
In one possible implementation manner, the determining module is configured to:
when single face information is collected, if the collected single face information does not belong to a verified face, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information does not belong to the face which passes the verification, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
In one possible implementation manner, the determining module is configured to:
when single face information is collected, if the collected single face information does not belong to a current display image and/or an image to be displayed of an album which passes the face verification and does not exist in the terminal, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information do not belong to the current display image and/or the image to be displayed of the photo album which passes the verification of the face and does not exist in the terminal, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
In one possible implementation manner, the determining module is configured to:
determining to limit the operation of the terminal when the acquired fingerprint information does not belong to a verified fingerprint; or
And when the effective fingerprint information is not acquired, determining to limit the operation of the terminal.
In one possible implementation manner, the determining module is configured to:
when the fingerprint information and the single face information are collected, if the collected single face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In one possible implementation manner, the determining module is configured to:
when fingerprint information and single face information are collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face or does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information in the collected face information does not belong to the verified face or the photo album current display image and/or the image to be displayed of the terminal and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In one possible implementation, the acquisition module includes a first acquisition submodule;
the first acquisition submodule is used for acquiring the face information through structured light.
In one possible implementation, the acquisition module includes a second acquisition submodule;
and the second acquisition submodule is used for acquiring fingerprint information through a display screen of the terminal.
In one possible implementation, the specific operation includes at least one of a click operation, a slide operation, a pinch operation, a return operation, and an exit operation.
According to a third aspect of the embodiments of the present disclosure, there is provided a terminal operation control apparatus including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to carry out the above-described method when executed.
According to a fourth aspect of embodiments of the present disclosure, there is provided a non-transitory computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects: according to the terminal operation control method and device, when the terminal is in an unlocking state, the face information and/or the fingerprint information are collected, whether the operation on the terminal is limited or not is determined according to the collected face information and/or the fingerprint information, and when the operation on the terminal is determined to be limited, the specific operation on the terminal is forbidden, so that the operation control on the terminal by a stranger can be avoided, the privacy information stored in the terminal is protected, and the safety of the terminal is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flowchart illustrating a terminal operation control method according to an exemplary embodiment.
Fig. 2 is a flowchart illustrating a terminal operation control method according to an exemplary embodiment.
Fig. 3 is a block diagram illustrating a terminal operation control apparatus according to an exemplary embodiment.
Fig. 4 is a block diagram illustrating a terminal operation control apparatus according to an exemplary embodiment.
Fig. 5 is a block diagram illustrating a terminal operation control apparatus 800 according to an exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
Fig. 1 is a flowchart illustrating a terminal operation control method according to an exemplary embodiment. The method is applied to the terminal. As shown in fig. 1, the following steps S11 to S13 are included.
In step S11, face information and/or fingerprint information is collected while the terminal is in the unlocked state.
The face information may refer to information having a face feature. Fingerprint information may refer to information having fingerprint characteristics.
In one possible implementation, the acquiring face information includes: face information is collected by structured light. For example, a 3D face is detected by structured light, and the detected 3D face is recognized by a living body recognition technique.
In another possible implementation, the acquired face information is detected and recognized by a conventional machine learning technique (e.g., Adaboost) or a deep learning technique (e.g., CNN network). For example, on the basis of collecting a large amount of sample data, a model for extracting human face features and recognizing a human face is obtained through training. And extracting the face features of the acquired face information through the trained model, and identifying the face according to the extracted face features.
In one possible implementation, collecting fingerprint information includes: fingerprint information is collected through a display screen of the terminal. For example, a fingerprint sensor (e.g., an optical fingerprint sensor) is built in a display screen of the terminal, and fingerprint information is collected through the display screen of the terminal.
In one possible implementation manner, when the terminal is in the unlocked state, the method collects face information and/or fingerprint information (step S11), and includes: when the terminal is in an unlocking state, acquiring face information; or when the terminal is in an unlocking state, fingerprint information is collected; or when the terminal is in an unlocking state, the face information and the fingerprint information are collected.
In step S12, it is determined whether to restrict the operation of the terminal based on the collected face information and/or fingerprint information.
In one possible implementation, determining whether to limit the operation of the terminal according to the acquired face information includes (step S12): when single face information is collected, if the collected single face information does not belong to a verified face, determining that the operation on the terminal is limited; or when a plurality of pieces of face information are collected, if the collected face information does not belong to the face which passes the verification, determining that the operation on the terminal is limited; or when effective face information is not acquired, determining to limit the operation of the terminal.
In one possible implementation, determining whether to limit the operation of the terminal according to the collected fingerprint information (step S12) includes: when the acquired fingerprint information does not belong to the verified fingerprint, determining to limit the operation of the terminal; or when the effective fingerprint information is not acquired, determining to limit the operation of the terminal.
In one possible implementation, determining whether to limit the operation on the terminal according to the acquired face information and fingerprint information (step S12) includes: when the fingerprint information and the single face information are collected, if the collected single face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or when the fingerprint information and the face information are collected, if at least one piece of face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In step S13, when it is determined that the operation on the terminal is restricted, the specific operation on the terminal is prohibited.
In one possible implementation, the specific operation includes at least one of a click operation, a slide operation, a pinch operation, a return operation, and an exit operation.
It should be noted that, although the specific operations are described above by taking a click operation, a slide operation, a pinch operation, a return operation, and an exit operation as examples, those skilled in the art will appreciate that the present disclosure should not be limited thereto. The specific operation can be flexibly set by those skilled in the art according to the actual application scene.
According to the terminal operation control method, when the terminal is in the unlocking state, the face information and/or the fingerprint information are collected, whether the operation on the terminal is limited or not is determined according to the collected face information and/or the fingerprint information, and when the operation on the terminal is determined to be limited, the specific operation on the terminal is forbidden, so that the operation control on the terminal by a stranger can be avoided, the privacy information stored in the terminal is protected, and the safety of the terminal is improved.
Fig. 2 is a flowchart illustrating a terminal operation control method according to an exemplary embodiment. The method is applied to the terminal. As shown in fig. 2, the following steps S21 to S23 are included.
In step S21, when the terminal is in the unlocked state, if it is detected that the album of the terminal is in the browsing state, the face information and/or the fingerprint information are collected.
In a possible implementation manner, when the terminal is in the unlocked state, if it is detected that an album of the terminal is in the browsing state, the method collects face information and/or fingerprint information (step S11), including: when the terminal is in an unlocking state, if the photo album of the terminal is detected to be in a browsing state, acquiring face information; or when the terminal is in an unlocking state, if the photo album of the terminal is detected to be in a browsing state, fingerprint information is collected; or when the terminal is in an unlocking state, if the photo album of the terminal is detected to be in a browsing state, acquiring the face information and the fingerprint information.
In step S22, it is determined whether to restrict the operation of the terminal based on the collected face information and/or fingerprint information.
In one possible implementation, determining whether to limit the operation on the terminal according to the acquired face information (step S22) includes: when single face information is collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the face verification and does not exist in the terminal, determining that the operation on the terminal is limited; or when a plurality of pieces of face information are collected, if the collected face information do not belong to the current display image and/or the image to be displayed of the photo album which passes the verification of the face and does not exist in the terminal, determining that the operation on the terminal is limited; or when effective face information is not acquired, determining to limit the operation of the terminal.
In one possible implementation, determining whether to limit the operation of the terminal according to the collected fingerprint information (step S22) includes: when the acquired fingerprint information does not belong to the verified fingerprint, determining to limit the operation of the terminal; or when the effective fingerprint information is not acquired, determining to limit the operation of the terminal.
In one possible implementation, determining whether to limit the operation on the terminal according to the acquired face information and fingerprint information (step S22) includes: when fingerprint information and single face information are collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face and does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or when the fingerprint information and the face information are collected, if at least one piece of face information in the collected face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face or does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In step S23, when it is determined that the operation on the terminal is restricted, the specific operation on the terminal is prohibited.
According to the terminal operation control method, when the terminal is in the unlocking state, if the photo album of the terminal is detected to be in the browsing state, the face information and/or the fingerprint information are collected, whether the operation on the terminal is limited or not is determined according to the collected face information and/or the fingerprint information, and when the operation on the terminal is determined to be limited, the specific operation on the terminal is forbidden, so that the operation control on the terminal by a stranger can be avoided, the privacy information stored in the terminal is protected, and the safety of the terminal is improved.
Fig. 3 is a block diagram illustrating a terminal operation control apparatus according to an exemplary embodiment. Referring to fig. 3, the apparatus includes an acquisition module 31, a determination module 32 and a prohibition module 33.
The acquisition module 31 is configured to acquire face information and/or fingerprint information when the terminal is in an unlocked state;
the determination module 32 is configured to determine whether to limit the operation of the terminal according to the acquired face information and/or fingerprint information;
the disabling module 33 is configured to disable a specific operation on the terminal when it is determined to limit the operation on the terminal.
According to the terminal operation control device, when the terminal is in an unlocking state, the face information and/or the fingerprint information are collected, whether the operation on the terminal is limited or not is determined according to the collected face information and/or the fingerprint information, and when the operation on the terminal is determined to be limited, the specific operation on the terminal is forbidden, so that the operation control on the terminal by a stranger can be avoided, the privacy information stored in the terminal is protected, and the safety of the terminal is improved.
Fig. 4 is a block diagram illustrating a terminal operation control apparatus according to an exemplary embodiment. Referring to fig. 4:
in a possible implementation manner, the acquisition module 31 is configured to: when the terminal is in an unlocked state, if the photo album of the terminal is detected to be in a browsing state, acquiring face information and/or fingerprint information.
In a possible implementation manner, the determining module 32 is configured to: when single face information is collected, if the collected single face information does not belong to a verified face, determining that the operation on the terminal is limited; or when a plurality of pieces of face information are collected, if the collected face information does not belong to the face which passes the verification, determining that the operation on the terminal is limited; or when effective face information is not acquired, determining to limit the operation of the terminal.
In a possible implementation manner, the determining module 32 is configured to: when single face information is collected, if the collected single face information does not belong to a current display image and/or an image to be displayed of an album which passes the face verification and does not exist in the terminal, determining that the operation on the terminal is limited; or when a plurality of pieces of face information are collected, if the collected face information do not belong to the current display image and/or the image to be displayed of the photo album which passes the verification of the face and does not exist in the terminal, determining that the operation on the terminal is limited; or when effective face information is not acquired, determining to limit the operation of the terminal.
In a possible implementation manner, the determining module 32 is configured to: determining to limit the operation of the terminal when the acquired fingerprint information does not belong to a verified fingerprint; or when valid fingerprint information is not acquired, determining to limit the operation of the terminal.
In a possible implementation manner, the determining module 32 is configured to: when the fingerprint information and the single face information are collected, if the collected single face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or when the fingerprint information and the face information are collected, if at least one piece of face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In a possible implementation manner, the determining module 32 is configured to: when fingerprint information and single face information are collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face or does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or when the fingerprint information and the face information are collected, if at least one piece of face information in the collected face information does not belong to the verified face or the photo album current display image and/or the image to be displayed in the terminal and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
In one possible implementation, the acquisition module 31 includes a first acquisition submodule 311; the first collecting submodule 311 is configured to collect face information through structured light.
In one possible implementation, the acquisition module 31 includes a second acquisition submodule 312; the second collecting sub-module 312 is configured to collect fingerprint information through a display screen of the terminal.
In one possible implementation, the specific operation includes at least one of a click operation, a slide operation, a pinch operation, a return operation, and an exit operation.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 5 is a block diagram illustrating a terminal operation control apparatus 800 according to an exemplary embodiment. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (16)

1. A terminal operation control method is applied to a terminal, and the method comprises the following steps:
when the terminal is in an unlocking state, acquiring face information and/or fingerprint information;
determining whether to limit the operation of the terminal according to the acquired face information and/or fingerprint information;
when determining that the operation on the terminal is limited, forbidding a specific operation on the terminal, wherein the specific operation comprises at least one of click operation, sliding operation, kneading operation, returning operation and quitting operation;
when the terminal is in the unlocking state, the face information and/or the fingerprint information are collected, and the method comprises the following steps:
when the terminal is in an unlocking state, if the photo album of the terminal is detected to be in a browsing state, acquiring face information and/or fingerprint information;
the determining whether to limit the operation of the terminal according to the acquired face information and fingerprint information includes:
when fingerprint information and single face information are collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face or does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information in the collected face information does not belong to the verified face or the photo album current display image and/or the image to be displayed of the terminal and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
2. The method of claim 1, wherein determining whether to restrict the operation of the terminal according to the collected face information comprises:
when single face information is collected, if the collected single face information does not belong to a verified face, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information does not belong to the face which passes the verification, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
3. The method of claim 1, wherein determining whether to restrict the operation of the terminal according to the collected face information comprises:
when single face information is collected, if the collected single face information does not belong to a current display image and/or an image to be displayed of an album which passes the face verification and does not exist in the terminal, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information do not belong to the current display image and/or the image to be displayed of the photo album which passes the verification of the face and does not exist in the terminal, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
4. The method of claim 1, wherein determining whether to restrict the operation of the terminal according to the collected fingerprint information comprises:
determining to limit the operation of the terminal when the acquired fingerprint information does not belong to a verified fingerprint; or
And when the effective fingerprint information is not acquired, determining to limit the operation of the terminal.
5. The method of claim 1, wherein determining whether to restrict the operation of the terminal according to the collected face information and fingerprint information comprises:
when the fingerprint information and the single face information are collected, if the collected single face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
6. The method of claim 1, wherein collecting face information comprises:
face information is collected by structured light.
7. The method of claim 1, wherein collecting fingerprint information comprises:
and fingerprint information is collected through a display screen of the terminal.
8. A terminal operation control apparatus, applied to a terminal, the apparatus comprising:
the terminal comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring face information and/or fingerprint information when the terminal is in an unlocked state;
the determining module is used for determining whether to limit the operation on the terminal according to the acquired face information and/or fingerprint information;
the terminal comprises a prohibition module, a control module and a display module, wherein the prohibition module is used for prohibiting specific operation on the terminal when the operation on the terminal is determined to be limited, and the specific operation comprises at least one of click operation, sliding operation, kneading operation, returning operation and quitting operation;
the acquisition module is used for:
when the terminal is in an unlocking state, if the photo album of the terminal is detected to be in a browsing state, acquiring face information and/or fingerprint information;
the determining module is configured to:
when fingerprint information and single face information are collected, if the collected single face information does not belong to the current display image and/or the image to be displayed of the photo album which passes the verification face or does not exist in the terminal, and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information in the collected face information does not belong to the verified face or the photo album current display image and/or the image to be displayed of the terminal and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
9. The apparatus of claim 8, wherein the determining module is configured to:
when single face information is collected, if the collected single face information does not belong to a verified face, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information does not belong to the face which passes the verification, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
10. The apparatus of claim 8, wherein the determining module is configured to:
when single face information is collected, if the collected single face information does not belong to a current display image and/or an image to be displayed of an album which passes the face verification and does not exist in the terminal, determining that the operation on the terminal is limited; or
When a plurality of pieces of face information are collected, if the collected face information do not belong to the current display image and/or the image to be displayed of the photo album which passes the verification of the face and does not exist in the terminal, determining that the operation on the terminal is limited; or
And when the effective face information is not acquired, determining to limit the operation of the terminal.
11. The apparatus of claim 8, wherein the determining module is configured to:
determining to limit the operation of the terminal when the acquired fingerprint information does not belong to a verified fingerprint; or
And when the effective fingerprint information is not acquired, determining to limit the operation of the terminal.
12. The apparatus of claim 8, wherein the determining module is configured to:
when the fingerprint information and the single face information are collected, if the collected single face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited; or
When the fingerprint information and the face information are collected, if at least one piece of face information does not belong to the verified face and the collected fingerprint information does not belong to the verified fingerprint, determining that the operation on the terminal is limited.
13. The apparatus of claim 8, wherein the acquisition module comprises a first acquisition sub-module;
the first acquisition submodule is used for acquiring the face information through structured light.
14. The apparatus of claim 8, wherein the acquisition module comprises a second acquisition sub-module;
and the second acquisition submodule is used for acquiring fingerprint information through a display screen of the terminal.
15. A terminal operation control device characterized by comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to implement the method of any one of claims 1 to 7.
16. A non-transitory computer readable storage medium having computer program instructions stored thereon, wherein the computer program instructions, when executed by a processor, implement the method of any of claims 1 to 7.
CN201810745658.3A 2018-07-09 2018-07-09 Terminal operation control method and device Active CN108959888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810745658.3A CN108959888B (en) 2018-07-09 2018-07-09 Terminal operation control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810745658.3A CN108959888B (en) 2018-07-09 2018-07-09 Terminal operation control method and device

Publications (2)

Publication Number Publication Date
CN108959888A CN108959888A (en) 2018-12-07
CN108959888B true CN108959888B (en) 2021-11-02

Family

ID=64483508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810745658.3A Active CN108959888B (en) 2018-07-09 2018-07-09 Terminal operation control method and device

Country Status (1)

Country Link
CN (1) CN108959888B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991A (en) * 2016-06-24 2016-11-16 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN107197089A (en) * 2017-05-17 2017-09-22 努比亚技术有限公司 End message method of controlling security, terminal and computer-readable recording medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102065418B1 (en) * 2013-09-24 2020-01-13 엘지전자 주식회사 Mobile terminal and controlling method thereof
CN105487649B (en) * 2014-09-19 2019-01-08 华为技术有限公司 A kind of reminding method and mobile terminal
CN106557679A (en) * 2016-11-25 2017-04-05 北京小米移动软件有限公司 Terminal control method and device
CN107340966A (en) * 2017-06-28 2017-11-10 珠海市魅族科技有限公司 Terminal control method and device, computer installation and storage medium
CN107451445A (en) * 2017-07-17 2017-12-08 广东欧珀移动通信有限公司 A kind of method of unlocking screen, terminal and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126991A (en) * 2016-06-24 2016-11-16 北京金山安全软件有限公司 Information protection processing method and device and terminal equipment
CN107197089A (en) * 2017-05-17 2017-09-22 努比亚技术有限公司 End message method of controlling security, terminal and computer-readable recording medium

Also Published As

Publication number Publication date
CN108959888A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
EP3179408B1 (en) Picture processing method and apparatus, computer program and recording medium
CN107025419B (en) Fingerprint template inputting method and device
CN106951884B (en) Fingerprint acquisition method and device and electronic equipment
US9904774B2 (en) Method and device for locking file
CN105845124B (en) Audio processing method and device
US20170154206A1 (en) Image processing method and apparatus
CN109557999B (en) Bright screen control method and device and storage medium
CN110569777B (en) Image processing method and device, electronic device and storage medium
CN106357934B (en) Screen locking control method and device
US9924090B2 (en) Method and device for acquiring iris image
CN106557755B (en) Fingerprint template acquisition method and device
CN106126082B (en) Terminal control method and device and terminal
CN106409317B (en) Method and device for extracting dream speech
CN107491681B (en) Fingerprint information processing method and device
CN106547850B (en) Expression annotation method and device
CN112188091B (en) Face information identification method and device, electronic equipment and storage medium
CN109145878B (en) Image extraction method and device
CN107656616B (en) Input interface display method and device and electronic equipment
CN112004020B (en) Image processing method, image processing device, electronic equipment and storage medium
CN107133551B (en) Fingerprint verification method and device
CN108027821B (en) Method and device for processing picture
CN109598183B (en) Face authentication method, device and system
CN112437189A (en) Identity recognition method, device and medium
CN107301404B (en) Fingerprint input method and device
CN107239490B (en) Method and device for naming face image and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant