CN109829279B - Unlock event processing method and related equipment - Google Patents

Unlock event processing method and related equipment Download PDF

Info

Publication number
CN109829279B
CN109829279B CN201910027222.5A CN201910027222A CN109829279B CN 109829279 B CN109829279 B CN 109829279B CN 201910027222 A CN201910027222 A CN 201910027222A CN 109829279 B CN109829279 B CN 109829279B
Authority
CN
China
Prior art keywords
fingerprint
event
mobile terminal
unlocking
unlocked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201910027222.5A
Other languages
Chinese (zh)
Other versions
CN109829279A (en
Inventor
陈然
郭子青
欧锦荣
李虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910027222.5A priority Critical patent/CN109829279B/en
Publication of CN109829279A publication Critical patent/CN109829279A/en
Application granted granted Critical
Publication of CN109829279B publication Critical patent/CN109829279B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

本申请公开了一种解锁事件处理方法及相关设备,应用于包括屏下指纹传感器的移动终端,方法包括:在检测到待解锁事件时,通过所述屏下指纹传感器进行指纹采集,得到第一指纹图像;基于所述第一指纹图像进行指纹识别操作;在基于所述第一指纹图像进行指纹识别操作成功,且所述移动终端累积的连续解锁失败次数大于或等于第一阈值时,确定所述待解锁事件解锁失败。采用本申请实施例可降低暴力解锁的成功率。

Figure 201910027222

The present application discloses an unlocking event processing method and related equipment, which are applied to a mobile terminal including an off-screen fingerprint sensor. The method includes: when an event to be unlocked is detected, performing fingerprint collection through the off-screen fingerprint sensor to obtain a first fingerprint image; perform a fingerprint recognition operation based on the first fingerprint image; when the fingerprint recognition operation based on the first fingerprint image is successful and the number of consecutive unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold, determine The event to be unlocked failed to unlock. Using the embodiments of the present application can reduce the success rate of brute force unlocking.

Figure 201910027222

Description

Unlocking event processing method and related equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an unlocking event processing method and a related device.
Background
The principle is gathered to fingerprint under the screen and is utilized the light that the touch screen sent to shine the finger of putting on the touch screen, and the light that the touch screen sent takes place the reflection when reaching the finger, sets up the fingerprint sensor in the touch screen below and receives the light signal of reflection, because the uneven line of fingerprint, the light absorption range is different to obtain the fingerprint image of light and shade difference. At present, the fingerprint unlocking has the condition of violent unlocking, so that how to reduce the success rate of the violent unlocking is necessary.
Disclosure of Invention
The embodiment of the application provides an unlocking event processing method and related equipment, which are used for reducing the success rate of violent unlocking.
In a first aspect, an embodiment of the present application provides an unlocking event processing method, which is applied to a mobile terminal including an underscreen fingerprint sensor, and the method includes:
when an event to be unlocked is detected, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a first fingerprint image;
performing fingerprint identification operation based on the first fingerprint image;
and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, determining that the unlocking of the event to be unlocked is failed.
In a second aspect, an unlocking event processing apparatus is provided in an embodiment of the present application, and is applied to a mobile terminal including an underscreen fingerprint sensor, where the apparatus includes:
the fingerprint acquisition unit is used for acquiring fingerprints through the under-screen fingerprint sensor when an event to be unlocked is detected, so as to obtain a first fingerprint image;
the fingerprint identification unit is used for carrying out fingerprint identification operation based on the first fingerprint image;
and the event processing unit is used for determining that the unlocking of the event to be unlocked is failed when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value.
In a third aspect, an embodiment of the present application provides a mobile terminal, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in the method according to the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform some or all of the steps described in the method according to the first aspect of the present application.
In a fifth aspect, the present application provides a computer program product, where the computer program product includes a non-transitory computer-readable storage medium storing a computer program, where the computer program is operable to cause a computer to perform some or all of the steps described in the method according to the first aspect of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the application, when the number of times of consecutive unlocking failures accumulated by the mobile terminal exceeds a certain number, even if the current fingerprint identification is successful, the unlocking event associated with the current fingerprint identification is determined to have failed to unlock, so that the success rate of violent unlocking is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1A is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
FIG. 1B is a schematic diagram of a position relationship between an off-screen fingerprint sensor and a fingerprint collection area according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an unlocking event processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another unlocking event processing method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an unlocking event processing device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The following are detailed below.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1A, fig. 1A is a schematic structural diagram of a mobile terminal according to an embodiment of the present disclosure, where the mobile terminal includes a processor, a Memory, a signal processor, a communication interface, a touch screen, a speaker, a microphone, a Random Access Memory (RAM), a camera, a sensor, and the like.
The processor is the control center of the mobile terminal, connects each part of the whole mobile terminal by various interfaces and lines, and executes various functions and processes data of the mobile terminal by operating or executing software programs and/or modules stored in the memory and calling the data stored in the memory, thereby carrying out the overall monitoring of the mobile terminal.
The processor may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like, and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor.
The memory is used for storing software programs and/or modules, and the processor executes various functional applications and data processing of the mobile terminal by operating the software programs and/or modules stored in the memory. The memory mainly comprises a program storage area and a data storage area, wherein the program storage area can store an operating system, a software program required by at least one function and the like; the storage data area may store data created according to the use of the mobile terminal, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The storage, the signal processor, the touch screen, the loudspeaker, the microphone, the RAM, the camera and the sensor are connected with the processor, and the communication interface is connected with the signal processor.
The Touch screen comprises a Touch screen display screen and a Touch Panel (TP), wherein the Touch screen comprises a fingerprint acquisition area. The fingerprint acquisition area can be an area in the touch screen, namely a large area with the size capable of being pressed by a plurality of fingers simultaneously, or a small area capable of being pressed by a single finger. The position of the fingerprint collection area may be a middle area of the touch screen, an upper partial area of the touch screen, a lower partial area of the touch screen, and the like, which is not limited herein. The shape of the fingerprint collection area may be circular, square, oval, etc., and is not limited herein.
Wherein, the sensor comprises a fingerprint sensor, an infrared sensor, a gyroscope and the like under the screen. The fingerprint sensor under the screen is arranged below the fingerprint acquisition area (as shown in fig. 1B), and the fingerprint sensor under the screen can acquire signals in the fingerprint acquisition area, and the fingerprint sensor under the screen can be an optical fingerprint sensor under the screen, a capacitive fingerprint sensor under the screen, or an ultrasonic fingerprint sensor under the screen, and is not limited here. When the under-screen fingerprint sensor is the under-screen optical fingerprint sensor, the signal acquired by the under-screen fingerprint sensor is an optical signal.
Mobile terminals may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of User Equipment (UE), Mobile Stations (MS), terminal Equipment (terminal device), and the like, having wireless communication capabilities.
The following describes embodiments of the present application in detail.
Referring to fig. 2, fig. 2 is a schematic flowchart of an unlocking event processing method provided in an embodiment of the present application, and the method is applied to the mobile terminal, and the method includes:
step 201: when an event to be unlocked is detected, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a first fingerprint image.
The event to be unlocked includes, for example, a fingerprint payment event, a screen unlocking event, an application starting event, a file decryption event, an album decryption event, and the like.
Further, the interface currently displayed by the mobile terminal is a payment interface, and the method further comprises the following steps: if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that a fingerprint payment event is detected.
Further, the currently displayed interface of the mobile terminal is a screen locking interface or the mobile terminal is currently in a screen off state, and the method further comprises the following steps: if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that a screen unlocking event is detected.
Further, the currently displayed interface of the mobile terminal is a system desktop, and the method further comprises the following steps: and if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that the application starting event is detected.
Further, the currently displayed interface of the mobile terminal is a file preview interface, and the method further includes: and if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that a file decryption event is detected.
Further, the currently displayed interface of the mobile terminal is an album preview interface, and the method further comprises the following steps: and if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that the album decryption event is detected.
Wherein, under the condition that the signal that fingerprint sensor gathered under the screen was light signal, mobile terminal passed through fingerprint sensor carries out fingerprint collection under the screen, and the concrete implementation who obtains first fingerprint image has: the mobile terminal collects optical signals through the fingerprint sensor under the screen, processes the optical signals to obtain an image, and then performs image processing on the image to obtain a first fingerprint image in the image.
Step 202: and the mobile terminal performs fingerprint identification operation based on the first fingerprint image.
Further, at least two fingerprint template sets are stored in the mobile terminal, and the specific implementation manner of the mobile terminal performing the fingerprint identification operation based on the first fingerprint image includes: and the mobile terminal determines a target fingerprint template set corresponding to the event to be unlocked and performs fingerprint identification operation based on the first fingerprint image and the target fingerprint template set. Therefore, the target fingerprint template set corresponding to the event to be unlocked is used for fingerprint identification, so that the number of fingerprint templates for fingerprint identification is reduced, the time required by fingerprint identification is reduced, and the fingerprint identification speed is increased.
Each fingerprint template set corresponds to one event to be unlocked, or each fingerprint template set corresponds to at least one event to be unlocked, which is not limited herein.
Further, the specific implementation manner of the mobile terminal performing the fingerprint identification operation based on the first fingerprint image and the target fingerprint template set is as follows: the mobile terminal arranges all the fingerprint templates in the target fingerprint template set according to the sequence of the matching success times; and the mobile terminal compares the first fingerprint image with the fingerprint templates in the target fingerprint template set one by one according to the arranged sequence. Therefore, the fingerprint templates with high matching times are compared first, so that the time required by fingerprint identification can be further shortened.
Step 203: and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, the mobile terminal determines that the unlocking of the event to be unlocked is failed.
The first threshold is, for example, 20, 30, 50, 100, 110, 150 or other values. The first threshold values corresponding to different events to be unlocked are the same. Or the first threshold values corresponding to different events to be unlocked are different, for example, the event to be unlocked is a fingerprint payment event, the corresponding first threshold value is 30, for example, the event to be unlocked is a screen unlocking event, the corresponding first threshold value is 100, and the like.
Further, when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is smaller than the first threshold value, the mobile terminal processes the event to be unlocked.
Further, the event to be unlocked is a screen unlocking event, and the processing of the event to be unlocked by the mobile terminal includes:
when the number of times of continuous unlocking failure accumulated by the mobile terminal is smaller than a fifth threshold value, the mobile terminal executes screen unlocking operation and starts a first mode, first private information is in a display state in the first mode, and the fifth threshold value is equal to half of the first threshold value;
and when the number of continuous unlocking failure times accumulated by the mobile terminal is greater than or equal to the fifth threshold, the mobile terminal executes screen unlocking operation and starts a second mode, and the first private information is in a hidden state in the second mode.
The first private information includes, for example, some contacts (e.g., family, girlfriends, etc.) in the address book, some application icons (e.g., application icons of payment-type applications, application icons of instant messaging applications, application icons of memos, application icons of notebooks, etc.), and the like.
Further, the event to be unlocked is a fingerprint payment event, and the processing of the event to be unlocked by the mobile terminal includes:
when the number of times of continuous unlocking failure accumulated by the mobile terminal is less than a sixth threshold value, the mobile terminal executes fingerprint payment operation, wherein the sixth threshold value is equal to half of the first threshold value;
when the number of continuous unlocking failure times accumulated by the mobile terminal is greater than or equal to the sixth threshold value, the mobile terminal prompts to input a payment password; and when the input payment password is correct, the mobile terminal executes fingerprint payment operation.
The payment password may be a digital payment password or a graphic payment password, which is not limited herein.
Further, the event to be unlocked is an application start event, and the processing of the event to be unlocked by the mobile terminal includes:
when the number of times of continuous unlocking failure accumulated by the mobile terminal is smaller than a seventh threshold value, the mobile terminal executes application starting operation and starts a third mode, second private information is in a display state in the third mode, and the seventh threshold value is equal to half of the first threshold value;
and when the number of times of continuous unlocking failure accumulated by the mobile terminal is greater than or equal to the seventh threshold value, the mobile terminal executes application starting operation and starts a fourth mode, and the second private information is in a hidden state in the third mode.
The second private information is some private information related to the application corresponding to the preset application starting event. For example, it is assumed that the application corresponding to the application start event is QQ, and the second private information has call records of one or more contacts, account numbers of one or more contacts, and the like.
It can be seen that, in the embodiment of the application, when the number of times of consecutive unlocking failures accumulated by the mobile terminal exceeds a certain number, even if the current fingerprint identification is successful, the unlocking event associated with the current fingerprint identification is determined to have failed to unlock, so that the success rate of violent unlocking is reduced.
In an implementation manner of the present application, after the mobile terminal determines that the event to be unlocked fails to unlock, the method further includes: and the mobile terminal clears the continuous unlocking failure times accumulated by the mobile terminal.
It can be seen that, in the embodiment of the present application, when the number of consecutive unlocking failures accumulated by the mobile terminal exceeds a certain number, if the current fingerprint identification is successful, the number of consecutive unlocking failures accumulated before is cleared, so as to avoid the problem that the normal use of the mobile terminal is affected by the violence-proof unlocking mechanism.
In an implementation manner of the present application, the event to be unlocked is a fingerprint payment event, and after the mobile terminal clears the number of consecutive unlocking failures accumulated by the mobile terminal, the method further includes:
when the fingerprint payment event is detected again, the mobile terminal determines whether the distance between the first moment and the current moment is smaller than a second threshold value and whether the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, wherein the first moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal;
and when the distance between the first moment and the current moment is less than the second threshold value and the money amount associated with the fingerprint payment event is greater than or equal to the third threshold value, the mobile terminal determines that the payment of the fingerprint payment event fails.
It can be seen that, in the embodiment of the present application, a fingerprint payment event is detected again after the violence-proof unlocking mechanism is just released, and in this case, if the amount of the fingerprint payment event is large, it is directly determined that the current fingerprint payment event payment fails, so that the security of payment is improved.
In an implementation manner of the present application, the method further includes:
when the distance between the first moment and the current moment is larger than or equal to the second threshold value and the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a second fingerprint image;
when the fingerprint identification operation based on the second fingerprint image is successful, the mobile terminal determines whether the geographic position associated with the fingerprint payment event is a set geographic position;
and when the geographic position associated with the fingerprint payment event is the set geographic position, the mobile terminal executes fingerprint payment operation.
The geographic location associated with the fingerprint payment event may be a receiving address, a current geographic location of the mobile terminal, a geographic location of a currently paid storefront, and the like.
It can be seen that, in the embodiment of the present application, the fingerprint payment event is detected again for a long time after the anti-violent unlocking mechanism is released, in this case, because the fingerprint payment event is detected for the first time after the anti-violent unlocking mechanism is released, if the amount associated with the payment event is large, further determination is required, so as to improve the security of payment.
In an implementation manner of the present application, the event to be unlocked is a screen unlocking event, and after the mobile terminal clears the number of consecutive unlocking failures accumulated by the mobile terminal, the method further includes:
when the screen unlocking event is detected again, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a third fingerprint image;
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is less than a fourth threshold value, the mobile terminal executes screen unlocking operation and starts a first mode, wherein the first private information is in a hidden state in the first mode, and the second moment is the moment of clearing the continuous unlocking failure times accumulated by the mobile terminal.
The first private information includes, for example, some contacts (e.g., family, girlfriends, etc.) in the address book, some application icons (e.g., application icons of payment-type applications, application icons of instant messaging applications, application icons of memos, application icons of notebooks, etc.), and the like.
It can be seen that, in the embodiment of the application, a screen unlocking event is detected again after the violence-proof unlocking mechanism is just released, and under the condition, if the fingerprint identification is successful, the screen unlocking operation is still performed, and meanwhile, the private mode is also started, so that information leakage is avoided, and further, the information security is improved.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, the mobile terminal executes screen unlocking operation and starts a second mode, and the first private information is in a display state in the first mode.
It can be seen that, in the embodiment of the present application, a screen unlocking event is detected again for a long time after the anti-violence unlocking mechanism is released, and in this case, if the fingerprint identification is successful, a normal screen unlocking operation is performed to ensure that the mobile terminal is normally used.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is less than the fourth threshold, the mobile terminal is locked, and the time length for locking the mobile terminal is a first set time length.
It can be seen that, in the embodiment of the present application, a screen unlocking event is detected again after the violence-proof unlocking mechanism is just released, and in this case, if the fingerprint identification fails, the mobile terminal is directly locked, so that the security of the mobile terminal is further improved.
Further, the method further comprises:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, the mobile terminal adds 1 to the number of screen unlocking failures.
It can be seen that, in the embodiment of the application, after the violence-proof unlocking mechanism is released for a long time, the screen unlocking event is detected, and in this case, if the fingerprint identification fails, only the number of screen unlocking failures is increased by 1, so as to ensure the normal use of the mobile terminal.
In an implementation manner of the present application, the event to be unlocked is an application start event, and after the mobile terminal clears the number of consecutive unlocking failures accumulated by the mobile terminal, the method further includes:
when the application starting event is detected again, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a fourth fingerprint image;
and when the fingerprint identification operation based on the fourth fingerprint image is successful and the third time is greater than or equal to an eighth threshold value from the current time, the mobile terminal executes application starting operation and starts a third mode, wherein second private information is in a display state in the third mode, and the third time is the time for clearing the continuous unlocking failure times accumulated by the mobile terminal.
The second private information is some private information related to the application corresponding to the preset application starting event. For example, it is assumed that the application corresponding to the application start event is QQ, and the second private information has call records of one or more contacts, account numbers of one or more contacts, and the like.
It can be seen that, in the embodiment of the present application, an application start event is detected again for a long time after the anti-violent unlocking mechanism is released, and in this case, if the fingerprint identification is successful, a normal application start operation is performed to ensure that the application is normally used.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the fourth fingerprint image is successful and the distance between the third moment and the current moment is less than the eighth threshold value, the mobile terminal executes application starting operation and starts a fourth mode, wherein the second private information is in a hidden state in the fourth mode.
It can be seen that, in the embodiment of the present application, an application start event is detected again after the violence-proof unlocking mechanism is just released for a long time, and in this case, if the fingerprint identification is successful, the application start operation is still performed, and meanwhile, the private mode is also enabled, so as to avoid information leakage, and further improve the security of the application.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the fourth fingerprint image fails and the distance between the third moment and the current moment is less than the eighth threshold, the mobile terminal locks the application associated with the application starting event, and the duration of the application is locked as a second set duration.
It can be seen that, in the embodiment of the present application, an application start event is detected again shortly after the anti-violent unlocking mechanism is released, in this case, if the fingerprint identification fails, the application associated with the application start event is directly locked, and the security of the application is further improved.
Further, the method further comprises:
and when the fingerprint identification operation based on the fourth fingerprint image fails and the distance between the third moment and the current moment is greater than or equal to the eighth threshold, the mobile terminal adds 1 to the application starting failure times.
It can be seen that, in the embodiment of the present application, after the anti-violent unlocking mechanism is released for a long time, the application start event is detected again, and in this case, if the fingerprint identification fails, only 1 is added to the number of times of application start failure, so as to ensure normal use of the application.
Referring to fig. 3, fig. 3 is a schematic flowchart of another unlocking event processing method provided in the embodiment of the present application, and the method is applied to the mobile terminal, and includes:
step 301: when a screen unlocking event is detected, the mobile terminal carries out fingerprint acquisition through a fingerprint sensor under a screen to obtain a first fingerprint image.
Step 302: the mobile terminal conducts fingerprint identification operation based on the first fingerprint image, and determines whether the number of continuous unlocking failures accumulated by the mobile terminal is larger than or equal to a first threshold value.
When the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, executing step 303;
when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is less than the first threshold value, executing step 311;
when the fingerprint identification operation based on the first fingerprint image fails, step 312 is performed.
Step 303: and the mobile terminal determines that the event to be unlocked fails to be unlocked.
Step 304: and the mobile terminal clears the continuous unlocking failure times accumulated by the mobile terminal.
Step 305: and when the screen unlocking event is detected again, the mobile terminal carries out fingerprint acquisition through the under-screen fingerprint sensor to obtain a third fingerprint image.
Step 306: and the mobile terminal performs fingerprint identification operation based on the third fingerprint image, and determines whether a second moment is smaller than a fourth threshold value from the current moment, wherein the second moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal.
And when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second time and the current time is less than the fourth threshold, executing step 307.
And executing step 308 when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold.
When the fingerprint identification operation based on the third fingerprint image fails and the second time is less than the fourth threshold from the current time, step 309 is executed.
When the fingerprint identification operation based on the third fingerprint image fails and the second time is greater than or equal to the fourth threshold from the current time, step 310 is executed.
Step 307: the mobile terminal executes screen unlocking operation and starts a first mode, first private information is in a hidden state in the first mode, and the second moment is the moment of zero clearing of the continuous unlocking failure times accumulated by the mobile terminal.
Step 308: the mobile terminal executes screen unlocking operation and starts a second mode, and the first private information is in a display state in the first mode.
Step 309: and the mobile terminal is locked by the mobile terminal, and the time length for locking the mobile terminal is a first set time length.
Step 310: and the mobile terminal adds 1 to the unlocking failure times.
Step 311: and the mobile terminal processes the screen unlocking event.
Step 312: and the mobile terminal adds 1 to the continuous unlocking failure times accumulated by the mobile terminal.
It should be noted that, for the specific implementation process of the present embodiment, reference may be made to the specific implementation process described in the above method embodiment, and a description thereof is omitted here.
Consistent with the embodiments shown in fig. 2 and 3, please refer to fig. 4, where fig. 4 is a schematic structural diagram of another mobile terminal provided in an embodiment of the present application, and as shown in the drawing, the mobile terminal includes an off-screen fingerprint sensor, and further includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the following steps:
when an event to be unlocked is detected, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a first fingerprint image;
performing fingerprint identification operation based on the first fingerprint image;
and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, determining that the unlocking of the event to be unlocked is failed.
In an implementation manner of the present application, after determining that the event to be unlocked fails to unlock, the program includes instructions further configured to: and clearing the continuous unlocking failure times accumulated by the mobile terminal.
In an implementation manner of the present application, the event to be unlocked is a fingerprint payment event, and after clearing the number of consecutive unlocking failures accumulated by the mobile terminal, the program includes an instruction further configured to execute the following steps:
when the fingerprint payment event is detected again, determining whether the distance between a first moment and the current moment is smaller than a second threshold value and whether the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, wherein the first moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal;
and when the first time is less than the second threshold value from the current time and the money amount associated with the fingerprint payment event is greater than or equal to the third threshold value, determining that the payment of the fingerprint payment event fails.
In an implementation manner of the present application, the program includes instructions for further performing the following steps:
when the distance between the first moment and the current moment is larger than or equal to the second threshold value and the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, fingerprint collection is carried out through the under-screen fingerprint sensor to obtain a second fingerprint image;
when the fingerprint identification operation based on the second fingerprint image is successful, determining whether the geographic position associated with the fingerprint payment event is a set geographic position;
and when the geographic position associated with the fingerprint payment event is the set geographic position, executing fingerprint payment operation.
In an implementation manner of the present application, the event to be unlocked is a screen unlocking event, and after clearing the number of consecutive unlocking failures accumulated by the mobile terminal, the program further includes an instruction for executing the following steps:
when the screen unlocking event is detected again, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a third fingerprint image;
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is less than a fourth threshold value, executing screen unlocking operation and starting a first mode, wherein the first private information is in a display state in the first mode, and the second moment is the moment of clearing the continuous unlocking failure times accumulated by the mobile terminal.
In an implementation manner of the present application, the program includes instructions for further performing the following steps:
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, executing screen unlocking operation and starting a second mode, wherein the first private information is in a hidden state in the first mode.
In an implementation manner of the present application, the program includes instructions for further performing the following steps:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is less than the fourth threshold value, locking the mobile terminal, wherein the time length for locking the mobile terminal is a first set time length.
It should be noted that, for the specific implementation process of the present embodiment, reference may be made to the specific implementation process described in the above method embodiment, and a description thereof is omitted here.
The above embodiments mainly introduce the scheme of the embodiments of the present application from the perspective of the method-side implementation process. It is understood that the mobile terminal includes hardware structures and/or software modules for performing the respective functions in order to implement the above-described functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the mobile terminal may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
The following is an embodiment of the apparatus of the present application, which is used to execute the method implemented by the embodiment of the method of the present application. Referring to fig. 5, fig. 5 is a view illustrating an unlocking event processing apparatus applied to a mobile terminal including an underscreen fingerprint sensor according to an embodiment of the present application, where the unlocking event processing apparatus includes:
the fingerprint acquisition unit 501 is configured to perform fingerprint acquisition through the under-screen fingerprint sensor when an event to be unlocked is detected, so as to obtain a first fingerprint image;
a fingerprint identification unit 502, configured to perform a fingerprint identification operation based on the first fingerprint image;
an event processing unit 503, configured to determine that the event to be unlocked fails to unlock when the fingerprint identification operation based on the first fingerprint image is successful and the number of consecutive unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold.
In an implementation manner of the present application, the unlocking event processing apparatus further includes:
a number clearing unit 504, configured to clear consecutive unlocking failure numbers accumulated by the mobile terminal after determining that the unlocking of the event to be unlocked fails.
In an implementation manner of the present application, the event to be unlocked is a fingerprint payment event, and after the number of consecutive unlocking failures accumulated by the mobile terminal is cleared, the event processing unit 503 is further configured to determine, when the fingerprint payment event is detected again, whether a distance from a first time to a current time is less than a second threshold, and whether an amount associated with the fingerprint payment event is greater than or equal to a third threshold, where the first time is a time when the number of consecutive unlocking failures accumulated by the mobile terminal is cleared; and when the first time is less than the second threshold value from the current time and the money amount associated with the fingerprint payment event is greater than or equal to the third threshold value, determining that the payment of the fingerprint payment event fails.
In an implementation manner of the present application, the fingerprint acquisition unit 501 is further configured to acquire a fingerprint by using the under-screen fingerprint sensor when the distance between the first time and the current time is greater than or equal to the second threshold and the amount of money associated with the fingerprint payment event is greater than or equal to a third threshold, so as to obtain a second fingerprint image;
the event processing unit 503 is further configured to determine whether the geographic location associated with the fingerprint payment event is a set geographic location when the fingerprint identification operation based on the second fingerprint image is successful; and when the geographic position associated with the fingerprint payment event is the set geographic position, executing fingerprint payment operation.
In an implementation manner of the present application, the event to be unlocked is a screen unlocking event, and after the number of consecutive unlocking failures accumulated by the mobile terminal is cleared, the fingerprint acquisition unit 501 is further configured to perform fingerprint acquisition by the underscreen fingerprint sensor when the screen unlocking event is detected again, so as to obtain a third fingerprint image;
the event processing unit 503 is further configured to, when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second time and the current time is smaller than a fourth threshold, execute a screen unlocking operation, and enable a first mode in which the first private information is in a display state, where the second time is a time at which consecutive unlocking failure times accumulated by the mobile terminal are cleared.
In an implementation manner of the present application, the event processing unit 503 is further configured to execute a screen unlocking operation and enable a second mode when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second time and the current time is greater than or equal to the fourth threshold, where the first private information is in a hidden state in the first mode.
In an implementation manner of the present application, the unlocking event processing apparatus further includes:
and a locking unit 505, configured to lock the mobile terminal when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second time and the current time is less than the fourth threshold, where a duration of locking the mobile terminal is a first set duration.
It should be noted that the fingerprint collection unit 501, the fingerprint identification unit 502, the event processing unit 503, the number zero clearing unit 504, and the locking unit 505 may be implemented by a processor.
Embodiments of the present application further provide a computer storage medium, where the computer storage medium stores a computer program, the computer program is executed by a processor to perform part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes a mobile terminal.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising a mobile terminal.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (7)

1.一种解锁事件处理方法,其特征在于,应用于包括屏下指纹传感器的移动终端,方法包括:1. A method for processing an unlocking event, characterized in that it is applied to a mobile terminal comprising an off-screen fingerprint sensor, the method comprising: 在检测到待解锁事件时,通过所述屏下指纹传感器进行指纹采集,得到第一指纹图像;When an event to be unlocked is detected, fingerprint collection is performed by the under-screen fingerprint sensor to obtain a first fingerprint image; 基于所述第一指纹图像进行指纹识别操作,其中,所述移动终端中存储有至少两个指纹模板集合,基于所述第一指纹图像进行指纹识别操作包括:确定所述待解锁事件对应的目标指纹模板集合,基于所述第一指纹图像和所述目标指纹模板集合进行指纹识别操作;其中,基于所述第一指纹图像和所述目标指纹模板集合进行指纹识别操作包括:将所述目标指纹模板集合中的所有指纹模板按照匹配成功次数的高低顺序进行排列;移动终端按照排列后的顺序将所述第一指纹图像与所述目标指纹模板集合中的指纹模板进行一一对比;每个指纹模板集合对应一个待解锁事件;Performing a fingerprint recognition operation based on the first fingerprint image, wherein at least two fingerprint template sets are stored in the mobile terminal, and performing a fingerprint recognition operation based on the first fingerprint image includes: determining a target corresponding to the event to be unlocked a fingerprint template set, performing a fingerprint identification operation based on the first fingerprint image and the target fingerprint template set; wherein, performing a fingerprint identification operation based on the first fingerprint image and the target fingerprint template set includes: converting the target fingerprint All fingerprint templates in the template set are arranged in the order of the number of successful matches; the mobile terminal compares the first fingerprint image with the fingerprint templates in the target fingerprint template set one by one according to the arranged order; each fingerprint The template set corresponds to an event to be unlocked; 在基于所述第一指纹图像进行指纹识别操作成功,且所述移动终端对应所述待解锁事件的累积的连续解锁失败次数大于或等于第一阈值时,确定所述待解锁事件解锁失败;其中,不同待解锁事件对应的第一阈值是不同的;When the fingerprint identification operation based on the first fingerprint image is successful, and the cumulative number of consecutive unlocking failures of the mobile terminal corresponding to the to-be-unlocked event is greater than or equal to a first threshold, it is determined that the to-be-unlocked event has failed to unlock; wherein , the first thresholds corresponding to different events to be unlocked are different; 其中,所述确定所述待解锁事件解锁失败之后,所述方法还包括:将所述移动终端累积的连续解锁失败次数清零;Wherein, after determining that the unlocking of the event to be unlocked fails, the method further includes: clearing the number of consecutive unlocking failures accumulated by the mobile terminal; 其中,当所述待解锁事件为指纹支付事件,所述将所述移动终端累积的连续解锁失败次数清零之后,所述方法还包括:Wherein, when the to-be-unlocked event is a fingerprint payment event, and after the number of consecutive unlocking failures accumulated by the mobile terminal is cleared, the method further includes: 在再次检测到指纹支付事件时,确定第一时刻距离当前时刻是否小于第二阈值,以及所述指纹支付事件关联的金额是否大于或等于第三阈值,所述第一时刻为将所述移动终端累积的连续解锁失败次数清零的时刻;在所述第一时刻距离当前时刻小于所述第二阈值,以及所述指纹支付事件关联的金额大于或等于所述第三阈值时,确定所述指纹支付事件支付失败;When the fingerprint payment event is detected again, it is determined whether the distance between the first moment and the current moment is less than a second threshold, and whether the amount associated with the fingerprint payment event is greater than or equal to a third threshold, the first moment being the mobile terminal The time when the cumulative number of consecutive unlocking failures is cleared; when the distance from the first time to the current time is less than the second threshold, and the amount associated with the fingerprint payment event is greater than or equal to the third threshold, determine the fingerprint Payment event payment failed; 在所述第一时刻距离当前时刻大于或等于所述第二阈值,并且所述指纹支付事件关联的金额大于或等于第三阈值时,通过所述屏下指纹传感器进行指纹采集,得到第二指纹图像;When the distance from the first moment to the current moment is greater than or equal to the second threshold, and the amount associated with the fingerprint payment event is greater than or equal to the third threshold, fingerprint collection is performed by the under-screen fingerprint sensor to obtain a second fingerprint image; 在基于所述第二指纹图像进行指纹识别操作成功时,确定所述指纹支付事件关联的地理位置是否为设定地理位置;在所述指纹支付事件关联的地理位置为设定地理位置时,执行指纹支付操作。When the fingerprint identification operation based on the second fingerprint image is successful, determine whether the geographic location associated with the fingerprint payment event is the set geographic location; when the geographic location associated with the fingerprint payment event is the set geographic location, execute Fingerprint payment operation. 2.根据权利要求1所述的方法,其特征在于,2. The method according to claim 1, wherein 当所述待解锁事件为屏幕解锁事件,所述将所述移动终端累积的连续解锁失败次数清零之后,所述方法还包括:在再次检测到屏幕解锁事件时,通过所述屏下指纹传感器进行指纹采集,得到第三指纹图像;When the to-be-unlocked event is a screen-unlocking event, and after clearing the number of consecutive unlocking failures accumulated by the mobile terminal to zero, the method further includes: when the screen-unlocking event is detected again, using the off-screen fingerprint sensor performing fingerprint collection to obtain a third fingerprint image; 在基于所述第三指纹图像进行指纹识别操作成功,且第二时刻距离当前时刻小于第四阈值时,执行屏幕解锁操作,以及启用第一模式,在所述第一模式下第一私密信息处于隐藏状态,所述第二时刻为将所述移动终端累积的连续解锁失败次数清零的时刻。When the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is less than the fourth threshold, the screen unlocking operation is performed, and the first mode is enabled, in which the first private information is in In the hidden state, the second moment is the moment when the number of consecutive unlocking failures accumulated by the mobile terminal is cleared to zero. 3.根据权利要求2所述的方法,其特征在于,所述方法还包括:在基于所述第三指纹图像进行指纹识别操作成功,且所述第二时刻距离当前时刻大于或等于所述第四阈值时,执行屏幕解锁操作,以及启用第二模式,在所述第一模式下所述第一私密信息处于显示状态。3. The method according to claim 2, wherein the method further comprises: when the fingerprint identification operation based on the third fingerprint image is successful, and the distance between the second moment and the current moment is greater than or equal to the first At four thresholds, a screen unlocking operation is performed, and a second mode is enabled, in which the first private information is displayed. 4.根据权利要求2或3所述的方法,其特征在于,所述方法还包括:4. The method according to claim 2 or 3, wherein the method further comprises: 在基于所述第三指纹图像进行指纹识别操作失败,且所述第二时刻距离当前时刻小于所述第四阈值时,锁定所述移动终端,锁定所述移动终端的时长为第一设定时长。When the fingerprint identification operation based on the third fingerprint image fails, and the distance between the second moment and the current moment is less than the fourth threshold, the mobile terminal is locked, and the duration of locking the mobile terminal is the first set duration . 5.一种解锁事件处理装置,其特征在于,应用于包括屏下指纹传感器的移动终端,所述装置包括:5. An unlocking event processing device, characterized in that it is applied to a mobile terminal comprising an off-screen fingerprint sensor, the device comprising: 指纹采集单元,用于在检测到待解锁事件时,通过所述屏下指纹传感器进行指纹采集,得到第一指纹图像;a fingerprint collection unit, configured to collect a fingerprint through the under-screen fingerprint sensor to obtain a first fingerprint image when an event to be unlocked is detected; 指纹识别单元,用于基于所述第一指纹图像进行指纹识别操作,所述移动终端中存储有至少两个指纹模板集合,其中,基于所述第一指纹图像进行指纹识别操作包括:确定所述待解锁事件对应的目标指纹模板集合,基于所述第一指纹图像和所述目标指纹模板集合进行指纹识别操作;其中,基于所述第一指纹图像和所述目标指纹模板集合进行指纹识别操作包括:将所述目标指纹模板集合中的所有指纹模板按照匹配成功次数的高低顺序进行排列;移动终端按照排列后的顺序将所述第一指纹图像与所述目标指纹模板集合中的指纹模板进行一一对比;每个指纹模板集合对应一个待解锁事件;a fingerprint identification unit, configured to perform a fingerprint identification operation based on the first fingerprint image, where at least two fingerprint template sets are stored in the mobile terminal, wherein the fingerprint identification operation based on the first fingerprint image includes: determining the The target fingerprint template set corresponding to the event to be unlocked, the fingerprint recognition operation is performed based on the first fingerprint image and the target fingerprint template set; wherein, the fingerprint recognition operation based on the first fingerprint image and the target fingerprint template set includes: : arranging all fingerprint templates in the target fingerprint template set according to the high and low order of the number of successful matches; the mobile terminal performs a matching between the first fingerprint image and the fingerprint templates in the target fingerprint template set according to the order after the arrangement. A comparison; each fingerprint template set corresponds to an event to be unlocked; 事件处理单元用于在基于所述第一指纹图像进行指纹识别操作成功,且所述移动终端对应所述待解锁事件的累积的连续解锁失败次数大于或等于第一阈值时,确定所述待解锁事件解锁失败;其中,不同待解锁事件对应的第一阈值是不同的;其中,所述确定所述待解锁事件解锁失败之后,将所述移动终端累积的连续解锁失败次数清零;The event processing unit is configured to determine the to-be-unlocked when the fingerprint identification operation based on the first fingerprint image is successful and the cumulative number of consecutive unlocking failures of the mobile terminal corresponding to the to-be-unlocked event is greater than or equal to a first threshold Event unlocking failure; wherein, the first thresholds corresponding to different events to be unlocked are different; wherein, after the determining that the unlocking of the event to be unlocked fails, the number of consecutive unlocking failures accumulated by the mobile terminal is cleared; 其中,当所述待解锁事件为指纹支付事件,Wherein, when the to-be-unlocked event is a fingerprint payment event, 所述事件处理单元还用于,将所述移动终端累积的连续解锁失败次数清零之后,在再次检测到指纹支付事件时,确定第一时刻距离当前时刻是否小于第二阈值,以及所述指纹支付事件关联的金额是否大于或等于第三阈值,所述第一时刻为将所述移动终端累积的连续解锁失败次数清零的时刻;在所述第一时刻距离当前时刻小于所述第二阈值,以及所述指纹支付事件关联的金额大于或等于所述第三阈值时,确定所述指纹支付事件支付失败;The event processing unit is further configured to, after clearing the number of consecutive unlocking failures accumulated by the mobile terminal, when a fingerprint payment event is detected again, determine whether the distance between the first moment and the current moment is less than a second threshold, and the fingerprint Whether the amount associated with the payment event is greater than or equal to a third threshold, the first moment is the moment when the number of consecutive unlocking failures accumulated by the mobile terminal is cleared; the distance between the first moment and the current moment is less than the second threshold , and when the amount associated with the fingerprint payment event is greater than or equal to the third threshold, it is determined that the fingerprint payment event payment fails; 在所述第一时刻距离当前时刻大于或等于所述第二阈值,并且所述指纹支付事件关联的金额大于或等于第三阈值时,通过所述屏下指纹传感器进行指纹采集,得到第二指纹图像;When the distance from the first moment to the current moment is greater than or equal to the second threshold, and the amount associated with the fingerprint payment event is greater than or equal to the third threshold, fingerprint collection is performed by the under-screen fingerprint sensor to obtain a second fingerprint image; 在基于所述第二指纹图像进行指纹识别操作成功时,确定所述指纹支付事件关联的地理位置是否为设定地理位置;在所述指纹支付事件关联的地理位置为设定地理位置时,执行指纹支付操作。When the fingerprint identification operation based on the second fingerprint image is successful, determine whether the geographic location associated with the fingerprint payment event is the set geographic location; when the geographic location associated with the fingerprint payment event is the set geographic location, execute Fingerprint payment operation. 6.一种移动终端,其特征在于,6. A mobile terminal, characterized in that, 所述移动终端包括触控屏、处理器和指纹传感器,所述触控屏包括指纹采集区域,所述指纹传感器设于所述指纹采集区域下方,所述移动终端还包括存储器、通信接口,以及一个或多个程序,所述一个或多个程序被存储在所述存储器中,并且被配置由所述处理器执行,所述程序包括用于执行如权利要求1-4任一项所述的方法中的步骤的指令。The mobile terminal includes a touch screen, a processor and a fingerprint sensor, the touch screen includes a fingerprint collection area, the fingerprint sensor is arranged below the fingerprint collection area, the mobile terminal further includes a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising means for performing the method of any one of claims 1-4 Instructions for steps in a method. 7.一种计算机可读存储介质,其特征在于,7. A computer-readable storage medium, characterized in that, 存储用于电子数据交换的计算机程序,其中,所述计算机程序使得计算机执行如权利要求1-4任一项所述的方法。A computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method of any one of claims 1-4.
CN201910027222.5A 2019-01-11 2019-01-11 Unlock event processing method and related equipment Expired - Fee Related CN109829279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910027222.5A CN109829279B (en) 2019-01-11 2019-01-11 Unlock event processing method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910027222.5A CN109829279B (en) 2019-01-11 2019-01-11 Unlock event processing method and related equipment

Publications (2)

Publication Number Publication Date
CN109829279A CN109829279A (en) 2019-05-31
CN109829279B true CN109829279B (en) 2021-05-07

Family

ID=66860953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910027222.5A Expired - Fee Related CN109829279B (en) 2019-01-11 2019-01-11 Unlock event processing method and related equipment

Country Status (1)

Country Link
CN (1) CN109829279B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368281A (en) * 2020-03-04 2020-07-03 Oppo广东移动通信有限公司 Electronic equipment and unlocking method thereof
CN115329299A (en) * 2021-04-23 2022-11-11 华为技术有限公司 Screen unlocking method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912905A (en) * 2016-04-11 2016-08-31 广东欧珀移动通信有限公司 A fingerprint unlocking method and terminal
CN106650582A (en) * 2016-09-27 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method, camera with fingerprint identification function and terminal
CN107347107A (en) * 2017-06-30 2017-11-14 深圳天珑无线科技有限公司 Encryption method, device and the computer-readable recording medium of mobile terminal addressbook

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN105825164A (en) * 2015-08-28 2016-08-03 维沃移动通信有限公司 Fingerprint identification method and electronic equipment
CN105469033B (en) * 2015-11-13 2018-04-17 广东欧珀移动通信有限公司 fingerprint identification method, device and terminal device
CN105389566B (en) * 2015-11-13 2018-09-11 广东欧珀移动通信有限公司 Fingerprint identification method, the update method of fingerprint template, device and mobile terminal
CN107831992B (en) * 2016-03-14 2021-01-29 Oppo广东移动通信有限公司 Unlocking control method and related product
CN107423598B (en) * 2017-03-23 2019-10-11 Oppo广东移动通信有限公司 A kind of solution lock control method and mobile terminal
CN108875333B (en) * 2017-09-22 2023-05-16 北京旷视科技有限公司 Terminal unlocking method, terminal and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912905A (en) * 2016-04-11 2016-08-31 广东欧珀移动通信有限公司 A fingerprint unlocking method and terminal
CN106650582A (en) * 2016-09-27 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method, camera with fingerprint identification function and terminal
CN107347107A (en) * 2017-06-30 2017-11-14 深圳天珑无线科技有限公司 Encryption method, device and the computer-readable recording medium of mobile terminal addressbook

Also Published As

Publication number Publication date
CN109829279A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN108038393B (en) Application privacy protection method and mobile terminal
CN105654024B (en) Terminal device, fingerprint identification method and fingerprint identification device
KR101556599B1 (en) Pattern Inputting Apparatus and Method, and Recording Medium Using the Same
US20180039819A1 (en) Method and device for identity verification
CN108170844A (en) Storage method, device, terminal and storage medium for screen recording files
CN104933342A (en) Picture viewing method and mobile terminal
CN106843729A (en) A kind of terminal control method and terminal
CN107832595B (en) Locking method and related equipment
US10282532B2 (en) Secure storage of fingerprint related elements
CN106815509B (en) Multimedia file protection method and device and electronic equipment
CN105701386A (en) Security certification method and device
CN109829279B (en) Unlock event processing method and related equipment
CN110099167B (en) Unlocking method and device, terminal equipment and storage medium
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN106874787B (en) Image viewing method and mobile terminal
CN108052269A (en) Unlocking screen optimization method, terminal device and computer-readable medium
CN106599665A (en) Information processing method and electronic equipment
CN107742073A (en) Information displaying method, device, computer installation and computer-readable recording medium
CN107786349B (en) Security management method and device for user account
CN109543431B (en) Application encryption method and device, electronic equipment and storage medium
CN111859322A (en) Identity verification method and device and electronic equipment
CN110516421A (en) Password verification method, password verification device and electronic equipment
US20200004941A1 (en) Methods for enrolling a user and for authentication of a user of an electronic device
CN112905964B (en) Unlocking method for user equipment, storage medium, chip and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210507

CF01 Termination of patent right due to non-payment of annual fee