CN109829279B - Unlocking event processing method and related equipment - Google Patents

Unlocking event processing method and related equipment Download PDF

Info

Publication number
CN109829279B
CN109829279B CN201910027222.5A CN201910027222A CN109829279B CN 109829279 B CN109829279 B CN 109829279B CN 201910027222 A CN201910027222 A CN 201910027222A CN 109829279 B CN109829279 B CN 109829279B
Authority
CN
China
Prior art keywords
fingerprint
event
mobile terminal
unlocking
unlocked
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910027222.5A
Other languages
Chinese (zh)
Other versions
CN109829279A (en
Inventor
陈然
郭子青
欧锦荣
李虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910027222.5A priority Critical patent/CN109829279B/en
Publication of CN109829279A publication Critical patent/CN109829279A/en
Application granted granted Critical
Publication of CN109829279B publication Critical patent/CN109829279B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The application discloses an unlocking event processing method and related equipment, which are applied to a mobile terminal comprising an underscreen fingerprint sensor, wherein the method comprises the following steps: when an event to be unlocked is detected, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a first fingerprint image; performing fingerprint identification operation based on the first fingerprint image; and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, determining that the unlocking of the event to be unlocked is failed. By adopting the embodiment of the application, the success rate of violent unlocking can be reduced.

Description

Unlocking event processing method and related equipment
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an unlocking event processing method and a related device.
Background
The principle is gathered to fingerprint under the screen and is utilized the light that the touch screen sent to shine the finger of putting on the touch screen, and the light that the touch screen sent takes place the reflection when reaching the finger, sets up the fingerprint sensor in the touch screen below and receives the light signal of reflection, because the uneven line of fingerprint, the light absorption range is different to obtain the fingerprint image of light and shade difference. At present, the fingerprint unlocking has the condition of violent unlocking, so that how to reduce the success rate of the violent unlocking is necessary.
Disclosure of Invention
The embodiment of the application provides an unlocking event processing method and related equipment, which are used for reducing the success rate of violent unlocking.
In a first aspect, an embodiment of the present application provides an unlocking event processing method, which is applied to a mobile terminal including an underscreen fingerprint sensor, and the method includes:
when an event to be unlocked is detected, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a first fingerprint image;
performing fingerprint identification operation based on the first fingerprint image;
and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, determining that the unlocking of the event to be unlocked is failed.
In a second aspect, an unlocking event processing apparatus is provided in an embodiment of the present application, and is applied to a mobile terminal including an underscreen fingerprint sensor, where the apparatus includes:
the fingerprint acquisition unit is used for acquiring fingerprints through the under-screen fingerprint sensor when an event to be unlocked is detected, so as to obtain a first fingerprint image;
the fingerprint identification unit is used for carrying out fingerprint identification operation based on the first fingerprint image;
and the event processing unit is used for determining that the unlocking of the event to be unlocked is failed when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value.
In a third aspect, an embodiment of the present application provides a mobile terminal, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in the method according to the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform some or all of the steps described in the method according to the first aspect of the present application.
In a fifth aspect, the present application provides a computer program product, where the computer program product includes a non-transitory computer-readable storage medium storing a computer program, where the computer program is operable to cause a computer to perform some or all of the steps described in the method according to the first aspect of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the application, when the number of times of consecutive unlocking failures accumulated by the mobile terminal exceeds a certain number, even if the current fingerprint identification is successful, the unlocking event associated with the current fingerprint identification is determined to have failed to unlock, so that the success rate of violent unlocking is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1A is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
FIG. 1B is a schematic diagram of a position relationship between an off-screen fingerprint sensor and a fingerprint collection area according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an unlocking event processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another unlocking event processing method provided in an embodiment of the present application;
fig. 4 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an unlocking event processing device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The following are detailed below.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1A, fig. 1A is a schematic structural diagram of a mobile terminal according to an embodiment of the present disclosure, where the mobile terminal includes a processor, a Memory, a signal processor, a communication interface, a touch screen, a speaker, a microphone, a Random Access Memory (RAM), a camera, a sensor, and the like.
The processor is the control center of the mobile terminal, connects each part of the whole mobile terminal by various interfaces and lines, and executes various functions and processes data of the mobile terminal by operating or executing software programs and/or modules stored in the memory and calling the data stored in the memory, thereby carrying out the overall monitoring of the mobile terminal.
The processor may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like, and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor.
The memory is used for storing software programs and/or modules, and the processor executes various functional applications and data processing of the mobile terminal by operating the software programs and/or modules stored in the memory. The memory mainly comprises a program storage area and a data storage area, wherein the program storage area can store an operating system, a software program required by at least one function and the like; the storage data area may store data created according to the use of the mobile terminal, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The storage, the signal processor, the touch screen, the loudspeaker, the microphone, the RAM, the camera and the sensor are connected with the processor, and the communication interface is connected with the signal processor.
The Touch screen comprises a Touch screen display screen and a Touch Panel (TP), wherein the Touch screen comprises a fingerprint acquisition area. The fingerprint acquisition area can be an area in the touch screen, namely a large area with the size capable of being pressed by a plurality of fingers simultaneously, or a small area capable of being pressed by a single finger. The position of the fingerprint collection area may be a middle area of the touch screen, an upper partial area of the touch screen, a lower partial area of the touch screen, and the like, which is not limited herein. The shape of the fingerprint collection area may be circular, square, oval, etc., and is not limited herein.
Wherein, the sensor comprises a fingerprint sensor, an infrared sensor, a gyroscope and the like under the screen. The fingerprint sensor under the screen is arranged below the fingerprint acquisition area (as shown in fig. 1B), and the fingerprint sensor under the screen can acquire signals in the fingerprint acquisition area, and the fingerprint sensor under the screen can be an optical fingerprint sensor under the screen, a capacitive fingerprint sensor under the screen, or an ultrasonic fingerprint sensor under the screen, and is not limited here. When the under-screen fingerprint sensor is the under-screen optical fingerprint sensor, the signal acquired by the under-screen fingerprint sensor is an optical signal.
Mobile terminals may include various handheld devices, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of User Equipment (UE), Mobile Stations (MS), terminal Equipment (terminal device), and the like, having wireless communication capabilities.
The following describes embodiments of the present application in detail.
Referring to fig. 2, fig. 2 is a schematic flowchart of an unlocking event processing method provided in an embodiment of the present application, and the method is applied to the mobile terminal, and the method includes:
step 201: when an event to be unlocked is detected, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a first fingerprint image.
The event to be unlocked includes, for example, a fingerprint payment event, a screen unlocking event, an application starting event, a file decryption event, an album decryption event, and the like.
Further, the interface currently displayed by the mobile terminal is a payment interface, and the method further comprises the following steps: if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that a fingerprint payment event is detected.
Further, the currently displayed interface of the mobile terminal is a screen locking interface or the mobile terminal is currently in a screen off state, and the method further comprises the following steps: if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that a screen unlocking event is detected.
Further, the currently displayed interface of the mobile terminal is a system desktop, and the method further comprises the following steps: and if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that the application starting event is detected.
Further, the currently displayed interface of the mobile terminal is a file preview interface, and the method further includes: and if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that a file decryption event is detected.
Further, the currently displayed interface of the mobile terminal is an album preview interface, and the method further comprises the following steps: and if the touch operation aiming at the fingerprint acquisition area is detected, the mobile terminal determines that the album decryption event is detected.
Wherein, under the condition that the signal that fingerprint sensor gathered under the screen was light signal, mobile terminal passed through fingerprint sensor carries out fingerprint collection under the screen, and the concrete implementation who obtains first fingerprint image has: the mobile terminal collects optical signals through the fingerprint sensor under the screen, processes the optical signals to obtain an image, and then performs image processing on the image to obtain a first fingerprint image in the image.
Step 202: and the mobile terminal performs fingerprint identification operation based on the first fingerprint image.
Further, at least two fingerprint template sets are stored in the mobile terminal, and the specific implementation manner of the mobile terminal performing the fingerprint identification operation based on the first fingerprint image includes: and the mobile terminal determines a target fingerprint template set corresponding to the event to be unlocked and performs fingerprint identification operation based on the first fingerprint image and the target fingerprint template set. Therefore, the target fingerprint template set corresponding to the event to be unlocked is used for fingerprint identification, so that the number of fingerprint templates for fingerprint identification is reduced, the time required by fingerprint identification is reduced, and the fingerprint identification speed is increased.
Each fingerprint template set corresponds to one event to be unlocked, or each fingerprint template set corresponds to at least one event to be unlocked, which is not limited herein.
Further, the specific implementation manner of the mobile terminal performing the fingerprint identification operation based on the first fingerprint image and the target fingerprint template set is as follows: the mobile terminal arranges all the fingerprint templates in the target fingerprint template set according to the sequence of the matching success times; and the mobile terminal compares the first fingerprint image with the fingerprint templates in the target fingerprint template set one by one according to the arranged sequence. Therefore, the fingerprint templates with high matching times are compared first, so that the time required by fingerprint identification can be further shortened.
Step 203: and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, the mobile terminal determines that the unlocking of the event to be unlocked is failed.
The first threshold is, for example, 20, 30, 50, 100, 110, 150 or other values. The first threshold values corresponding to different events to be unlocked are the same. Or the first threshold values corresponding to different events to be unlocked are different, for example, the event to be unlocked is a fingerprint payment event, the corresponding first threshold value is 30, for example, the event to be unlocked is a screen unlocking event, the corresponding first threshold value is 100, and the like.
Further, when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is smaller than the first threshold value, the mobile terminal processes the event to be unlocked.
Further, the event to be unlocked is a screen unlocking event, and the processing of the event to be unlocked by the mobile terminal includes:
when the number of times of continuous unlocking failure accumulated by the mobile terminal is smaller than a fifth threshold value, the mobile terminal executes screen unlocking operation and starts a first mode, first private information is in a display state in the first mode, and the fifth threshold value is equal to half of the first threshold value;
and when the number of continuous unlocking failure times accumulated by the mobile terminal is greater than or equal to the fifth threshold, the mobile terminal executes screen unlocking operation and starts a second mode, and the first private information is in a hidden state in the second mode.
The first private information includes, for example, some contacts (e.g., family, girlfriends, etc.) in the address book, some application icons (e.g., application icons of payment-type applications, application icons of instant messaging applications, application icons of memos, application icons of notebooks, etc.), and the like.
Further, the event to be unlocked is a fingerprint payment event, and the processing of the event to be unlocked by the mobile terminal includes:
when the number of times of continuous unlocking failure accumulated by the mobile terminal is less than a sixth threshold value, the mobile terminal executes fingerprint payment operation, wherein the sixth threshold value is equal to half of the first threshold value;
when the number of continuous unlocking failure times accumulated by the mobile terminal is greater than or equal to the sixth threshold value, the mobile terminal prompts to input a payment password; and when the input payment password is correct, the mobile terminal executes fingerprint payment operation.
The payment password may be a digital payment password or a graphic payment password, which is not limited herein.
Further, the event to be unlocked is an application start event, and the processing of the event to be unlocked by the mobile terminal includes:
when the number of times of continuous unlocking failure accumulated by the mobile terminal is smaller than a seventh threshold value, the mobile terminal executes application starting operation and starts a third mode, second private information is in a display state in the third mode, and the seventh threshold value is equal to half of the first threshold value;
and when the number of times of continuous unlocking failure accumulated by the mobile terminal is greater than or equal to the seventh threshold value, the mobile terminal executes application starting operation and starts a fourth mode, and the second private information is in a hidden state in the third mode.
The second private information is some private information related to the application corresponding to the preset application starting event. For example, it is assumed that the application corresponding to the application start event is QQ, and the second private information has call records of one or more contacts, account numbers of one or more contacts, and the like.
It can be seen that, in the embodiment of the application, when the number of times of consecutive unlocking failures accumulated by the mobile terminal exceeds a certain number, even if the current fingerprint identification is successful, the unlocking event associated with the current fingerprint identification is determined to have failed to unlock, so that the success rate of violent unlocking is reduced.
In an implementation manner of the present application, after the mobile terminal determines that the event to be unlocked fails to unlock, the method further includes: and the mobile terminal clears the continuous unlocking failure times accumulated by the mobile terminal.
It can be seen that, in the embodiment of the present application, when the number of consecutive unlocking failures accumulated by the mobile terminal exceeds a certain number, if the current fingerprint identification is successful, the number of consecutive unlocking failures accumulated before is cleared, so as to avoid the problem that the normal use of the mobile terminal is affected by the violence-proof unlocking mechanism.
In an implementation manner of the present application, the event to be unlocked is a fingerprint payment event, and after the mobile terminal clears the number of consecutive unlocking failures accumulated by the mobile terminal, the method further includes:
when the fingerprint payment event is detected again, the mobile terminal determines whether the distance between the first moment and the current moment is smaller than a second threshold value and whether the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, wherein the first moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal;
and when the distance between the first moment and the current moment is less than the second threshold value and the money amount associated with the fingerprint payment event is greater than or equal to the third threshold value, the mobile terminal determines that the payment of the fingerprint payment event fails.
It can be seen that, in the embodiment of the present application, a fingerprint payment event is detected again after the violence-proof unlocking mechanism is just released, and in this case, if the amount of the fingerprint payment event is large, it is directly determined that the current fingerprint payment event payment fails, so that the security of payment is improved.
In an implementation manner of the present application, the method further includes:
when the distance between the first moment and the current moment is larger than or equal to the second threshold value and the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a second fingerprint image;
when the fingerprint identification operation based on the second fingerprint image is successful, the mobile terminal determines whether the geographic position associated with the fingerprint payment event is a set geographic position;
and when the geographic position associated with the fingerprint payment event is the set geographic position, the mobile terminal executes fingerprint payment operation.
The geographic location associated with the fingerprint payment event may be a receiving address, a current geographic location of the mobile terminal, a geographic location of a currently paid storefront, and the like.
It can be seen that, in the embodiment of the present application, the fingerprint payment event is detected again for a long time after the anti-violent unlocking mechanism is released, in this case, because the fingerprint payment event is detected for the first time after the anti-violent unlocking mechanism is released, if the amount associated with the payment event is large, further determination is required, so as to improve the security of payment.
In an implementation manner of the present application, the event to be unlocked is a screen unlocking event, and after the mobile terminal clears the number of consecutive unlocking failures accumulated by the mobile terminal, the method further includes:
when the screen unlocking event is detected again, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a third fingerprint image;
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is less than a fourth threshold value, the mobile terminal executes screen unlocking operation and starts a first mode, wherein the first private information is in a hidden state in the first mode, and the second moment is the moment of clearing the continuous unlocking failure times accumulated by the mobile terminal.
The first private information includes, for example, some contacts (e.g., family, girlfriends, etc.) in the address book, some application icons (e.g., application icons of payment-type applications, application icons of instant messaging applications, application icons of memos, application icons of notebooks, etc.), and the like.
It can be seen that, in the embodiment of the application, a screen unlocking event is detected again after the violence-proof unlocking mechanism is just released, and under the condition, if the fingerprint identification is successful, the screen unlocking operation is still performed, and meanwhile, the private mode is also started, so that information leakage is avoided, and further, the information security is improved.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, the mobile terminal executes screen unlocking operation and starts a second mode, and the first private information is in a display state in the first mode.
It can be seen that, in the embodiment of the present application, a screen unlocking event is detected again for a long time after the anti-violence unlocking mechanism is released, and in this case, if the fingerprint identification is successful, a normal screen unlocking operation is performed to ensure that the mobile terminal is normally used.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is less than the fourth threshold, the mobile terminal is locked, and the time length for locking the mobile terminal is a first set time length.
It can be seen that, in the embodiment of the present application, a screen unlocking event is detected again after the violence-proof unlocking mechanism is just released, and in this case, if the fingerprint identification fails, the mobile terminal is directly locked, so that the security of the mobile terminal is further improved.
Further, the method further comprises:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, the mobile terminal adds 1 to the number of screen unlocking failures.
It can be seen that, in the embodiment of the application, after the violence-proof unlocking mechanism is released for a long time, the screen unlocking event is detected, and in this case, if the fingerprint identification fails, only the number of screen unlocking failures is increased by 1, so as to ensure the normal use of the mobile terminal.
In an implementation manner of the present application, the event to be unlocked is an application start event, and after the mobile terminal clears the number of consecutive unlocking failures accumulated by the mobile terminal, the method further includes:
when the application starting event is detected again, the mobile terminal performs fingerprint acquisition through the under-screen fingerprint sensor to obtain a fourth fingerprint image;
and when the fingerprint identification operation based on the fourth fingerprint image is successful and the third time is greater than or equal to an eighth threshold value from the current time, the mobile terminal executes application starting operation and starts a third mode, wherein second private information is in a display state in the third mode, and the third time is the time for clearing the continuous unlocking failure times accumulated by the mobile terminal.
The second private information is some private information related to the application corresponding to the preset application starting event. For example, it is assumed that the application corresponding to the application start event is QQ, and the second private information has call records of one or more contacts, account numbers of one or more contacts, and the like.
It can be seen that, in the embodiment of the present application, an application start event is detected again for a long time after the anti-violent unlocking mechanism is released, and in this case, if the fingerprint identification is successful, a normal application start operation is performed to ensure that the application is normally used.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the fourth fingerprint image is successful and the distance between the third moment and the current moment is less than the eighth threshold value, the mobile terminal executes application starting operation and starts a fourth mode, wherein the second private information is in a hidden state in the fourth mode.
It can be seen that, in the embodiment of the present application, an application start event is detected again after the violence-proof unlocking mechanism is just released for a long time, and in this case, if the fingerprint identification is successful, the application start operation is still performed, and meanwhile, the private mode is also enabled, so as to avoid information leakage, and further improve the security of the application.
In an implementation manner of the present application, the method further includes:
and when the fingerprint identification operation based on the fourth fingerprint image fails and the distance between the third moment and the current moment is less than the eighth threshold, the mobile terminal locks the application associated with the application starting event, and the duration of the application is locked as a second set duration.
It can be seen that, in the embodiment of the present application, an application start event is detected again shortly after the anti-violent unlocking mechanism is released, in this case, if the fingerprint identification fails, the application associated with the application start event is directly locked, and the security of the application is further improved.
Further, the method further comprises:
and when the fingerprint identification operation based on the fourth fingerprint image fails and the distance between the third moment and the current moment is greater than or equal to the eighth threshold, the mobile terminal adds 1 to the application starting failure times.
It can be seen that, in the embodiment of the present application, after the anti-violent unlocking mechanism is released for a long time, the application start event is detected again, and in this case, if the fingerprint identification fails, only 1 is added to the number of times of application start failure, so as to ensure normal use of the application.
Referring to fig. 3, fig. 3 is a schematic flowchart of another unlocking event processing method provided in the embodiment of the present application, and the method is applied to the mobile terminal, and includes:
step 301: when a screen unlocking event is detected, the mobile terminal carries out fingerprint acquisition through a fingerprint sensor under a screen to obtain a first fingerprint image.
Step 302: the mobile terminal conducts fingerprint identification operation based on the first fingerprint image, and determines whether the number of continuous unlocking failures accumulated by the mobile terminal is larger than or equal to a first threshold value.
When the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, executing step 303;
when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is less than the first threshold value, executing step 311;
when the fingerprint identification operation based on the first fingerprint image fails, step 312 is performed.
Step 303: and the mobile terminal determines that the event to be unlocked fails to be unlocked.
Step 304: and the mobile terminal clears the continuous unlocking failure times accumulated by the mobile terminal.
Step 305: and when the screen unlocking event is detected again, the mobile terminal carries out fingerprint acquisition through the under-screen fingerprint sensor to obtain a third fingerprint image.
Step 306: and the mobile terminal performs fingerprint identification operation based on the third fingerprint image, and determines whether a second moment is smaller than a fourth threshold value from the current moment, wherein the second moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal.
And when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second time and the current time is less than the fourth threshold, executing step 307.
And executing step 308 when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold.
When the fingerprint identification operation based on the third fingerprint image fails and the second time is less than the fourth threshold from the current time, step 309 is executed.
When the fingerprint identification operation based on the third fingerprint image fails and the second time is greater than or equal to the fourth threshold from the current time, step 310 is executed.
Step 307: the mobile terminal executes screen unlocking operation and starts a first mode, first private information is in a hidden state in the first mode, and the second moment is the moment of zero clearing of the continuous unlocking failure times accumulated by the mobile terminal.
Step 308: the mobile terminal executes screen unlocking operation and starts a second mode, and the first private information is in a display state in the first mode.
Step 309: and the mobile terminal is locked by the mobile terminal, and the time length for locking the mobile terminal is a first set time length.
Step 310: and the mobile terminal adds 1 to the unlocking failure times.
Step 311: and the mobile terminal processes the screen unlocking event.
Step 312: and the mobile terminal adds 1 to the continuous unlocking failure times accumulated by the mobile terminal.
It should be noted that, for the specific implementation process of the present embodiment, reference may be made to the specific implementation process described in the above method embodiment, and a description thereof is omitted here.
Consistent with the embodiments shown in fig. 2 and 3, please refer to fig. 4, where fig. 4 is a schematic structural diagram of another mobile terminal provided in an embodiment of the present application, and as shown in the drawing, the mobile terminal includes an off-screen fingerprint sensor, and further includes a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for performing the following steps:
when an event to be unlocked is detected, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a first fingerprint image;
performing fingerprint identification operation based on the first fingerprint image;
and when the fingerprint identification operation based on the first fingerprint image is successful and the number of continuous unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold value, determining that the unlocking of the event to be unlocked is failed.
In an implementation manner of the present application, after determining that the event to be unlocked fails to unlock, the program includes instructions further configured to: and clearing the continuous unlocking failure times accumulated by the mobile terminal.
In an implementation manner of the present application, the event to be unlocked is a fingerprint payment event, and after clearing the number of consecutive unlocking failures accumulated by the mobile terminal, the program includes an instruction further configured to execute the following steps:
when the fingerprint payment event is detected again, determining whether the distance between a first moment and the current moment is smaller than a second threshold value and whether the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, wherein the first moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal;
and when the first time is less than the second threshold value from the current time and the money amount associated with the fingerprint payment event is greater than or equal to the third threshold value, determining that the payment of the fingerprint payment event fails.
In an implementation manner of the present application, the program includes instructions for further performing the following steps:
when the distance between the first moment and the current moment is larger than or equal to the second threshold value and the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, fingerprint collection is carried out through the under-screen fingerprint sensor to obtain a second fingerprint image;
when the fingerprint identification operation based on the second fingerprint image is successful, determining whether the geographic position associated with the fingerprint payment event is a set geographic position;
and when the geographic position associated with the fingerprint payment event is the set geographic position, executing fingerprint payment operation.
In an implementation manner of the present application, the event to be unlocked is a screen unlocking event, and after clearing the number of consecutive unlocking failures accumulated by the mobile terminal, the program further includes an instruction for executing the following steps:
when the screen unlocking event is detected again, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a third fingerprint image;
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is less than a fourth threshold value, executing screen unlocking operation and starting a first mode, wherein the first private information is in a display state in the first mode, and the second moment is the moment of clearing the continuous unlocking failure times accumulated by the mobile terminal.
In an implementation manner of the present application, the program includes instructions for further performing the following steps:
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, executing screen unlocking operation and starting a second mode, wherein the first private information is in a hidden state in the first mode.
In an implementation manner of the present application, the program includes instructions for further performing the following steps:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is less than the fourth threshold value, locking the mobile terminal, wherein the time length for locking the mobile terminal is a first set time length.
It should be noted that, for the specific implementation process of the present embodiment, reference may be made to the specific implementation process described in the above method embodiment, and a description thereof is omitted here.
The above embodiments mainly introduce the scheme of the embodiments of the present application from the perspective of the method-side implementation process. It is understood that the mobile terminal includes hardware structures and/or software modules for performing the respective functions in order to implement the above-described functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the mobile terminal may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
The following is an embodiment of the apparatus of the present application, which is used to execute the method implemented by the embodiment of the method of the present application. Referring to fig. 5, fig. 5 is a view illustrating an unlocking event processing apparatus applied to a mobile terminal including an underscreen fingerprint sensor according to an embodiment of the present application, where the unlocking event processing apparatus includes:
the fingerprint acquisition unit 501 is configured to perform fingerprint acquisition through the under-screen fingerprint sensor when an event to be unlocked is detected, so as to obtain a first fingerprint image;
a fingerprint identification unit 502, configured to perform a fingerprint identification operation based on the first fingerprint image;
an event processing unit 503, configured to determine that the event to be unlocked fails to unlock when the fingerprint identification operation based on the first fingerprint image is successful and the number of consecutive unlocking failures accumulated by the mobile terminal is greater than or equal to a first threshold.
In an implementation manner of the present application, the unlocking event processing apparatus further includes:
a number clearing unit 504, configured to clear consecutive unlocking failure numbers accumulated by the mobile terminal after determining that the unlocking of the event to be unlocked fails.
In an implementation manner of the present application, the event to be unlocked is a fingerprint payment event, and after the number of consecutive unlocking failures accumulated by the mobile terminal is cleared, the event processing unit 503 is further configured to determine, when the fingerprint payment event is detected again, whether a distance from a first time to a current time is less than a second threshold, and whether an amount associated with the fingerprint payment event is greater than or equal to a third threshold, where the first time is a time when the number of consecutive unlocking failures accumulated by the mobile terminal is cleared; and when the first time is less than the second threshold value from the current time and the money amount associated with the fingerprint payment event is greater than or equal to the third threshold value, determining that the payment of the fingerprint payment event fails.
In an implementation manner of the present application, the fingerprint acquisition unit 501 is further configured to acquire a fingerprint by using the under-screen fingerprint sensor when the distance between the first time and the current time is greater than or equal to the second threshold and the amount of money associated with the fingerprint payment event is greater than or equal to a third threshold, so as to obtain a second fingerprint image;
the event processing unit 503 is further configured to determine whether the geographic location associated with the fingerprint payment event is a set geographic location when the fingerprint identification operation based on the second fingerprint image is successful; and when the geographic position associated with the fingerprint payment event is the set geographic position, executing fingerprint payment operation.
In an implementation manner of the present application, the event to be unlocked is a screen unlocking event, and after the number of consecutive unlocking failures accumulated by the mobile terminal is cleared, the fingerprint acquisition unit 501 is further configured to perform fingerprint acquisition by the underscreen fingerprint sensor when the screen unlocking event is detected again, so as to obtain a third fingerprint image;
the event processing unit 503 is further configured to, when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second time and the current time is smaller than a fourth threshold, execute a screen unlocking operation, and enable a first mode in which the first private information is in a display state, where the second time is a time at which consecutive unlocking failure times accumulated by the mobile terminal are cleared.
In an implementation manner of the present application, the event processing unit 503 is further configured to execute a screen unlocking operation and enable a second mode when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second time and the current time is greater than or equal to the fourth threshold, where the first private information is in a hidden state in the first mode.
In an implementation manner of the present application, the unlocking event processing apparatus further includes:
and a locking unit 505, configured to lock the mobile terminal when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second time and the current time is less than the fourth threshold, where a duration of locking the mobile terminal is a first set duration.
It should be noted that the fingerprint collection unit 501, the fingerprint identification unit 502, the event processing unit 503, the number zero clearing unit 504, and the locking unit 505 may be implemented by a processor.
Embodiments of the present application further provide a computer storage medium, where the computer storage medium stores a computer program, the computer program is executed by a processor to perform part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes a mobile terminal.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising a mobile terminal.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (7)

1. An unlocking event processing method is applied to a mobile terminal comprising an underscreen fingerprint sensor, and comprises the following steps:
when an event to be unlocked is detected, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a first fingerprint image;
performing fingerprint identification operation based on the first fingerprint image, wherein at least two fingerprint template sets are stored in the mobile terminal, and performing fingerprint identification operation based on the first fingerprint image comprises: determining a target fingerprint template set corresponding to the event to be unlocked, and performing fingerprint identification operation based on the first fingerprint image and the target fingerprint template set; wherein fingerprinting operations based on the first fingerprint image and the set of target fingerprint templates comprise: arranging all fingerprint templates in the target fingerprint template set according to the sequence of the matching success times; the mobile terminal compares the first fingerprint image with the fingerprint templates in the target fingerprint template set one by one according to the arranged sequence; each fingerprint template set corresponds to an event to be unlocked;
when the fingerprint identification operation based on the first fingerprint image is successful and the accumulated continuous unlocking failure times of the mobile terminal corresponding to the event to be unlocked are greater than or equal to a first threshold value, determining that the event to be unlocked is unlocked unsuccessfully; the first threshold values corresponding to different events to be unlocked are different;
after determining that the event to be unlocked fails to unlock, the method further includes: clearing the continuous unlocking failure times accumulated by the mobile terminal;
when the event to be unlocked is a fingerprint payment event, and after the number of continuous unlocking failures accumulated by the mobile terminal is cleared, the method further comprises the following steps:
when the fingerprint payment event is detected again, determining whether the distance between a first moment and the current moment is smaller than a second threshold value and whether the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, wherein the first moment is the moment for clearing the continuous unlocking failure times accumulated by the mobile terminal; determining that the fingerprint payment event payment fails when the first time is less than the second threshold from the current time and the amount of money associated with the fingerprint payment event is greater than or equal to the third threshold;
when the distance between the first moment and the current moment is larger than or equal to the second threshold value and the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, fingerprint collection is carried out through the under-screen fingerprint sensor to obtain a second fingerprint image;
when the fingerprint identification operation based on the second fingerprint image is successful, determining whether the geographic position associated with the fingerprint payment event is a set geographic position; and when the geographic position associated with the fingerprint payment event is the set geographic position, executing fingerprint payment operation.
2. The method of claim 1,
when the event to be unlocked is a screen unlocking event, and after the number of continuous unlocking failures accumulated by the mobile terminal is cleared, the method further comprises the following steps: when the screen unlocking event is detected again, fingerprint acquisition is carried out through the under-screen fingerprint sensor to obtain a third fingerprint image;
and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is less than a fourth threshold value, executing screen unlocking operation and starting a first mode, wherein the first private information is in a hidden state in the first mode, and the second moment is the moment of clearing the continuous unlocking failure times accumulated by the mobile terminal.
3. The method of claim 2, further comprising: and when the fingerprint identification operation based on the third fingerprint image is successful and the distance between the second moment and the current moment is greater than or equal to the fourth threshold, executing screen unlocking operation and starting a second mode, wherein the first private information is in a display state in the first mode.
4. A method according to claim 2 or 3, characterized in that the method further comprises:
and when the fingerprint identification operation based on the third fingerprint image fails and the distance between the second moment and the current moment is less than the fourth threshold value, locking the mobile terminal, wherein the time length for locking the mobile terminal is a first set time length.
5. An unlocking event processing device, applied to a mobile terminal including an underscreen fingerprint sensor, the device comprising:
the fingerprint acquisition unit is used for acquiring fingerprints through the under-screen fingerprint sensor when an event to be unlocked is detected, so as to obtain a first fingerprint image;
a fingerprint identification unit, configured to perform a fingerprint identification operation based on the first fingerprint image, where at least two fingerprint template sets are stored in the mobile terminal, and performing a fingerprint identification operation based on the first fingerprint image includes: determining a target fingerprint template set corresponding to the event to be unlocked, and performing fingerprint identification operation based on the first fingerprint image and the target fingerprint template set; wherein fingerprinting operations based on the first fingerprint image and the set of target fingerprint templates comprise: arranging all fingerprint templates in the target fingerprint template set according to the sequence of the matching success times; the mobile terminal compares the first fingerprint image with the fingerprint templates in the target fingerprint template set one by one according to the arranged sequence; each fingerprint template set corresponds to an event to be unlocked;
the event processing unit is used for determining that the unlocking of the event to be unlocked is failed when the fingerprint identification operation based on the first fingerprint image is successful and the accumulated continuous unlocking failure times of the mobile terminal corresponding to the event to be unlocked are greater than or equal to a first threshold value; the first threshold values corresponding to different events to be unlocked are different; after the unlocking failure of the event to be unlocked is determined, clearing the continuous unlocking failure times accumulated by the mobile terminal;
wherein, when the event to be unlocked is a fingerprint payment event,
the event processing unit is further configured to determine whether a distance from a first time to a current time is less than a second threshold and whether an amount of money associated with the fingerprint payment event is greater than or equal to a third threshold when the fingerprint payment event is detected again after the number of consecutive unlocking failures accumulated by the mobile terminal is cleared, wherein the first time is the time when the number of consecutive unlocking failures accumulated by the mobile terminal is cleared; determining that the fingerprint payment event payment fails when the first time is less than the second threshold from the current time and the amount of money associated with the fingerprint payment event is greater than or equal to the third threshold;
when the distance between the first moment and the current moment is larger than or equal to the second threshold value and the money amount associated with the fingerprint payment event is larger than or equal to a third threshold value, fingerprint collection is carried out through the under-screen fingerprint sensor to obtain a second fingerprint image;
when the fingerprint identification operation based on the second fingerprint image is successful, determining whether the geographic position associated with the fingerprint payment event is a set geographic position; and when the geographic position associated with the fingerprint payment event is the set geographic position, executing fingerprint payment operation.
6. A mobile terminal, characterized in that,
the mobile terminal comprising a touch screen comprising a fingerprint acquisition area, a processor and a fingerprint sensor provided below the fingerprint acquisition area, the mobile terminal further comprising a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps of the method according to any of claims 1-4.
7. A computer-readable storage medium, characterized in that,
a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any of claims 1-4.
CN201910027222.5A 2019-01-11 2019-01-11 Unlocking event processing method and related equipment Active CN109829279B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910027222.5A CN109829279B (en) 2019-01-11 2019-01-11 Unlocking event processing method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910027222.5A CN109829279B (en) 2019-01-11 2019-01-11 Unlocking event processing method and related equipment

Publications (2)

Publication Number Publication Date
CN109829279A CN109829279A (en) 2019-05-31
CN109829279B true CN109829279B (en) 2021-05-07

Family

ID=66860953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910027222.5A Active CN109829279B (en) 2019-01-11 2019-01-11 Unlocking event processing method and related equipment

Country Status (1)

Country Link
CN (1) CN109829279B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368281A (en) * 2020-03-04 2020-07-03 Oppo广东移动通信有限公司 Electronic equipment and unlocking method thereof
CN115329299A (en) * 2021-04-23 2022-11-11 华为技术有限公司 Screen unlocking method and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912905A (en) * 2016-04-11 2016-08-31 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal
CN106650582A (en) * 2016-09-27 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method, camera with fingerprint identification function and terminal
CN107347107A (en) * 2017-06-30 2017-11-14 深圳天珑无线科技有限公司 Encryption method, device and the computer-readable recording medium of mobile terminal addressbook

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104539811A (en) * 2015-01-23 2015-04-22 深圳市中兴移动通信有限公司 Anti-theft method of terminal and mobile terminal
CN105825164A (en) * 2015-08-28 2016-08-03 维沃移动通信有限公司 Fingerprint identification method and electronic equipment
CN105389566B (en) * 2015-11-13 2018-09-11 广东欧珀移动通信有限公司 Fingerprint identification method, the update method of fingerprint template, device and mobile terminal
CN105469033B (en) * 2015-11-13 2018-04-17 广东欧珀移动通信有限公司 fingerprint identification method, device and terminal device
CN105808122B (en) * 2016-03-14 2017-11-24 广东欧珀移动通信有限公司 One kind solution lock control method and terminal device
CN107423598B (en) * 2017-03-23 2019-10-11 Oppo广东移动通信有限公司 A kind of solution lock control method and mobile terminal
CN108875333B (en) * 2017-09-22 2023-05-16 北京旷视科技有限公司 Terminal unlocking method, terminal and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105912905A (en) * 2016-04-11 2016-08-31 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal
CN106650582A (en) * 2016-09-27 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method, camera with fingerprint identification function and terminal
CN107347107A (en) * 2017-06-30 2017-11-14 深圳天珑无线科技有限公司 Encryption method, device and the computer-readable recording medium of mobile terminal addressbook

Also Published As

Publication number Publication date
CN109829279A (en) 2019-05-31

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN108038393B (en) Application privacy protection method and mobile terminal
US20140106711A1 (en) Method, user device and computer-readable storage for displaying message using fingerprint
CN105654024B (en) Terminal device, fingerprint identification method and fingerprint identification device
CN103366107A (en) Method, device and mobile phone for protecting access permission of application program
JP2012073724A (en) Portable terminal, user authentication method and program
CN108429879B (en) Electronic apparatus, camera control method, camera control apparatus, and computer-readable storage medium
CN107959789B (en) Image processing method and mobile terminal
CN109063504B (en) Private file access method, mobile terminal and storage medium
EP3779765A1 (en) Radio frequency card function calling method and device
CN109829279B (en) Unlocking event processing method and related equipment
CN106599115B (en) Data protection method, device and terminal
CN105608357A (en) Fingerprint verification method, fingerprint verification device and terminal
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN105701386A (en) Security certification method and device
CN110855833A (en) Terminal retrieving method and device, terminal and storage medium
CN106874787B (en) Image viewing method and mobile terminal
CN110099167B (en) Unlocking method and device, terminal equipment and storage medium
EP3528152A1 (en) Method and apparatus for user authentication
CN112465497A (en) Payment method, payment device, electronic equipment and medium
CN109543431B (en) Application encryption method and device, electronic equipment and storage medium
CN111859322A (en) Identity verification method and device and electronic equipment
CN109657441B (en) Application opening method and related device
CN110087235B (en) Identity authentication method and device, and identity authentication method and device adjustment method and device
CN109298910B (en) Window calling method, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant