CN110321680A - Auth method and terminal device - Google Patents

Auth method and terminal device Download PDF

Info

Publication number
CN110321680A
CN110321680A CN201910560725.9A CN201910560725A CN110321680A CN 110321680 A CN110321680 A CN 110321680A CN 201910560725 A CN201910560725 A CN 201910560725A CN 110321680 A CN110321680 A CN 110321680A
Authority
CN
China
Prior art keywords
password
bending angle
screen bending
screen
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910560725.9A
Other languages
Chinese (zh)
Inventor
郑国炳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910560725.9A priority Critical patent/CN110321680A/en
Publication of CN110321680A publication Critical patent/CN110321680A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/0346Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor with detection of the device orientation or free movement in a 3D space, e.g. 3D mice, 6-DOF [six degrees of freedom] pointers using gyroscopes, accelerometers or tilt-sensors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Abstract

The invention discloses a kind of auth method and terminal device, method includes: to obtain the current screen bending angle of terminal device when receiving Client-initiated authentication request;Based on the original password of the screen bending angle and pre- typing, reference password number is determined;If detecting, the reference password number and the password to be verified of user input match, and pass through the authentication request.It can be seen that the present invention converts original password by removing screen bending angle as foundation, to hide original password, so as to achieve the purpose that more safely to carry out the authentication of user.

Description

Auth method and terminal device
Technical field
The present invention relates to field of terminal more particularly to a kind of auth methods and terminal device.
Background technique
Authentication refers to through certain means, completes the confirmation to user identity, and authentication can be divided into: based on altogether Enjoy the authentication, the authentication based on biological property and the authentication based on public key encryption algorithm of key.
By taking the authentication based on shared key as an example, current authentication scheme is usually, by judging that user exists Terminal device target user interface (locking screen interface, payment interface etc.) input password and preparatory typing password whether one It causes, the identity of user is confirmed.However, the password of user's input is easy to let out because being peeped in some public arenas Exposing is gone, not safe enough.
Therefore, a kind of safer authentication scheme is needed.
Summary of the invention
The purpose of the embodiment of the present invention is that a kind of auth method and terminal device are provided, for ensuring authentication Safety.
In a first aspect, a kind of method of authentication is provided, this method comprises:
When receiving Client-initiated authentication request, the current screen bending angle of terminal device is obtained;
Based on the original password of the screen bending angle and pre- typing, reference password number is determined;
If detecting, the reference password number and the password to be verified of user input match, and are tested by the identity Card request.
Second aspect provides a kind of method of authentication, this method comprises:
When receiving Client-initiated authentication request, the screen bending angle of terminal device is obtained;
If detecting, the screen bending angle is within the scope of preset reference screen bending angle, and the institute acquired The biological characteristic of the biological characteristic and preparatory typing of stating user matches, then passes through the authentication request.
The third aspect provides a kind of terminal device, which includes:
Module being obtained, when for receiving Client-initiated authentication request, it is curved to obtain the current screen of terminal device Dog-ear degree;
Determining module determines reference password number for the original password based on the screen bending angle and pre- typing;
Authentication module, if for detecting that the reference password number and the password to be verified of user input match, Pass through the authentication request.
Fourth aspect provides a kind of terminal device, which includes:
Module being obtained, when for receiving Client-initiated authentication request, obtaining the screen bending angle of terminal device Degree;
Authentication module, if for detect the screen bending angle be in it is preset with reference to screen bending angle range it It is interior, and the biological characteristic of the user and the biological characteristic of preparatory typing that acquire match, then are asked by the authentication It asks.
5th aspect, provides a kind of terminal device, and the terminal device includes: processor, memory and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing method as described in relation to the first aspect.
6th aspect, provides a kind of terminal device, and the terminal device includes: processor, memory and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing the method as described in second aspect.
7th aspect provides a kind of computer readable storage medium, stores meter on the computer readable storage medium Calculation machine program, the step of method as described in relation to the first aspect is realized when the computer program is executed by processor.
Eighth aspect provides a kind of computer readable storage medium, stores meter on the computer readable storage medium Calculation machine program, the step of method as described in second aspect is realized when the computer program is executed by processor.
In embodiments of the present invention, by using screen bending angle as independent variable, using original password as dependent variable, with Screen bending angle variation dynamic adjustment original password, obtain reference password number, with user interface for password input input When the password to be verified to match with reference password number, pass through the authentication request of user.It, can be to avoid original password based on this Leakage, so as to achieve the purpose that more safely carry out user authentication.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present invention, constitutes a part of the invention, this hair Bright illustrative embodiments and their description are used to explain the present invention, and are not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 is a kind of flow diagram for auth method that one embodiment of the present of invention provides;
Fig. 2 is that a kind of screen bending angle range that one embodiment of the present of invention provides is corresponding with cryptographic transformation rule Relation schematic diagram;
Fig. 3 be another embodiment of the present invention provides a kind of screen bending angle range and cryptographic transformation rule pair Answer relation schematic diagram;
Fig. 4 be another embodiment of the present invention provides a kind of auth method flow diagram;
Fig. 5 is that a kind of screen bending angle range that one embodiment of the present of invention provides is corresponding with living things feature recognition Relation schematic diagram;
Fig. 6 is a kind of structural schematic diagram for terminal device that one embodiment of the present of invention provides;
Fig. 7 be another embodiment of the present invention provides a kind of terminal device structural schematic diagram;
Fig. 8 is a kind of structural schematic diagram for terminal device that another embodiment of the invention provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow diagram for auth method that one embodiment of the present of invention provides, should referring to Fig. 1 Method can specifically include following steps:
Step 102: when receiving Client-initiated authentication request, obtaining the current screen bending angle of terminal device Degree;
Wherein, authentication request is used to verify the identity information of user, such as: unlock screen request, payment request, account Number logging request etc.;The foldable screen of terminal device can be flexible screen, be also possible to Folding screen, the latter is generally by two son screens It is formed with the shaft magnetic linkage item of connexon screen.
It should be noted that step 102 specifically can be exemplified are as follows:
Example 1, user click " immediate payment " control in certain payment interface of terminal device, and triggering terminal equipment passes through It is 45 ° that gravity sensor inside shaft magnetic linkage item, which calculates the current screen bending angle of terminal device,.
Example 2, user drag solution lock icon in the locking screen interface of terminal device upwards, and triggering terminal equipment passes through two sons It is 45 ° that the gravity sensing component of screen, which calculates the current screen bending angle of terminal device,.
As it can be seen that step 102 can be based on, the existing hardware device of terminal device is accurate, easily acquires screen bending angle, Without adding any new software or hardware.
It should be noted that after step 102, method further include: display step, a kind of implementation of the step can With are as follows:
The screen bending angle is shown in interface for password input, needs to input so that the user is determining to be verified close Code.
It is able to use family by being shown in interface for password input by screen bending angle based on this and more intuitively sees To screen bending angle, and password to be verified corresponding with the screen bending angle is inputted, avoids user because to screen bending angle Degree judges incorrectly and causes the password mistake to be verified of input, and then can more accurately input password to be verified.
Step 104: the original password based on the screen bending angle and pre- typing determines reference password number;
It should be noted that a kind of implementation of step 104 can be with are as follows:
Step S1: the corresponding target password transformation rule of the screen bending angle is determined;
Step S2: being based on the target password transformation rule, carries out conversion process to the original password of the pre- typing, obtains To reference password number.
Based on this, by being based on the corresponding target password transformation rule of screen bending angle, to the original password of pre- typing Conversion process is carried out, reference password number is obtained, can more acurrate, easily be obtained corresponding with screen bending angle with reference to close Code.
Further, a kind of implementation of step S1 can be with are as follows:
Step S11: screen bending angle range belonging to the screen bending angle is determined;
Step S12: the corresponding cryptographic transformation rule of the screen bending angle range is determined, and as the target password Transformation rule;
Wherein, the corresponding cryptographic transformation rule of different screen bending angle range is different.
Wherein, screen bending angle can be any one angle in 0~180 °;Screen bending angle range can divide It is 6, is followed successively by the 1st screen bending angle range to the 6th screen bending angle range ([0,30), [30,60), [60,90), [90,120), [120,150), [150,180]);Cryptographic transformation rule can be transformation algorithm and preset, and need to become in original password The numerical digit changed is different due to the difference of screen bending angle range, can also be that transformation numerical digit is default, the transformation in original password Algorithm is different due to the difference of screen bending angle range, can also be the numerical digit for needing to convert in original password and transformation algorithm It is different due to the difference of screen bending angle range.
Based on this, by the way that cryptographic transformation rule corresponding to screen bending angle range belonging to screen bending angle is made For target password transformation rule, and it is regular not have to correspond to different password rules for each screen bending angle, enables to mesh The determination for marking cryptographic transformation rule is more convenient.
Cryptographic transformation rule is that transformation algorithm is default, and the numerical digit for needing to convert in original password is because of screen bending angle range It is different without simultaneously, " being based on the target password transformation rule in step S2, being carried out to the original password of the pre- typing A kind of implementation of conversion process " can be with are as follows:
Step S21: being based on the target password transformation rule, determines and in the original password of the pre- typing needs to convert Numerical digit;
Step S22: based on default transformation algorithm, conversion process is carried out to the numerical digit in the original password;
Wherein, conversion process includes: at least one of transformation numerical digit numerical value, transformation digit position;The numerical digit can be with It is one, is also possible to multidigit;When the numerical digit is one, the numerical digit can be with screen bending angle range in positive corresponding (the 1st numerical digit to the 6th numerical digit of original password corresponds the 1st screen bending angle range to the 6th screen bending model to relationship respectively Enclose), it can also be in that (the 1st numerical digit to the 6th numerical digit difference of original password is one by one for reversed corresponding relationship with screen bending angle range Corresponding 6th screen bending angle range to the 1st screen bends range).
Assuming that the conversion process is transformation numerical digit numerical value, the numerical digit is one, the numerical digit and screen bending angle In positive corresponding relationship, original password is ' 123456 ', and the step S11, step S12, step S21 and step S22 specifically may be used With example are as follows:
Example 1: referring to fig. 2, when the screen bending angle is 25 °, screen belonging to the screen bending angle is determined Bending angle range be [0,30);Determine [0,30) corresponding target password transformation rule are as follows: to the 1st of original password (by In [0,30) it is the 1st screen bending angle range, it is therefore desirable to the numerical digit of transformation is the 1st) carry out the first default transformation algorithm The conversion process ((1+5) %10=6) of (can be after adding 5 and take the remainder divided by 10), i.e. the 1st of original password are by ' 1 ' transformation At ' 6 '.
In this example, available reference password number ' 623456 '.
Example 2: referring to fig. 2, when the screen bending angle is 160 °, screen belonging to the screen bending angle is determined Bending angle range is [150,180];Determine [150,180] corresponding target password transformation rule are as follows: to the 6th of original password the It is default that position (since [150,180] are the 6th screen bending angle range, it is therefore desirable to which the numerical digit of transformation is the 6th) carries out first The conversion process ((6+5) %10=1) of transformation algorithm (can be after adding 5 and taken the remainder divided by 10), i.e. the 6th of original password ' 1 ' has been transformed by ' 6 '.
In this example, available reference password number ' 123451 '.
Assuming that the conversion process is transformation numerical digit numerical value, the numerical digit is 3, and the numerical digit is in screen bending angle Positive corresponding relationship, original password are ' 123456 ', and the step S11, step S12, step S21 and step S22 specifically can be with Example are as follows:
Example 1: when the screen bending angle is 25 °, screen bending angle belonging to the screen bending angle is determined Range be [0,30);Determine [0,30) corresponding target password transformation rule are as follows: to the 1st to the 3rd of original password (due to [0,30) it is the 1st screen bending angle range, it is therefore desirable to the numerical digit of transformation can be 3 numerical digits since the 1st, i.e., the 1 to the 3rd) carry out first default conversion process ((1+5) %10 for converting algorithm (can be after adding 5 and take the remainder divided by 10) =6, (2+5) %10=7, (3+5) %10=8), i.e., the 1st of original password has been transformed into the ' 6 ', the 2nd by ' 1 ' and has been become by ' 2 ' It has changed the ' 7 ', the 3rd into and has been transformed into ' 8 ' by ' 3 '.
In this example, available reference password number ' 678456 '.
Example 2: when the screen bending angle is 45 °, screen bending angle belonging to the screen bending angle is determined Range be [30,60);Determine [30,60) corresponding target password transformation rule are as follows: to the 2nd to the 4th of original password (by In [30,60) it is the 2nd screen bending angle range, it is therefore desirable to and the numerical digit of transformation can be 3 numerical digits since the 2nd, I.e. the 2nd to the 4th) carry out the first default conversion process ((2+ for converting algorithm (can be after adding 5 and take the remainder divided by 10) 5) %10=7, (3+5) %10=8, (4+5) %10=9), i.e., the 2nd of original password has been transformed into the ' 7 ', the 3rd by ' 1 ' The ' 8 ', the 4th, which has been transformed into, by ' 3 ' has been transformed into ' 9 ' by ' 4 '.
In this example, available reference password number ' 178956 '.
Assuming that conversion process is transformation digit position, the numerical digit and screen bending angle are in positive corresponding relationship, it is original Password is ' 123456 ', and the step S11, step S12, step S21 and step S22 specifically can be exemplified are as follows:
Example 1: when the screen bending angle is 25 °, screen bending angle belonging to the screen bending angle is determined Range be [0,30);Determine [0,30) corresponding target password transformation rule are as follows: the second default transformation is carried out to original password and is calculated Method (can be ring shift left) 1 (due to [0,30) it is the 1st screen bending angle range, it is therefore desirable to and mobile digit is 1 Position) conversion process, i.e. original password has been transformed into ' 234561 ' by ' 123456 '.
In this example, available reference password number ' 234561 '.
Example 2: when the screen bending angle is 45 °, screen bending angle belonging to the screen bending angle is determined Range be [30,60);Determine [30,60) corresponding target password transformation rule are as follows: the second default transformation is carried out to original password Algorithm (can be ring shift left) 2 (due to [30,60) it is the 2nd screen bending angle range, it is therefore desirable to and mobile digit is 2) conversion process, i.e. original password has been transformed into ' 345612 ' by ' 123456 '.
In this example, available reference password number ' 345612 '.
Based on this, by adjusting the original password for needing to convert according to screen bending angle when transformation algorithm is fixed Numerical digit enables to the authentication of user more safe and flexible.
Cryptographic transformation rule is that transformation numerical digit is default, the transformation algorithm in original password because of screen bending angle range not With without simultaneously, " being based on the target password transformation rule in step S2, being converted to the original password of the pre- typing Another implementation of processing " can be with are as follows:
Step S21 ': it is based on the target password transformation rule, determines the transformation algorithm of the original password of the pre- typing;
Step S22 ': being based on the transformation algorithm, carries out conversion process to the value of the default numerical digit in the original password.
Wherein, default numerical digit can be one or more.
Assuming that the default numerical digit is one, original password is ' 123456 ', the step S11, step S12, step S21 It specifically can be exemplified with step S22 are as follows:
Example 1: referring to Fig. 3, when the screen bending angle is 25 °, screen belonging to the screen bending angle is determined Bending angle range be [0,30);Determine [0,30) corresponding target password transformation rule are as follows: to the default numerical digit of original password (can be the 1st) carry out plus 1 (due to [30,60) for the 1st screen bending angle range, therefore convert algorithm can for plus 1) Conversion process ((1+1=2), i.e. the 1st of original password have been transformed into ' 2 ' by ' 1 '.
In this example, available reference password number ' 223456 '.
Example 2: referring to Fig. 3, when the screen bending angle is 160 °, screen belonging to the screen bending angle is determined Bending angle range is [150,180];Determine [150,180] corresponding target password transformation rule are as follows: to the pre- of original password If numerical digit (the 1st) carries out plus the conversion process of 6 ([150,180] be the 6th screen bending angle range) ((1+6=7), i.e., The 1st of original password has been transformed into ' 7 ' by ' 1 '.
In this example, available reference password number ' 723456 '.
Assuming that the numerical digit is 3, original password is ' 123456 ', the step S11, step S12, step S21 and step Rapid S22 specifically can be exemplified are as follows:
Example 1: when the screen bending angle is 25 °, screen bending angle belonging to the screen bending angle is determined Range be [0,30);Determine [0,30) corresponding target password transformation rule are as follows: (the can be to the default numerical digit of original password 1, the 2nd and the 3rd) carry out plus 1 after take the remainder divided by 10 (due to [and 0,30) for the 1st screen bending angle range, therefore become Scaling method can for plus 1 after taken the remainder divided by 10) conversion process (1+1=2,2+1=3,3+1=4), i.e. the of original password 1 by ' 1 ' has been transformed into the ' 2 ', the 2nd and has been transformed into the ' 3 ', the 3rd by ' 2 ' and has been transformed into ' 4 ' by ' 3 '.
In this example, available reference password number ' 234456 '.
Example 2: when the screen bending angle is 45 °, screen bending angle belonging to the screen bending angle is determined Range be [30,60);Determine [30,60) corresponding target password transformation rule are as follows: to the default numerical digit of original password (the 1st, 2nd and the 3rd) carry out plus 2 after ([30,60) is taken the remainder divided by 10 as the 2nd screen bending angle range, therefore convert algorithm Can for plus 2 after taken the remainder divided by 10) conversion process (1+2=3,2+2=4,3+2=5), i.e., the 1st of original password by ' 1 ', which has been transformed into the ' 3 ', the 2nd, has been transformed into the ' 4 ', the 3rd by ' 2 ' and has been transformed into ' 5 ' by ' 3 '.
In this example, available reference password number ' 345456 '.
Based on this, by adjusting the original password for needing to convert according to screen bending angle when transformation numerical digit is fixed Algorithm is converted, enables to the authentication of user more safe and flexible.
Cryptographic transformation rule is the numerical digit for needing to convert in original password and transformation algorithm because of screen bending angle range It is different without simultaneously, " being based on the target password transformation rule in step S2, being carried out to the original password of the pre- typing Another implementation of conversion process " can be with are as follows:
Step S21 ": it is based on the target password transformation rule, determines the transformation algorithm of the original password of the pre- typing With the numerical digit of transformation;
Step S22 ": being based on the transformation algorithm, carries out conversion process to the value of the numerical digit in the original password.
Wherein, the numerical digit can be one or more.
The numerical digit is one, when original password is ' 123456 ', the step S11, step S12, step S21 and step S22 specifically can be exemplified are as follows:
Example 1: when the screen bending angle is 25 °, screen bending angle belonging to the screen bending angle is determined Range be [0,30);Determine [0,30) corresponding target password transformation rule are as follows: to the 1st of original password (due to [0,30) For the 1st screen bending angle range, it is therefore desirable to which the numerical digit of transformation is first) carry out plus 1 after take the remainder divided by 10 (due to [0,30) be the 1st screen bending angle range, therefore convert algorithm can for plus 1 be taken the remainder divided by 10) conversion process ((1 + 1) %10=2), i.e., the 1st of original password has been transformed into ' 2 ' by ' 1 '.
In this example, available reference password number ' 223456 '.
Example 2: when the screen bending angle is 45 °, screen bending angle belonging to the screen bending angle is determined Range be [30,60);Determine [30,60) corresponding target password transformation rule are as follows: to the 2nd of original password (due to [30, 60) be the 2nd screen bending angle range, it is therefore desirable to which the numerical digit of transformation is the 2nd) carry out plus 2 after take the remainder divided by 10 (by In [30,60) be the 2nd screen bending angle range, therefore convert algorithm can for plus 2 after taken the remainder divided by 10) transformation at It manages ((2+2) %10=4), i.e., the 2nd of original password has been transformed into ' 4 ' by ' 2 '.
In this example, available reference password number ' 143456 '.
Based on this, pass through the number of the transformation algorithm and transformation of the original password for needing to convert according to the adjustment of screen bending angle Position enables to the authentication of user more safe and flexible.
Step 106: if detecting, the reference password number and the password to be verified of user input match, and pass through institute State authentication request.
In the present embodiment, by using screen bending angle as independent variable, using original password as dependent variable, with screen The variation dynamic adjustment original password of bending angle, obtains reference password number, to input and refer in interface for password input in user When the password to be verified that password matches, pass through the authentication request of user.It, can letting out to avoid original password based on this Dew, so as to achieve the purpose that more safely to carry out the authentication of user.
Fig. 4 be another embodiment of the present invention provides a kind of auth method flow diagram, referring to fig. 4, This method can specifically include following steps:
Step 402: when receiving Client-initiated authentication request, obtaining the screen bending angle of terminal device;
Wherein, authentication request is used to verify the identity information of user, such as: unlock screen request, payment request, account Number logging request etc.;The foldable screen of terminal device can be flexible screen, be also possible to Folding screen, the latter is generally by two son screens It is formed with the shaft magnetic linkage item of connexon screen;The screen bending angle includes: screen when receiving the authentication request Curtain bending angle, alternatively, the maximum screen bending angle in preset time range before receiving the authentication request; Preset time range can be 5 seconds, 10 seconds etc..
It should be noted that assuming that preset time range is 5 seconds, referring to Fig. 5, step 402 specifically be can be exemplified are as follows:
Example 1, user press the fingerprint identification region 501 in certain payment interface of terminal device, and triggering terminal equipment is logical The gravity sensor crossed inside shaft magnetic linkage item calculates screen bending angle of the terminal device when receiving authentication request Degree is 25 °.
Example 2, user press the fingerprint identification region at the terminal device back side, and triggering terminal equipment passes through two sub-screens Gravity sensing component calculates maximum screen bending angle of the terminal device in 5 seconds before receiving authentication request 25°。
Based on this, by screen bending angle carry out diversification define, the screen that different moments are got it is curved Dog-ear degree enables to the authentication of user more flexible as screen bending angle.
Step 404: if detecting, the screen bending angle is within the scope of preset reference screen bending angle, and The biological characteristic of the user and the biological characteristic of preparatory typing of acquisition match, then pass through the authentication request.
Wherein, biological characteristic include physiological characteristic (such as fingerprint, image surface, iris, palmmprint) and behavioural characteristic (such as gait, Sound, person's handwriting etc.);It can be 90 ° to 120 °, 80 ° to 110 °, 0 ° to 30 ° etc. with reference to screen bending angle range.
It should be noted that step 404 specifically can be exemplified are as follows:
Example 1: terminal device first detect screen bending angle whether be in it is preset with reference to screen bending angle range it It is interior, if it is not, then refusing the authentication request of the user;If so, acquiring the fingerprint of the user again, and the user's When fingerprint and the fingerprint of pre- typing match, by the authentication request of the user, the user is allowed to be paid accordingly Operation.
Example 2: terminal device first acquires the fingerprint of the user, and determines the fingerprint of the user and the fingerprint of pre- typing Whether match, if it is not, then refusing the authentication request of the user;If so, being in preset ginseng in screen bending angle When examining within the scope of screen bending angle, by the authentication request of the user, the user is allowed to carry out corresponding payment behaviour Make.
Example 3: terminal device first acquires the fingerprint of the user, then determines whether screen bending angle is in preset ginseng Within the scope of examining screen bending angle, if it is not, then refusing the authentication request of the user;If so, in the finger of the user When line and the fingerprint of pre- typing match, by the authentication request of the user, the user is allowed to carry out corresponding payment behaviour Make.
It should be noted that assuming with reference to screen bending angle to be 0 ° to 30 °, step 404 specifically be can be exemplified are as follows:
Example 1: referring to Fig. 5, when the bending angle of screen is 25 °, since 25 ° within the scope of 0 ° to 30 °, then exist When the fingerprint of the user and the fingerprint of pre- typing match, terminal device shows " OK " on a user interface, to indicate to pass through The authentication request of the user.
Example 2: referring to Fig. 5, when the bending angle of screen is 160 °, within the scope of being not at 0 ° to 30 ° due to 160 °, Then terminal device shows " Error " on a user interface, to indicate to refuse the authentication request of the user.
It should be noted that method further include: input step, a kind of implementation of the step can be with are as follows:
If the authentication request does not pass through, prompts the user to input text password, tested with re-initiating identity Card request.
It should be noted that assuming that user presses the fingerprint identification region in certain payment interface of terminal device, terminal is set The standby screen bending angle got is 70 °, is 80 ° to 110 ° with reference to screen bending angle range, step 204 can specifically be shown Example are as follows:
Within the scope of being not at 80 ° to 110 ° due to 70 °, terminal device refuses the user and passes through fingerprint authentication side The authentication request that formula is initiated, and prompting message is issued in the payment interface: " fingerprint authentication failure, password please be input "; The text password of user's input is identical as reference password number, and terminal device passes through the authentication request of the user, allows the user Corresponding delivery operation is carried out, and restores fingerprint authentication function.
It can be by biological characteristic by prompting user to input text password when authentication request does not pass through based on this Identification and Password Input combine, and enable to authentication more flexible and safe.
In the present embodiment, by limit using user biological characteristic progress authentication when screen bending angle model It encloses, to refuse not in the range of the screen bending angle, the authentication carried out using the biological characteristic of user, so as to More safely carry out the authentication of user.
Fig. 6 is a kind of structural schematic diagram for terminal device that one embodiment of the present of invention provides, referring to Fig. 6, the terminal Equipment can specifically include: obtain module 602, determining module 604 and authentication module 606, in which:
Module 602 being obtained, when for receiving Client-initiated authentication request, obtaining the current screen of terminal device Bending angle;
Determining module 604 determines reference password number for the original password based on the screen bending angle and pre- typing;
Authentication module 606, if for detecting that the reference password number and the password to be verified of user input match, Then pass through the authentication request.
Optionally, determining module 604, comprising:
Determination unit, for determining the corresponding target password transformation rule of the screen bending angle;
Based on the target password transformation rule, conversion process is carried out to the original password of the pre- typing, is referred to Password.
Optionally, determination unit, comprising:
Subelement is determined, for determining screen bending angle range belonging to the screen bending angle;
It determines the corresponding cryptographic transformation rule of the screen bending angle range, and converts and advise as the target password Then;
Wherein, the corresponding cryptographic transformation rule of different screen bending angle range is different.
Optionally, determination unit, further includes:
First transformation subelement determines the original password of the pre- typing for being based on the target password transformation rule The middle numerical digit for needing to convert;
Based on default transformation algorithm, conversion process is carried out to the numerical digit in the original password;
Wherein, conversion process includes: at least one of transformation numerical digit numerical value, transformation digit position.
Optionally, determination unit, further includes:
Second transformation subelement determines the original password of the pre- typing for being based on the target password transformation rule Transformation algorithm;
Based on the transformation algorithm, conversion process is carried out to the value of the default numerical digit in the original password.
Optionally, terminal device, further includes:
Display module is needed for showing the screen bending angle in interface for password input so that the user determines The password to be verified of input.
As it can be seen that the present embodiment is by using screen bending angle as independent variable, using original password as dependent variable, with screen The variation dynamic adjustment original password of curtain bending angle, obtains reference password number, to input and join in interface for password input in user When examining the password to be verified that password matches, pass through the authentication request of user.It, can letting out to avoid original password based on this Dew, so as to achieve the purpose that more safely to carry out the authentication of user.
Device provided in an embodiment of the present invention can be realized each mistake that device is realized in the embodiment of the method for Fig. 1 to Fig. 3 Journey, to avoid repeating, which is not described herein again.Moreover, it should be noted that in all parts of the device of the invention, according to Its function to be realized and logical partitioning has been carried out to component therein, still, the present invention is not only restricted to this, can according to need All parts are repartitioned or are combined.
Fig. 7 be another embodiment of the present invention provides a kind of terminal device structural schematic diagram, referring to Fig. 7, the end End equipment can specifically include: obtain module 702 and authentication module 704, in which:
Module 702 being obtained, when for receiving Client-initiated authentication request, obtaining the screen bending of terminal device Angle;
Authentication module 704, if referring to screen bending angle model for detecting that the screen bending angle is in preset Within enclosing, and the biological characteristic of the user and the biological characteristic of preparatory typing that acquire match, then are tested by the identity Card request.
Optionally, the screen bending angle includes: screen bending angle when receiving the authentication request, or Person receives the maximum screen bending angle in the preset time range before the authentication request.
Optionally, terminal device further include: input module prompts institute if not passing through for the authentication request It states user and inputs text password, to re-initiate authentication request.
As it can be seen that the present embodiment, which passes through, limits screen bending angle when carrying out authentication using the biological characteristic of user Range, to refuse not in the range of the screen bending angle, the authentication carried out using the biological characteristic of user, so as to Enough authentications for more safely carrying out user.
Device provided in an embodiment of the present invention can be realized each mistake that device is realized in the embodiment of the method for Fig. 4 to Fig. 5 Journey, to avoid repeating, which is not described herein again.Moreover, it should be noted that in all parts of the device of the invention, according to Its function to be realized and logical partitioning has been carried out to component therein, still, the present invention is not only restricted to this, can according to need All parts are repartitioned or are combined.
A kind of hardware structural diagram of Fig. 8 mobile terminal of each embodiment to realize the present invention,
The mobile terminal 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, defeated Enter unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor The components such as 810 and power supply 811.It will be understood by those skilled in the art that mobile terminal structure shown in Fig. 8 is not constituted Restriction to mobile terminal, mobile terminal may include than illustrating more or fewer components, perhaps combine certain components or Different component layouts.In embodiments of the present invention, mobile terminal include but is not limited to mobile phone, tablet computer, laptop, Palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, when for receiving Client-initiated authentication request, it is current to obtain terminal device for processor 810 Screen bending angle;
Based on the original password of the screen bending angle and pre- typing, reference password number is determined;
If detecting, the reference password number and the password to be verified of user input match, and are tested by the identity Card request.
By using screen bending angle as independent variable, using original password as dependent variable, with screen bending angle Variation dynamic adjustment original password, obtains reference password number, to match in interface for password input input with reference password number in user Password to be verified when, pass through the authentication request of user.Based on this, can to avoid the leakage of original password, so as to Achieve the purpose that the authentication for more safely carrying out user.
Processor 810 when being also used to receive Client-initiated authentication request, obtains the screen bending of terminal device Angle;
If detecting, the screen bending angle is within the scope of preset reference screen bending angle, and the institute acquired The biological characteristic of the biological characteristic and preparatory typing of stating user matches, then passes through the authentication request.
By limit using user biological characteristic carry out authentication when screen bending angle range, with refusal not In the range of the screen bending angle, using user biological characteristic carry out authentication, so as to more safely into The authentication of row user.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Mobile terminal provides wireless broadband internet by network module 802 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also be provided and be moved The relevant audio output of specific function that dynamic terminal 800 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor (Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 806.Through graphics processor 8041, treated that picture frame can be deposited Storage is sent in memory 809 (or other storage mediums) or via radio frequency unit 801 or network module 802.Mike Wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Mobile terminal 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when mobile terminal 800 is moved in one's ear Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap Display panel 8061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 807 include touch panel 8071 and Other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel 8071 Neighbouring operation).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 810, receiving area It manages the order that device 810 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other input equipments 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, touch panel 8071 and display Panel 8061 is the function that outputs and inputs of realizing mobile terminal as two independent components, but in some embodiments In, can be integrated by touch panel 8071 and display panel 8061 and realize the function that outputs and inputs of mobile terminal, it is specific this Place is without limitation.
Interface unit 808 is the interface that external device (ED) is connect with mobile terminal 800.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in mobile terminal 800 or can be used in 800 He of mobile terminal Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 809, and calls and is stored in storage Data in device 809 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 810 may include one or more processing units;Preferably, processor 810 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 810.
Mobile terminal 800 can also include the power supply 811 (such as battery) powered to all parts, it is preferred that power supply 811 Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, mobile terminal 800 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor, and memory is stored in memory Computer program that is upper and can running on the processor, the computer program realize that above-mentioned identity is tested when being executed by processor Each process of embodiment of the method is demonstrate,proved, and identical technical effect can be reached, to avoid repeating, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned auth method embodiment, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (10)

1. a kind of auth method, which is characterized in that the terminal device applied to foldable screen, comprising:
When receiving Client-initiated authentication request, the current screen bending angle of the terminal device is obtained;
Based on the original password of the screen bending angle and pre- typing, reference password number is determined;
If detecting, the reference password number and the password to be verified of user input match, and are asked by the authentication It asks.
2. the method according to claim 1, wherein the original based on the screen bending angle and pre- typing Beginning password, determines reference password number, comprising:
Determine the corresponding target password transformation rule of the screen bending angle;
Based on the target password transformation rule, conversion process is carried out to the original password of the pre- typing, obtains reference password number.
3. according to the method described in claim 2, it is characterized in that, the corresponding target of the determination screen bending angle is close Code conversion rule, comprising:
Determine screen bending angle range belonging to the screen bending angle;
Determine the corresponding cryptographic transformation rule of the screen bending angle range, and as the target password transformation rule;
Wherein, the corresponding cryptographic transformation rule of different screen bending angle range is different.
4. according to the method described in claim 2, it is characterized in that, described be based on the target password transformation rule, to described The original password of pre- typing carries out conversion process, comprising:
Based on the target password transformation rule, the numerical digit for needing to convert in the original password of the pre- typing is determined;
Based on default transformation algorithm, conversion process is carried out to the numerical digit in the original password;
Wherein, conversion process includes: at least one of transformation numerical digit numerical value, transformation digit position.
5. the method according to claim 1, wherein further include:
The screen bending angle is shown in interface for password input, so that the user determines the password to be verified for needing to input.
6. a kind of auth method, which is characterized in that the terminal device applied to foldable screen, comprising:
When receiving Client-initiated authentication request, the screen bending angle of the terminal device is obtained;
If detecting, the screen bending angle is within the scope of preset reference screen bending angle, and the use acquired The biological characteristic at family and the biological characteristic of preparatory typing match, then pass through the authentication request.
7. according to the method described in claim 6, it is characterized in that, the screen bending angle includes: to receive the identity Screen bending angle when checking request, alternatively, in preset time range before receiving the authentication request most Large screen bending angle.
8. according to the method described in claim 6, it is characterized in that, if the authentication request does not pass through, described in prompt User inputs text password, to re-initiate authentication request.
9. a kind of terminal device characterized by comprising
Module being obtained, when for receiving Client-initiated authentication request, obtaining the current screen bending angle of terminal device Degree;
Determining module determines reference password number for the original password based on the screen bending angle and pre- typing;
Authentication module, if passing through for detecting that the reference password number and the password to be verified of user input match The authentication request.
10. a kind of terminal device characterized by comprising
Module being obtained, when for receiving Client-initiated authentication request, obtaining the screen bending angle of terminal device;
Authentication module, if within the scope of for detecting that the screen bending angle is in preset reference screen bending angle, And the biological characteristic of the user and the biological characteristic of preparatory typing of acquisition match, then pass through the authentication request.
CN201910560725.9A 2019-06-26 2019-06-26 Auth method and terminal device Pending CN110321680A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910560725.9A CN110321680A (en) 2019-06-26 2019-06-26 Auth method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910560725.9A CN110321680A (en) 2019-06-26 2019-06-26 Auth method and terminal device

Publications (1)

Publication Number Publication Date
CN110321680A true CN110321680A (en) 2019-10-11

Family

ID=68120375

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910560725.9A Pending CN110321680A (en) 2019-06-26 2019-06-26 Auth method and terminal device

Country Status (1)

Country Link
CN (1) CN110321680A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259789B1 (en) * 1997-12-12 2001-07-10 Safecourier Software, Inc. Computer implemented secret object key block cipher encryption and digital signature device and method
CN1523809A (en) * 2003-09-08 2004-08-25 赵忠华 Password variable identification verification technique
KR20100052789A (en) * 2008-11-11 2010-05-20 이응준 Web document creation system for auto change of plural passwords and method thereof
KR20130085528A (en) * 2011-12-15 2013-07-30 엘지전자 주식회사 Apparatus for unlocking mobile terminal and method thereof
CN104766002A (en) * 2015-03-04 2015-07-08 深圳市中兴移动通信有限公司 Method and device for unlocking
CN106096383A (en) * 2016-06-12 2016-11-09 捷开通讯(深圳)有限公司 Automatically mobile terminal and the method thereof of unlocking pin are changed
CN107704736A (en) * 2017-09-28 2018-02-16 广东欧珀移动通信有限公司 Unlocking method and a device, computer equipment, computer-readable recording medium
CN108268761A (en) * 2016-12-31 2018-07-10 中国移动通信集团北京有限公司 A kind of method of password authentication and device
CN108881594A (en) * 2018-04-27 2018-11-23 努比亚技术有限公司 Safety identification control method, flexible screen terminal and computer readable storage medium
CN109886686A (en) * 2019-02-28 2019-06-14 努比亚技术有限公司 A kind of safe payment method, equipment and computer readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259789B1 (en) * 1997-12-12 2001-07-10 Safecourier Software, Inc. Computer implemented secret object key block cipher encryption and digital signature device and method
CN1523809A (en) * 2003-09-08 2004-08-25 赵忠华 Password variable identification verification technique
KR20100052789A (en) * 2008-11-11 2010-05-20 이응준 Web document creation system for auto change of plural passwords and method thereof
KR20130085528A (en) * 2011-12-15 2013-07-30 엘지전자 주식회사 Apparatus for unlocking mobile terminal and method thereof
CN104766002A (en) * 2015-03-04 2015-07-08 深圳市中兴移动通信有限公司 Method and device for unlocking
CN106096383A (en) * 2016-06-12 2016-11-09 捷开通讯(深圳)有限公司 Automatically mobile terminal and the method thereof of unlocking pin are changed
CN108268761A (en) * 2016-12-31 2018-07-10 中国移动通信集团北京有限公司 A kind of method of password authentication and device
CN107704736A (en) * 2017-09-28 2018-02-16 广东欧珀移动通信有限公司 Unlocking method and a device, computer equipment, computer-readable recording medium
CN108881594A (en) * 2018-04-27 2018-11-23 努比亚技术有限公司 Safety identification control method, flexible screen terminal and computer readable storage medium
CN109886686A (en) * 2019-02-28 2019-06-14 努比亚技术有限公司 A kind of safe payment method, equipment and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张荣娟等: "基于单片机的多功能电子防盗锁的设计", 《万方数据库》 *

Similar Documents

Publication Publication Date Title
CN107957839A (en) A kind of display control method and mobile terminal
WO2019144814A1 (en) Display screen control method and mobile terminal
CN108459797B (en) Control method of folding screen and mobile terminal
WO2019105227A1 (en) Application icon display method, terminal, and computer readable storage medium
CN107682634A (en) A kind of facial image acquisition methods and mobile terminal
CN107613131A (en) A kind of application program disturbance-free method and mobile terminal
CN107943551A (en) A kind of screen display method and mobile terminal
CN108427876A (en) A kind of fingerprint identification method and mobile terminal
CN108182019A (en) A kind of suspension control display processing method and mobile terminal
CN108459815B (en) Display control method and mobile terminal
CN109388304A (en) A kind of screenshotss method and terminal device
CN109151180B (en) Object identification method and mobile terminal
CN107977132A (en) A kind of method for information display and mobile terminal
CN107704182B (en) Code scanning method and mobile terminal
CN108469965A (en) A kind of setting method and mobile terminal of application program
CN108536411A (en) A kind of method for controlling mobile terminal and mobile terminal
CN109461117A (en) A kind of image processing method and mobile terminal
CN109078319B (en) Game interface display method and terminal
CN108196815A (en) A kind of adjusting method and mobile terminal of sound of conversing
CN108174081B (en) A kind of image pickup method and mobile terminal
CN107845057A (en) One kind is taken pictures method for previewing and mobile terminal
CN107707762A (en) A kind of method for operating application program and mobile terminal
CN108629171B (en) Unread message processing method and terminal
CN107809594B (en) A kind of image pickup method and mobile terminal
CN108227996A (en) A kind of display control method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination