CN117149044B - Fingerprint unlocking method and electronic equipment - Google Patents
Fingerprint unlocking method and electronic equipment Download PDFInfo
- Publication number
- CN117149044B CN117149044B CN202310285401.5A CN202310285401A CN117149044B CN 117149044 B CN117149044 B CN 117149044B CN 202310285401 A CN202310285401 A CN 202310285401A CN 117149044 B CN117149044 B CN 117149044B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- interface
- button
- terminal device
- terminal equipment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 105
- 238000012544 monitoring process Methods 0.000 claims abstract description 40
- 230000004044 response Effects 0.000 claims abstract description 16
- 230000015654 memory Effects 0.000 claims description 31
- 238000012795 verification Methods 0.000 claims description 23
- 238000004590 computer program Methods 0.000 claims description 17
- 238000004891 communication Methods 0.000 description 21
- 230000006870 function Effects 0.000 description 20
- 238000007726 management method Methods 0.000 description 20
- 238000012545 processing Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 16
- 230000003287 optical effect Effects 0.000 description 10
- 238000010295 mobile communication Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 230000000694 effects Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000003190 augmentative effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 3
- 229920001621 AMOLED Polymers 0.000 description 2
- 230000032683 aging Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 230000000149 penetrating effect Effects 0.000 description 2
- 239000002096 quantum dot Substances 0.000 description 2
- 238000009877 rendering Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000001356 surgical procedure Methods 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000013528 artificial neural network Methods 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 210000000988 bone and bone Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000004927 fusion Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 230000005855 radiation Effects 0.000 description 1
- 238000003786 synthesis reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0486—Drag-and-drop
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/13—Sensors therefor
- G06V40/1306—Sensors therefor non-optical, e.g. ultrasonic or capacitive sensing
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Multimedia (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the application provides a fingerprint unlocking method and electronic equipment. The method comprises the following steps: at a first moment, a first application is operated on a foreground of the terminal equipment, and the terminal equipment is in an unlocking state; the fingerprint state of the terminal equipment is a first fingerprint state; at a second moment, the first application pulls up the screen locking application, the terminal equipment displays a first interface, and the zone bit of the first button is a first value; at a third moment, the terminal equipment receives triggering operation aiming at a first button, and the zone bit of the first button is a second value; at a fourth time, in response to a trigger operation for the first button, the terminal device displays a second interface, and the terminal device sets the fingerprint state to a second fingerprint state. Therefore, when the zone bit of the first button is the second value, the terminal equipment is in a state of monitoring the fingerprint, and the terminal equipment can identify the fingerprint of the user, so that the scene that the terminal equipment cannot unlock the fingerprint is reduced, and the use experience of the user is improved.
Description
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a fingerprint unlocking method and an electronic device.
Background
In order to improve the security of information in the terminal device, the terminal device is provided with a screen locking function, and accordingly, the terminal device can support a plurality of unlocking modes, for example, the unlocking modes can include: password unlocking, fingerprint unlocking, face unlocking, gesture unlocking, bluetooth equipment unlocking and the like.
Along with the development of fingerprint identification technology, fingerprint unlocking becomes a common unlocking mode for users. The fingerprint unlocking mode can comprise the following steps: optical fingerprint recognition, capacitive fingerprint recognition, ultrasonic fingerprint recognition, and the like. Because the ultrasonic penetrating power is stronger, and screen aging has less influence on ultrasonic fingerprint identification, ultrasonic fingerprint unlocking is also widely applied to unlocking screens of terminal equipment.
However, in some scenes, when the terminal device is unlocked by using the ultrasonic fingerprint, the terminal device can generate a scene that the screen cannot be unlocked, so that the use experience of a user is affected.
Disclosure of Invention
The embodiment of the application provides a fingerprint unlocking method and electronic equipment, which are applied to the technical field of terminals, can provide an ultrasonic fingerprint unlocking method for users, reduce the scene of failure in unlocking a screen of the terminal equipment, and improve the use experience of the users.
In a first aspect, an embodiment of the present application provides a fingerprint unlocking method, applied to a terminal device, where the terminal device includes an ultrasonic fingerprint unlocking module, the method includes: at a first moment, a first application is operated on a foreground of the terminal equipment, and the terminal equipment is in an unlocking state; the fingerprint state of the terminal equipment is a first fingerprint state; the first fingerprint state is used for indicating that the terminal equipment is in a state of not monitoring fingerprints; at a second moment, the first application pulls up the screen locking application, the terminal equipment displays a first interface, the first interface comprises a password input interface provided by the screen locking application and a first button, and a flag bit of the first button is a first value; the second moment is later than the first moment; at a third moment, the terminal equipment receives triggering operation aiming at a first button, and the zone bit of the first button is a second value; the second value is different from the first value; the third moment is later than the second moment; at a fourth moment, responding to the triggering operation of the first button, displaying a second interface by the terminal equipment, wherein the second interface comprises a fingerprint acquisition area identifier, the distance between the fingerprint acquisition area identifier and the ultrasonic fingerprint unlocking module is smaller than a first threshold value, and setting the fingerprint state to be a second fingerprint state by the terminal equipment; the second fingerprint state is used for indicating that the terminal equipment is in a state of monitoring fingerprints, and the fourth moment is later than the third moment. In this way, the terminal device may perform a listening fingerprint procedure when the flag bit of the first button is the first value, and the terminal device may unlock the screen using the fingerprint.
The first interface may correspond to a password input interface, for example, the first interface may be an interface shown as e in fig. 4, and the first button may be a first button 405 of the interface shown as e in fig. 4. The second interface may be a fingerprint verification interface, for example, the second interface may be the interface shown as f in fig. 4.
In one possible implementation, the method further includes: at a fifth moment, the terminal equipment restores the zone bit of the first button to a first value; the fifth moment is later than the fourth moment. Therefore, when the terminal equipment receives the triggering operation for the first button next time, the terminal equipment can update the zone bit of the first button to the second value, so that the accuracy of the fingerprint unlocking method is improved.
In one possible implementation, before the terminal device sets the fingerprint state to the second fingerprint state, the method includes: the screen locking application judges whether fingerprint unlocking parameters of the terminal equipment meet preset conditions or not; the preset condition is related to the position of the terminal equipment supporting fingerprint unlocking, the interface displayed by the terminal equipment, the distance between the first button and the ultrasonic fingerprint unlocking module and/or the value of the marker bit of the first button; the terminal device sets the fingerprint state to a second fingerprint state, including: and if the fingerprint unlocking parameter meets the preset condition, the screen locking application sets the fingerprint state to be a second fingerprint state. Therefore, the terminal equipment can update the fingerprint state on the password input interface based on the preset condition, and the terminal equipment is in a state of monitoring the fingerprint, so that fingerprint unlocking service is provided for the user, and the use experience of the user is improved.
In one possible implementation, the fingerprint unlocking parameter meeting the preset condition includes: the position of the terminal equipment supporting fingerprint unlocking is in the screen; the interface displayed by the terminal equipment is a password input interface; the distance between the first button and the ultrasonic fingerprint unlocking module is larger than or equal to a first threshold value; and/or the flag bit of the first button is a second value. In this way, the terminal device can execute the fingerprint monitoring process when the preset condition is met, so that the terminal device can unlock the screen through fingerprints.
In one possible implementation, the first application comprises a camera application, the method comprising: at a first moment, a camera application is operated at a foreground of the terminal equipment, the terminal equipment displays a third interface, and the third interface comprises a second button which is used for starting a gallery application; and at a second moment, the terminal equipment receives triggering operation aiming at a second button, and when the camera application pulls up the screen locking application, the ultrasonic fingerprint unlocking module identifies fingerprints in the fingerprint acquisition area of the second interface and the verification is successful, the terminal equipment starts the gallery application. In this way, a fingerprint unlocking scene is provided for a user, when the terminal equipment pulls up the screen locking application based on the camera application, the terminal equipment can successfully initiate monitoring of the fingerprint, and the terminal equipment can use the gallery application after the fingerprint unlocking screen; therefore, application scenes of fingerprint unlocking of the terminal equipment are enriched, and the use experience of a user is improved.
Wherein the third interface may correspond to the interface shown as d in fig. 4, and the second button may be gallery application icon 404 in the interface shown as d in fig. 4.
In one possible implementation, the method further includes: at a sixth moment, the terminal equipment displays a fourth interface, wherein the fourth interface comprises a fingerprint acquisition area identifier; the fingerprint state is a second fingerprint state; at a seventh moment, the terminal equipment receives the first operation in the fourth interface, and responds to the first operation, the terminal equipment displays a fifth interface; the fifth interface comprises a shortcut operation panel and a third button; the third button is used for starting the second application; the seventh time is later than the sixth time; at the eighth moment, the foreground of the terminal equipment runs a second application, and the terminal equipment is in an unlocking state; the fingerprint state is a first fingerprint state; the eighth time is later than the seventh time; at the ninth moment, the second application pulls up the screen locking application, and the terminal equipment displays a sixth interface; the sixth interface comprises a password input interface and a first button, and the flag bit of the first button is a first value; the ninth moment is later than the eighth moment; at a tenth moment, the terminal equipment receives triggering operation aiming at the first button, and the zone bit of the first button is a second value; the tenth time is later than the ninth time; at an eleventh moment, responding to the triggering operation of the first button, displaying a seventh interface by the terminal equipment, wherein the seventh interface comprises a fingerprint acquisition area identifier, and setting the fingerprint state to be a second fingerprint state by the terminal equipment; the eleventh time is later than the tenth time. In this way, the terminal device may perform a listening fingerprint procedure when the flag bit of the first button is the first value, and the terminal device may unlock the screen using the fingerprint.
The fourth interface may correspond to a lock screen interface, for example, the fourth interface may be the interface shown in a in fig. 5; the fifth interface may be the interface shown in b in fig. 5; the third button may be a sound recording application icon 502 in the interface shown in b in fig. 5. The sixth interface may correspond to a password input interface, for example, the sixth interface may be the interface shown as e in fig. 5. The seventh interface may correspond to a fingerprint verification interface, for example, the seventh interface may be the interface shown as f in fig. 5.
In one possible implementation, the second application includes a sound recording application, and the method includes: at the eighth moment, the foreground of the terminal equipment runs the recording application, and the terminal equipment displays an eighth interface; the eighth interface comprises a fourth button for stopping recording; at a ninth moment, the terminal equipment receives triggering operation aiming at the fourth button, and the recording application pulls up the screen locking application; when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the seventh interface and the verification is successful, the terminal equipment displays the stored sound recording file. Thus, a fingerprint unlocking scene is provided for the user, when the terminal equipment pulls up the screen locking application based on the recording application, the terminal equipment can successfully initiate monitoring of the fingerprint, and the terminal equipment can check the recording file after the fingerprint unlocks the screen; therefore, application scenes of fingerprint unlocking of the terminal equipment are enriched, and the use experience of a user is improved.
The eighth interface may be the interface shown by d in fig. 5, and the fourth button may be the stop record button 507 in the interface shown by d in fig. 5.
In one possible implementation, the method further includes: at the twelfth moment, the terminal equipment displays a ninth interface, wherein the ninth interface comprises a fingerprint acquisition area identifier; the fingerprint state is a second fingerprint state; at thirteenth moment, the terminal device receives the second operation, and responds to the second operation, the terminal device displays a tenth interface; the tenth interface comprises a password input interface and a first button, and the zone bit of the first button is a first value; the thirteenth moment is later than the twelfth moment; at a fourteenth moment, the terminal equipment receives triggering operation aiming at the first button in a tenth interface, wherein the zone bit of the first button is a second value; responding to the triggering operation for the first button, and displaying an eleventh interface by the terminal equipment; the eleventh interface comprises a fingerprint acquisition area identifier and a fifth button, and the fifth button is used for canceling fingerprint unlocking; the fourteenth time is later than the thirteenth time; at the fifteenth moment, the terminal equipment receives a triggering operation for the fifth button, responds to the triggering operation for the fifth button, and displays a twelfth interface, wherein the fingerprint state is a third fingerprint state; the twelfth interface comprises a password input interface and a first button, and the zone bit of the first button is a first value; the third fingerprint state is used for indicating that the terminal equipment is in a state of not monitoring fingerprints, and the fifteenth moment is later than the fourteenth moment; at a sixteenth moment, the terminal device receives a triggering operation for the first button in the twelfth interface, wherein the flag bit of the first button is a second value; the sixteenth time is later than the fifteenth time; at a seventeenth moment, in response to a triggering operation for the first button, the terminal device displays a thirteenth interface, wherein the thirteenth interface comprises a fingerprint acquisition area identifier, and the terminal device sets a fingerprint state to a second fingerprint state; the seventeenth moment is later than the sixteenth moment. And when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the thirteenth interface and the verification is successful, the terminal equipment displays the fourteenth interface. Therefore, a fingerprint unlocking scene is provided for the user, after the terminal equipment cancels fingerprint unlocking, the terminal equipment can execute the fingerprint monitoring process again, and the subsequent user can use the terminal equipment after the fingerprint unlocking screen; therefore, application scenes of fingerprint unlocking of the terminal equipment are enriched, and the use experience of a user is improved.
The ninth interface may correspond to a lock screen interface, for example, the ninth interface may be the interface shown in a in fig. 6; the tenth interface may correspond to a password input interface, for example, the tenth interface may be the interface shown in b in fig. 6; the eleventh interface may correspond to a fingerprint authentication interface, for example, the eleventh interface may be the interface shown in c in fig. 6, and the fifth button may be the cancel unlock button 603 in the interface shown in c in fig. 6; the twelfth interface may correspond to the password input interface, for example, the twelfth interface may be the interface shown as d in fig. 6. The thirteenth interface may correspond to a fingerprint verification interface, for example, the thirteenth interface may be the interface shown as e in fig. 6. The fourteenth interface may be the interface shown as f in fig. 6.
In a second aspect, an embodiment of the present application provides a terminal device, which may also be referred to as a terminal (terminal), a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), or the like. The terminal device may be a mobile phone, a smart television, a wearable device, a tablet (Pad), a computer with wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving (self-driving), a wireless terminal in teleoperation (remote medical surgery), a wireless terminal in smart grid (SMART GRID), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (SMART CITY), a wireless terminal in smart home (smart home), or the like.
The terminal device includes: comprising the following steps: a processor and a memory; the memory stores computer-executable instructions; the processor executes computer-executable instructions stored in the memory to cause the terminal device to perform a method as in the first aspect.
In a third aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program. The computer program, when executed by a processor, implements a method as in the first aspect.
In a fourth aspect, embodiments of the present application provide a computer program product comprising a computer program which, when run, causes a computer to perform the method as in the first aspect.
In a fifth aspect, an embodiment of the application provides a chip comprising a processor for invoking a computer program in memory to perform a method as in the first aspect.
It should be understood that the second to fifth aspects of the present application correspond to the technical solutions of the first aspect of the present application, and the advantages obtained by each aspect and the corresponding possible embodiments are similar, and are not repeated.
Drawings
Fig. 1 is a schematic structural diagram of a terminal device 100 according to an embodiment of the present application;
Fig. 2 is a schematic software structure of a terminal device 100 according to an embodiment of the present application;
fig. 3 is an interface schematic diagram of a fingerprint unlocking method according to an embodiment of the present application;
Fig. 4 is an interface schematic diagram of a fingerprint unlocking method according to an embodiment of the present application;
Fig. 5 is an interface schematic diagram of a fingerprint unlocking method according to an embodiment of the present application;
Fig. 6 is an interface schematic diagram of a fingerprint unlocking method according to an embodiment of the present application;
fig. 7 is a schematic flow chart of a fingerprint unlocking method according to an embodiment of the present application;
fig. 8 is a schematic flow chart of a fingerprint unlocking method according to an embodiment of the present application;
fig. 9 is a schematic flow chart of a fingerprint unlocking method according to an embodiment of the present application;
Fig. 10 is a schematic flow chart of a fingerprint unlocking method according to an embodiment of the present application;
fig. 11 is a schematic flow chart of a fingerprint unlocking method according to an embodiment of the present application;
fig. 12 is a schematic flow chart of a fingerprint unlocking method according to an embodiment of the present application;
Fig. 13 is a schematic structural diagram of a fingerprint unlocking device according to an embodiment of the present application.
Detailed Description
For purposes of clarity in describing the embodiments of the present application, the words "exemplary" or "such as" are used herein to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "for example" should not be construed as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
In the embodiments of the present application, "at least one" means one or more, and "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a alone, a and B together, and B alone, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b, or c may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or plural.
It should be noted that "at … …" in the embodiment of the present application may be an instant when a certain situation occurs, or may be a period of time after a certain situation occurs, which is not particularly limited in the embodiment of the present application. In addition, the display interface provided by the embodiment of the application is only used as an example, and the display interface can also comprise more or less contents.
Along with the development of fingerprint identification technology, fingerprint unlocking becomes a common unlocking mode for users. The fingerprint unlocking mode can comprise the following steps: optical fingerprint recognition, capacitive fingerprint recognition, ultrasonic fingerprint recognition, and the like. Because the ultrasonic penetrating power is stronger, and screen aging has less influence on ultrasonic fingerprint identification, ultrasonic fingerprint unlocking is also widely applied to unlocking screens of terminal equipment.
In a possible implementation, when the terminal device is unlocked by using the ultrasonic fingerprint, the terminal device may possibly fail to unlock the screen, so that the use experience of the user is affected.
This is because the terminal device may be stopped from listening to the fingerprint or cancel listening to the fingerprint while in a state of listening to the fingerprint. When the terminal equipment reinitiates the fingerprint monitoring process, the terminal equipment can judge whether the fingerprint unlocking parameter of the terminal equipment meets the condition of updating the fingerprint state. In a possible implementation, the fingerprint unlocking parameter may not meet the condition of updating the fingerprint state due to the fact that the distance between the fingerprint unlocking icon and the ultrasonic fingerprint unlocking module is far when the terminal device initiates monitoring on the password input interface. The terminal equipment does not successfully initiate the fingerprint monitoring flow and can not update the fingerprint state into the state of monitoring the fingerprint. The terminal device is not able to recognize the user's fingerprint nor verify the fingerprint and unlock the screen.
In view of the above, the embodiment of the application provides a fingerprint unlocking method, which is implemented by adding a flag bit of a first button; when the first button is clicked, the terminal device sets the flag bit of the first button to a second value; when the flag bit of the first button is set to the second value, the terminal equipment can execute the fingerprint monitoring process. In this way, the terminal device can successfully update the fingerprint state to the state of monitoring the fingerprint, so that the terminal device can recognize and verify the user fingerprint later, and the unlocking screen is realized.
In order to better understand the embodiments of the present application, the following describes a structure of an electronic device that may perform the fingerprint unlocking method in the embodiments of the present application:
Fig. 1 shows a schematic structure of a terminal device 100. The terminal device 100 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, keys 190, a motor 191, an indicator 192, a camera 193, a display 194, and a subscriber identity module (subscriberidentification module, SIM) card interface 195, etc.
The sensor module 180 may include, among other things, a pressure sensor, a gyroscope sensor, a barometric sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity light sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, etc.
It is to be understood that the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the terminal device 100. In other embodiments of the application, terminal device 100 may include more or less components than illustrated, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processingunit, GPU), an image signal processor (IMAGE SIGNAL processor, ISP), a controller, a video codec, a digital signal processor (DIGITAL SIGNAL processor, DSP), a baseband processor, and/or a neural-Network Processor (NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
It should be understood that the interfacing relationship between the modules illustrated in the embodiment of the present application is illustrated schematically, and does not constitute a structural limitation of the terminal device 100. In other embodiments of the present application, the terminal device 100 may also use different interfacing manners, or a combination of multiple interfacing manners in the foregoing embodiments.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the terminal device 100. The charging management module 140 may also supply power to the terminal device through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 to power the processor 110, the internal memory 121, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other embodiments, the power management module 141 may also be provided in the processor 110. In other embodiments, the power management module 141 and the charge management module 140 may be disposed in the same device.
The wireless communication function of the terminal device 100 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. The antennas in the terminal device 100 may be used to cover single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied to the terminal device 100. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wirelesslocal area networks, WLAN) (e.g., wireless fidelity (WIRELESS FIDELITY, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation SATELLITE SYSTEM, GNSS), frequency modulation (frequency modulation, FM), near field communication (NEAR FIELD communication, NFC), infrared (IR), etc., applied on the terminal device 100. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
The terminal device 100 implements display functions through a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a Liquid Crystal Display (LCD) screen (liquid CRYSTAL DISPLAY), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-34 diode, a flexible light-emitting diode (FLED), miniled, microLed, micro-oLed, a quantum dot light-emitting diode (quantum dot lightemitting diodes, QLED), or the like. In some embodiments, the terminal device 100 may include 1 or N display screens 194, N being a positive integer greater than 1.
The terminal device 100 may implement a photographing function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, an application processor, and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to realize expansion of the memory capability of the terminal device 100. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer-executable program code that includes instructions. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an application program (such as a sound playing function, an image playing function, etc.) required for at least one function of the operating system, etc. The storage data area may store data (such as audio data, phonebook, etc.) created during use of the terminal device 100, and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like. The processor 110 performs various functional applications of the terminal device 100 and data processing by executing instructions stored in the internal memory 121 and/or instructions stored in a memory provided in the processor.
The terminal device 100 may implement audio functions through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
Illustratively, the terminal device 100 may also include one or more of a key 190, a motor 191, an indicator 192, a SIM card interface 195 (eSIM card), and the like.
The software system of the terminal device 100 may employ a layered architecture, an event driven architecture, a micro-core architecture, a micro-service architecture, or a cloud architecture, etc. In the embodiment of the application, taking an Android system with a layered architecture as an example, a software structure of the terminal device 100 is illustrated.
Fig. 2 is a software configuration block diagram of the electronic device 100 according to the embodiment of the present application.
The layered architecture divides the software into several layers, each with distinct roles and branches. The layers communicate with each other through a software interface. In some embodiments, the Android system may include: an application layer (applications), an application framework layer (application framework), a hardware abstraction layer (hardware abstract layer, HAL), and a kernel layer (kernel), which may become a driver layer.
The application layer may include a series of application packages.
The application packages may include applications for cameras, calendars, maps, phones, settings, mailboxes, videos, music, system user interfaces (System used interface, systemUI), and the like.
Wherein SystemUI includes a lock screen application (Keyguard), keyguard for handling lock screen interface related traffic, such as: unlocking screens (fingerprint unlock, pattern unlock, PIN unlock, etc.), lock screen notification display, quick start of camera application, quick dial, display date/time, etc.
The application framework layer provides an application programming interface (application programming interface, API) and programming framework for the application of the application layer. The application framework layer includes a number of predefined functions.
As shown in FIG. 2, the application framework layer may include a window manager, a content provider, a resource manager, a view system, a notification manager, an activity manager, and the like.
The window manager is used for managing window programs. The window manager may obtain the display screen size, determine if there is a status bar, lock the screen, touch the screen, drag the screen, intercept the screen, etc.
The content provider is used to store and retrieve data and make such data accessible to applications. The data may include video, images, audio, calls made and received, browsing history and bookmarks, phonebooks, etc.
The view system includes visual controls, such as controls to display text, controls to display pictures, and the like. The view system may be used to build applications. The display interface may be composed of one or more views. For example, a display interface including a text message notification icon may include a view displaying text and a view displaying a picture.
The resource manager provides various resources for the application program, such as localization strings, icons, pictures, layout files, video files, and the like.
The notification manager allows the application to display notification information in a status bar, can be used to communicate notification type messages, can automatically disappear after a short dwell, and does not require user interaction. Such as notification manager is used to inform that the download is complete, message alerts, etc. The notification manager may also be a notification in the form of a chart or scroll bar text that appears on the system top status bar, such as a notification of a background running application, or a notification that appears on the screen in the form of a dialog window. For example, a text message is prompted in a status bar, a prompt tone is emitted, the terminal equipment vibrates, and an indicator light blinks.
The activity manager is used for managing activity-related transactions such as start, state, life cycle of an application. Wherein activity is an application component that can provide an interface for a user to interact with a terminal device through the interface, thereby completing a task.
Android runtime include core libraries and virtual machines. Android runtime is responsible for scheduling and management of the android system.
The core library consists of two parts: one part is a function which needs to be called by java language, and the other part is a core library of android.
The application layer and the application framework layer run in a virtual machine. The virtual machine executes java files of the application program layer and the application program framework layer as binary files. The virtual machine is used for executing the functions of object life cycle management, stack management, thread management, security and exception management, garbage collection and the like.
The system library may include a plurality of functional modules. For example: surface manager (surface manager), media Libraries (Media Libraries), three-dimensional graphics processing Libraries (e.g., openGL ES), 2D graphics engines (e.g., SGL), etc.
The surface manager is used to manage the display subsystem and provides a fusion of 2D and 3D layers for multiple applications.
Media libraries support a variety of commonly used audio, video format playback and recording, still image files, and the like. The media library may support a variety of audio and video encoding formats, such as MPEG4, h.264, MP3, AAC, AMR, JPG, PNG, etc.
The three-dimensional graphic processing library is used for realizing three-dimensional graphic drawing, image rendering, synthesis, layer processing and the like.
The 2D graphics engine is a drawing engine for 2D drawing.
The kernel layer is a layer between hardware and software. The kernel layer is used for driving the hardware so that the hardware works. The kernel layer may contain camera device drivers, display drivers, audio drivers, etc.
In the embodiment of the present application, the terminal device may also be referred to as a terminal (terminal), a User Equipment (UE), a Mobile Station (MS), a Mobile Terminal (MT), and so on. The terminal device may be a mobile phone, a smart television, a wearable device, a tablet (Pad), a computer with wireless transceiving function, a Virtual Reality (VR) terminal device, an augmented reality (augmented reality, AR) terminal device, a wireless terminal in industrial control (industrial control), a wireless terminal in unmanned driving (self-driving), a wireless terminal in teleoperation (remote medical surgery), a wireless terminal in smart grid (SMART GRID), a wireless terminal in transportation security (transportation safety), a wireless terminal in smart city (SMART CITY), a wireless terminal in smart home (smart home), or the like.
A scenario of fingerprint unlocking in a possible implementation is described in connection with fig. 3. Fig. 3 shows an interface schematic of optical fingerprint unlocking and an interface schematic of ultrasonic fingerprint unlocking. As shown in fig. 3:
Illustratively, the interface shown in a in fig. 3 to the interface shown in c in fig. 3 illustrate a scenario in which an optical fingerprint is unlocked. In the interface shown in a of fig. 3, the terminal device displays a lock screen interface, which includes a fingerprint acquisition area identifier 301. In one possible implementation, when the terminal device identifies the user fingerprint in the fingerprint acquisition area, the terminal device acquires the user fingerprint information and compares the user fingerprint information with the pre-entered fingerprint, and after verification is successful, the terminal device can display the interface shown as c in fig. 3. The interface shown in c in fig. 3 may be an unlocked desktop.
In another possible implementation, in the interface shown in a in fig. 3, when the terminal device receives a slide-up operation, the terminal device may enter the interface shown in b in fig. 3. The interface shown in b in fig. 3 displays a fingerprint acquisition area identifier 302, a password input area, a keyboard, and the like. In the interface shown in b in fig. 3, the user may choose to unlock the screen using both password unlocking and fingerprint unlocking. When the terminal device receives a trigger operation for the fingerprint acquisition area identifier 302, the terminal device may also display the interface shown in c in fig. 3.
Illustratively, the interface shown as d in fig. 3 to the interface shown as g in fig. 3 illustrate one scenario of ultrasonic fingerprint unlocking.
In the interface shown in d of fig. 3, the terminal device displays a lock screen interface, which includes the fingerprint acquisition area identifier 303. In a possible implementation, when the terminal device receives a trigger operation for the fingerprint acquisition area identifier 303, the terminal device displays the interface shown in g in fig. 3. The interface shown in g in fig. 3 is the unlocked desktop.
In another possible implementation, in the interface shown in d in fig. 3, when the terminal device receives a slide-up operation, the terminal device may enter a password input interface, such as the interface shown in e in fig. 3. The interface shown in e in fig. 3 displays a first button 304, a password input area, a keyboard, etc., wherein the fingerprint acquisition area identifier 303 and the first button 304 may have the same style, and the icon specification of the first button 304 is smaller than the identifier specification of the fingerprint acquisition area identifier 303. In the interface shown in e in fig. 3, the user may choose to unlock the screen using password unlocking. When the terminal device receives a trigger operation for the first button 304, the terminal device displays a fingerprint authentication interface, such as the interface shown as f in fig. 3. The interface shown by f in fig. 3 displays a fingerprint collection area identifier 305, a prompt text 306 and a cancel unlock button 307, where the identifier specification of the fingerprint collection area identifier 305 is consistent with the identifier specification of the fingerprint collection area identifier 303 and is greater than the icon specification of the first button 304. When the terminal device receives a trigger operation for the fingerprint acquisition area identification 305, the terminal device may unlock the screen and display the interface shown at g in fig. 3.
It will be appreciated that the terminal device may use an ultrasonic fingerprint unlocking module to collect the user's fingerprint, and in some scenarios, the ultrasonic fingerprint unlocking module may be disposed in the middle and lower part of the terminal device, for example, the ultrasonic fingerprint unlocking module may correspond to the display position of the fingerprint collection area identifier 303 in the interface shown in d in fig. 3. Thus, when a finger of a user is placed in the area displayed by the fingerprint collection area identifier 303, the ultrasonic fingerprint unlocking module below the area can collect fingerprint information of the user.
In the interface e shown in fig. 3, if the terminal device can support both password unlocking and fingerprint unlocking, the keyboard and the fingerprint acquisition area identifier in the interface e shown in fig. 3 will overlap, which affects the use of the terminal device. Therefore, in order to improve the aesthetic property and reduce false triggering after the two functional icons are overlapped, the terminal device may be provided with the first button. The interface shown as e in fig. 3 shows a first button 304 which the terminal device can use to invoke the interface shown as f in fig. 3.
The fingerprint acquisition area identification 305 in the interface shown as f in fig. 3 coincides with the location of the fingerprint acquisition area identification 303 in the interface shown as d in fig. 3. The user can place the finger in the region that fingerprint collection region sign 305 shows, and when terminal equipment received the trigger operation to fingerprint collection region sign 305, terminal equipment can use ultrasonic wave fingerprint unlocking module to gather user's fingerprint information and accomplish the fingerprint unblock.
It should be noted that, in general, the terminal device may support optical fingerprint unlocking or ultrasonic fingerprint unlocking; the terminal device may display the interface shown as a in fig. 3 or the interface shown as d in fig. 3. The embodiment of the application compares the optical fingerprint unlocking process with the ultrasonic fingerprint unlocking process, and aims to illustrate that when the terminal equipment uses the ultrasonic fingerprint for unlocking, an interface f shown in fig. 3 possibly appears, and the meaning of simultaneously using the optical fingerprint unlocking and the ultrasonic fingerprint unlocking in the terminal equipment is not provided.
A scenario in which the terminal device uses the ultrasonic fingerprint unlock screen in the embodiment of the present application will be described with reference to fig. 4 to 6. Fig. 4 is an interface schematic diagram of a fingerprint unlocking method according to an embodiment of the present application, where the interface schematic diagram is shown in fig. 4:
The interface a shown in fig. 4 can be displayed after the terminal equipment is on the screen, and the interface a shown in fig. 4 comprises a fingerprint acquisition area identifier 401 and a camera application icon 402; wherein, fingerprint acquisition area identifier 401 can be used to characterize the area where the ultrasonic fingerprint unlocking module can identify the fingerprint. The terminal device may pull up the camera application based on the camera application icon 402. Illustratively, when the terminal device receives a press operation (interface shown as a in fig. 4) and an upward drag operation (interface shown as b in fig. 4) for the camera application icon 402, the terminal device may launch the camera application and display the interface shown as c in fig. 4.
The interface shown in c in fig. 4 includes a photographing button, gallery application icon 403, and the like. In one possible implementation, the terminal device may view the photograph. When the terminal device receives a trigger operation for the gallery application icon 403, the terminal device enters the interface shown as d in fig. 4. In the interface shown as d in fig. 4, the terminal device may display gallery application icon 404.
It will be appreciated that the gallery application icon 404 may be used by the terminal device to launch the gallery application, but when the terminal device is in an unlocked state, the terminal device needs to be unlocked to be able to continue accessing the gallery application. For example, when the terminal device receives a trigger operation for gallery application icon 404, the terminal device may display the interface shown as e in fig. 4. The interface shown by e in fig. 4 may be a password input interface, and the terminal device displays a first button 405; the first button is used for indicating the terminal equipment to enter the fingerprint verification interface.
In the interface shown as e in fig. 4, the user can enter a password or unlock it by a fingerprint. For example, when the terminal device receives a trigger operation for the first button 405, the terminal device may display an interface shown by f in fig. 4. In the interface shown at f in fig. 4, the terminal device displays a fingerprint acquisition area identifier 406. At this point, the user may place a finger in the fingerprint acquisition area. The terminal equipment can collect user fingerprints, compares the collected fingerprints with pre-recorded fingerprint information, and can unlock the screen after verification is passed. For example, when the terminal device receives the triggering operation for the fingerprint acquisition area identifier 406, the terminal device displays an interface shown by g in fig. 4, where the interface shown by g in fig. 4 may be an interface when the terminal device runs a gallery application in the foreground.
In the above scenario, the terminal device may pull up the lock screen application based on the camera application, and then the terminal device may unlock the screen using the fingerprint to display the picture in the gallery application. Another scenario applicable to the fingerprint unlocking method provided by the embodiment of the present application is as follows with reference to fig. 5. Fig. 5 shows an interface schematic diagram of a fingerprint unlocking screen according to an embodiment of the present application, as shown in fig. 5:
The interface a shown in fig. 5 can be displayed after the terminal device is on the screen. In some embodiments, the terminal device in the locked state may provide a function of quickly starting the application, and illustratively, when the terminal device receives a trigger operation of sliding up from the bottom of the screen, the terminal device may display the interface shown in b in fig. 5. The interface shown in b in fig. 5 shows a shortcut operation panel 501, and the shortcut operation panel 501 may include a sound recording application icon 502, a calculator icon 503, a flashlight icon 504, a clock icon 505, and the like. The terminal device may customize the application in the shortcut operation panel 501, which is not limited in this embodiment of the present application.
Taking the recording application in the shortcut operation panel 501 as an example, when the terminal device receives a trigger operation for the recording application icon 502, the terminal device may start the recording application and display the interface shown in c in fig. 5. The interface shown in c in fig. 5 includes a record button 506, and when the terminal device receives a trigger operation for the record button 506, the terminal device starts recording audio, and the audio recording interface is shown as interface d in fig. 5. In the interface shown in d in fig. 5, the terminal device may terminate recording using the stop recording button 507, for example, when the terminal device receives a trigger operation for the stop recording button 507, the terminal device stops recording and saves the already recorded audio.
It can be appreciated that the user can view the recorded audio after finishing recording the audio, but when the terminal device is in an unlocked state, the terminal device needs to unlock the screen first to view the audio file. For example, when the terminal device receives a trigger operation for the stop record button 507, the terminal device displays an interface shown as e in fig. 5, and the user can unlock the terminal device using password unlocking or fingerprint unlocking. Taking fingerprint unlocking as an example, when the terminal device receives a trigger operation for the first button 508, the terminal device enters the interface shown by f in fig. 5. In the interface shown at f in fig. 5, the terminal device displays a fingerprint acquisition area identifier 509.
At this point, the user may place a finger in the fingerprint acquisition area. The terminal equipment can collect user fingerprints, compares the collected fingerprints with pre-recorded fingerprint information, and can unlock the screen after verification is passed. For example, when the terminal device receives a trigger operation for the fingerprint acquisition area identifier 509, the terminal device displays an interface shown by g in fig. 5, where the interface shown by g in fig. 5 may display a recorded audio file.
In the above scenario, the terminal device may pull up the recording application based on the shortcut operation panel, and when the terminal device finishes recording, the recording application may pull up the screen locking application, and the terminal device may unlock the screen in the screen locking application by using the user fingerprint to display the recording file in the recording application. Another scenario applicable to the fingerprint unlocking method provided by the embodiment of the present application is as follows with reference to fig. 6. Fig. 6 shows an interface schematic diagram of a fingerprint unlocking screen according to an embodiment of the present application, as shown in fig. 6:
After the terminal device is on, a screen locking interface can be displayed, such as an interface shown as a in fig. 6. When the terminal device receives the slide-up operation, the terminal device may display a password input interface, such as the interface shown as b in fig. 6. The interface shown in b in fig. 6 shows a first button 601, and when the terminal device receives a trigger operation for the first button 601, the terminal device may enter a fingerprint authentication interface, such as the interface shown in c in fig. 6. In the interface shown in c in fig. 6, the terminal device is displayed with a fingerprint acquisition area identification 602 and a cancel unlock button 603. At this time, the user may not wish to unlock the screen or click by mistake to cancel the unlocking, for example: when the terminal device receives a trigger operation for canceling the unlock button 603, the terminal device returns to the password input interface, as indicated by d in fig. 6. When the user wants to unlock using the fingerprint, the user may click on the first button 604 in the interface shown in d in fig. 6, and in response to a trigger operation for the first button 604, the terminal device may reenter the fingerprint authentication interface, such as the interface shown in e in fig. 6.
In the interface shown as e in fig. 6, the terminal device displays a fingerprint acquisition area identifier 605. At this point, the user may place a finger in the fingerprint acquisition area. The terminal equipment can collect user fingerprints, compares the collected fingerprints with pre-recorded fingerprint information, and can unlock the screen after verification is passed. For example, when the terminal device receives a trigger operation for the fingerprint acquisition area identifier 605, the terminal device displays an interface f shown in fig. 6, where the interface f shown in fig. 6 may be a desktop.
It should be noted that, in the embodiment of the present application, taking the case that the foreground of the terminal device does not run other application programs as an example, after the screen is unlocked, the terminal device displays the interface f shown in fig. 6; when the application program, such as a social application, is running in the foreground of the terminal device, the chat interface can be displayed by the terminal device after the terminal device unlocks the screen. The embodiment of the application does not limit the interface shown by f in fig. 6.
It can be understood that, the above embodiments are described in connection with fig. 4 to fig. 6 for a scenario where the fingerprint unlocking method provided by the embodiment of the present application is applicable, but the interface is not limited to the embodiment of the present application.
The fingerprint unlocking method provided by the embodiment of the application is described in detail below with reference to the accompanying drawings. It should be noted that "at … …" in the embodiment of the present application may be an instant when a certain situation occurs, or may be a period of time after a certain situation occurs, which is not particularly limited in the embodiment of the present application.
The fingerprint unlocking method provided by the embodiment of the application is described with reference to fig. 7. Fig. 7 shows a flowchart of a fingerprint unlocking method according to an embodiment of the present application. As shown in fig. 7:
in an exemplary embodiment, at S701, at a first moment, a first application is running in a foreground of a terminal device, the terminal device is in an unlocked state, and a fingerprint state of the terminal device is a first fingerprint state.
The first application may be an application program installed in the terminal device, the first application being different from the lock screen application. The first application may comprise a camera application. The terminal device is in an unlocked state, which can be understood as: the terminal equipment is preset with fingerprint unlocking; at a first moment, the terminal device does not unlock the screen, and the terminal device only uses part of the functions of the first application.
The fingerprint state of the terminal device may be a fingerprint running state (FINGERPRINT RUNNING STATE), and the fingerprint state may be set as a first fingerprint state, a second fingerprint state, and a third fingerprint state; the first fingerprint state can be used for indicating that the terminal equipment is in a state of not monitoring fingerprints, the second fingerprint state is used for indicating that the terminal equipment is in a state of monitoring fingerprints, and the third fingerprint state is used for indicating that the terminal equipment is in a state of not monitoring fingerprints. For example, the first fingerprint state may be fingerprint state stop (fingerprint_state_stop), the second fingerprint state may be fingerprint state run (fingerprint_state_running), and the third fingerprint state may be fingerprint state cancel (fingerprint_state_cancel).
It will be appreciated that, as shown in the scenario of fig. 4, the first application may be a camera application, and the terminal device foreground running with the first application may correspond to the scenario shown in c in fig. 4 or the scenario shown in d in fig. 4.
S702, at a second moment, the first application pulls up the screen locking application, and the terminal equipment displays a first interface; the first interface comprises a password input interface provided by the screen locking application and a first button, and a flag bit of the first button is a first value; the second time is later than the first time.
The screen locking application may be Keyguard; the first interface may be a password input interface, and the first interface may correspond to the interface shown as e in fig. 4; the password entry interface may be bouncer interface. The first interface includes a first button therein, which may correspond to the first button 405 in the interface shown as e in fig. 4.
The terminal equipment is pre-added with a zone bit of a first button, wherein the zone bit of the first button can be a first value or a second value; the first value is used for indicating that the terminal equipment does not execute the fingerprint monitoring process; the second value is used to indicate that the terminal device executes the listening fingerprint procedure. In one possible implementation, the first value may be False and the second value may be True; in another possible implementation, the first value may be 0 and the second value may be 1. The embodiment of the application does not limit the values of the first value and the second value, and the first value and the second value can also be other values which can be used for indicating whether the terminal equipment executes the monitoring fingerprint flow.
The terminal device may pull up the lock screen application using the first application. After the terminal equipment starts the screen locking application, the terminal equipment displays a password input interface, and the flag bit of the first button is a first value.
It can be understood that, at the second moment, the terminal device is in an unlocked state and the terminal device does not execute the fingerprint monitoring process, at this moment, the terminal device can input a password unlocking screen in the password input interface, but the terminal device cannot pass through the fingerprint unlocking screen in the password input interface.
S703, at a third moment, the terminal equipment receives a triggering operation for a first button, wherein a flag bit of the first button is a second value; the second value is different from the first value; the third time is later than the second time.
The trigger operation for the first button may be a trigger operation of clicking the first button 405 in the interface shown as e in fig. 4.
The terminal device may set the flag bit of the first button to the second value when receiving a trigger operation for the first button. The second value is used to indicate that the terminal device executes the listening fingerprint procedure. In one possible implementation, the flag bit of the first button may be clicking the first button (CLICK SMALL FINGERPRINT), and CLICK SMALL FINGERPRINT is assigned True when the terminal device receives a trigger operation for the first button.
S704, at a fourth moment, responding to the triggering operation of the first button, displaying a second interface by the terminal equipment, wherein the second interface comprises a fingerprint acquisition area identifier, the distance between the fingerprint acquisition area identifier and the ultrasonic fingerprint unlocking module is smaller than a first threshold value, and setting the fingerprint state to be a second fingerprint state by the terminal equipment; the second fingerprint state is used for indicating that the terminal equipment is in a state of monitoring fingerprints, and the fourth moment is later than the third moment.
The second interface may correspond to the interface shown as f in fig. 4. The fingerprint acquisition region identification may correspond to the fingerprint acquisition region identification 406 in the interface shown as f in fig. 4. The first threshold may be a preset value, and the first threshold is used for determining whether the fingerprint acquisition area identifier is within a range in which the ultrasonic fingerprint unlocking module can ultrasonically identify the fingerprint.
The terminal device sets the fingerprint state to the second fingerprint state, which can be understood as: the terminal device executes a process of starting to monitor fingerprints (START LISTENING For Fingerprint). The terminal equipment is in a state of monitoring fingerprints, and can monitor whether the terminal equipment receives the pressing operation of a user or not within the coverage range of the fingerprint acquisition area identifier. And subsequently, when the user places the finger in the coverage area of the fingerprint collecting area identifier, the ultrasonic fingerprint unlocking module can identify the user fingerprint in the fingerprint collecting area identifier and verify the user fingerprint. If the verification is passed, the terminal equipment is in an unlocking state; if the verification is not passed, the terminal device still keeps the unlocked state, and the terminal device can prompt the user to perform fingerprint verification again.
According to the fingerprint unlocking method provided by the embodiment of the application, the foreground of the terminal equipment is operated with the first application at the first moment, and the terminal equipment is in an unlocking state; the fingerprint state of the terminal equipment is a first fingerprint state; at a second moment, the first application pulls up the screen locking application, the terminal equipment displays a first interface, the first interface comprises a password input interface provided by the screen locking application and a first button, and a flag bit of the first button is a first value; at a third moment, the terminal equipment receives triggering operation aiming at a first button, and the zone bit of the first button is a second value; the second value is different from the first value; at a fourth moment, responding to the triggering operation of the first button, displaying a second interface by the terminal equipment, wherein the second interface comprises a fingerprint acquisition area identifier, the distance between the fingerprint acquisition area identifier and the ultrasonic fingerprint unlocking module is smaller than a first threshold value, and setting the fingerprint state to be a second fingerprint state by the terminal equipment. In this way, the terminal device may perform a listening fingerprint procedure when the flag bit of the first button is the first value, and the terminal device may unlock the screen using the fingerprint.
S705, at a fifth moment, the terminal equipment restores the zone bit of the first button to a first value; the fifth moment is later than the fourth moment.
In a possible implementation manner, the terminal device may restore to the first value when the fingerprint state is not the second fingerprint state; for example: CLICK SMALL FINGERPRINT is assigned to False.
In another possible implementation manner, the terminal device may determine whether to execute the listening procedure based on a preset condition, and the terminal device may set the flag bit of the first button to the first value after the determination is completed. For example: CLICK SMALL FINGERPRINT is assigned to False. The preset conditions and the determination process will be described in detail later in the embodiments of the present application, and will not be described here in detail.
According to the fingerprint unlocking method provided by the embodiment of the application, the terminal equipment restores the zone bit of the first button to the first value at the fifth moment. Therefore, when the terminal equipment receives the triggering operation for the first button next time, the terminal equipment can update the zone bit of the first button to the second value, so that the accuracy of the fingerprint unlocking method is improved.
Alternatively, the following describes steps S701-S704 with reference to the scenario shown in fig. 4, with the first application being a camera application.
The terminal device displays a screen lock interface, which includes a start button of the camera application. For example, the terminal device displays an interface shown in a in fig. 4, which includes a camera application icon 402 in fig. 4.
When the terminal device receives a trigger operation of a start button for the camera application, the terminal device starts the camera application. For example, the terminal device receives a trigger operation for the camera application icon 402, and in response to the trigger operation, the terminal device starts the camera application.
At a first moment, a camera application is operated at a foreground of the terminal equipment, the terminal equipment displays a third interface, and the third interface comprises a second button which is used for starting a gallery application; the fingerprint state of the terminal device is a first fingerprint state. For example, the third interface is the interface shown as d in fig. 4, where the interface shown as d in fig. 4 includes the gallery application icon 404, and the fingerprint state is fingerprint_state_stop.
At a second moment, the terminal equipment receives triggering operation aiming at a second button, and the camera application pulls up the screen locking application; the terminal device displays a first interface, and the flag bit of the first button is a first value. For example, the terminal device receives a trigger operation for the gallery application icon 404 in the interface shown in d in fig. 4, and the terminal device starts the lock screen application and enters the interface shown in e in fig. 4. The interface shown as e in fig. 4 includes a first button with a flag bit False.
At a third moment, the terminal device receives a triggering operation for the first button, and the flag bit of the first button is a second value. For example, in the interface shown in e of fig. 4, the terminal device receives a trigger operation for the first button 405, and the flag bit of the first button is True.
At a fourth time, in response to the triggering operation of the first button, the terminal device displays a second interface, and the terminal device sets the fingerprint state to a second fingerprint state. For example, in response to a trigger operation for the first button 405 in the interface shown as e in fig. 4, the terminal device enters the interface shown as f in fig. 4. The interface shown at f in fig. 4 includes a fingerprint acquisition region identifier 406, with a fingerprint state of fingerprint_state_running.
And when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the second interface and the verification is successful, the terminal equipment starts the gallery application. For example, in the interface shown by f in fig. 4, when the terminal device identifies a fingerprint in the fingerprint acquisition area and verifies the fingerprint successfully, the terminal device enters the interface shown by g in fig. 4, and the interface shown by g in fig. 4 may be an interface with a gallery application running in the foreground.
In order to facilitate understanding of the fingerprint unlocking method provided by the embodiment of the present application, the fingerprint unlocking method in the embodiment of the present application is described in detail below with reference to fig. 4, and fig. 8 shows a flow chart of the fingerprint unlocking method provided by the embodiment of the present application. As shown in fig. 8:
Exemplary, S801, the terminal device is on screen.
The terminal equipment is preset with fingerprint unlocking. When the terminal device is on the screen, the terminal device may receive a screen-on message, which may be onScreenTurningOn messages.
S802, displaying a screen locking interface by the terminal equipment, wherein the fingerprint state of the terminal equipment is a second fingerprint state.
The lock screen interface may be a notification unlock (notification keyguard) interface. The screen locking interface may correspond to the interface a shown in fig. 4, where the fingerprint state of the terminal device is a second fingerprint state, and may be: FINGERPRINT RUNNING STATE is finger print_state_running.
The terminal equipment can pull up the screen locking application after the screen is lightened. The terminal equipment displays a screen locking interface of the screen locking application, the screen locking interface comprises a fingerprint acquisition area identifier, the terminal equipment is in a state of monitoring fingerprints, and at the moment, the terminal equipment can unlock the screen based on the fingerprint acquisition area identifier.
In one possible implementation, the terminal device may launch the first application when the terminal device is in an unlocked state. For example, the terminal device may launch a first application based on the camera application icon 402 at an interface as shown in a in fig. 4.
S803, when the terminal equipment starts the first application, the terminal equipment updates the fingerprint state into a first fingerprint state.
It can be understood that the terminal device starts the first application, the first application is running in the foreground of the terminal device, the fingerprint state of the terminal device is the first fingerprint state, and the terminal device stops monitoring the fingerprint. For example, when the terminal device runs the first application, the terminal device sets FINGERPRINT RUNNING STATE to finger print_state_stop. At this time, the terminal equipment can not monitor the fingerprint, also can not use ultrasonic fingerprint unblock module to gather the fingerprint.
S804, the terminal equipment displays the first interface.
The first interface may correspond to the interface shown as e in fig. 4, and a first button may be included in the first interface. In a possible implementation, when the foreground of the terminal device runs the first application, the terminal device may display an interface as shown in c in fig. 4 or an interface as shown in d in fig. 4. When the terminal device receives a triggering operation for the gallery application icon 404 in the interface shown in d in fig. 4, the terminal device may pull up the lock screen application using the first application, and the terminal device displays the first interface with the flag bit of the first button as the first value.
S805, when the terminal device receives a trigger operation for the first button, the terminal device sets a flag bit of the first button to a second value.
When the user clicks the first button, the terminal device sets the flag bit of the first button to a second value in response to the clicking operation of the user. For example, the first button may have a flag bit of CLICKSMALLFINGERPRINT (TRUE) as the second value.
It should be noted that, when the terminal device receives the triggering operation for the first button, the terminal device may initiate monitoring the fingerprint, and the terminal device may update the fingerprint state to the second fingerprint state when the fingerprint unlocking parameter satisfies the preset condition. The preset condition may be related to a position where the terminal device supports fingerprint unlocking, an interface displayed by the terminal device, a distance between the first button and the ultrasonic fingerprint unlocking module, and/or a value of a flag bit of the first button.
And when the fingerprint unlocking parameters of the terminal equipment meet the preset conditions, the screen locking application sets the fingerprint state to be a second fingerprint state. Specifically, as shown in steps S806 to S809:
s806, the screen locking application judges whether the position of the terminal equipment supporting fingerprint unlocking is in the screen.
The location where the terminal device supports fingerprint unlocking may include on-screen, sideways, back, etc. In one possible implementation, a lock screen utility (Keyguard Utils) of a lock screen application may obtain a location where a terminal device supports fingerprint unlocking. The lock screen application determines whether the location where the terminal device supports fingerprint unlocking is in-screen (under dispiay, UD, also referred to as under-screen).
When the location where the terminal device supports fingerprint unlocking is in the screen, the terminal device may perform step S807.
S807, the screen locking application judges whether the interface displayed by the terminal equipment is a password input interface.
A screen-lock update listener (Keyguard Update Monitor) of the screen-lock application may determine an interface of the screen-lock application displayed by the terminal device. The lock screen application may include a lock screen interface, a password entry interface, and a fingerprint verification interface. The first interface is a password input interface.
In one possible implementation, the mbouncer value of the password entry interface is a third value and the mbouncer value of the lock screen interface is a fourth value. The lock screen application may determine the displayed interface based on mbouncer values. For example, the third value may be True and the fourth value may be False; the third value may also be 1 and the fourth value may be 0. The embodiment of the application does not limit the values of the third value and the fourth value.
When the interface displayed by the terminal device is a password input interface (for example, mbouncer values of the interface displayed by the terminal device are True), the terminal device may determine whether the position of the first button in the first interface is within a range in which the fingerprint can be identified by the ultrasonic fingerprint unlocking module, as shown in step S808.
S808, the screen locking application judges whether the distance between the first button and the ultrasonic fingerprint unlocking module is smaller than a first threshold value.
The first threshold is used for determining whether the fingerprint acquisition area is within the range of the ultrasonic fingerprint unlocking module capable of identifying fingerprints in an ultrasonic mode, for example, the first threshold can be 0.38, and the value of the first threshold is not limited in the embodiment of the application.
It will be appreciated that the first button is similar to the fingerprint capture area identification, but that the terminal device will not capture a user fingerprint at the first button when a user finger is placed on the first button. The finger view assistant (FINGER VIEW HELPER) of the screen locking application can acquire the distance between the first button and the ultrasonic fingerprint unlocking module and determine that the distance between the first button and the ultrasonic fingerprint unlocking module is greater than or equal to a first threshold.
The distance between the first button and the ultrasonic fingerprint unlocking module is greater than or equal to a first threshold, and the terminal device may execute step S809.
S809, the screen locking application judges whether the flag bit of the first button is a second value.
In one possible implementation, the flag bit of the first button is a second value, e.g., CLICK SMALL FINGERPRINT is True. The terminal device may set the fingerprint state to a second fingerprint state as shown in step S810.
S810, the terminal equipment sets the fingerprint state to be a second fingerprint state.
When the Fingerprint unlock parameter of the terminal device satisfies the preset condition, the terminal device may perform a procedure of starting to monitor the Fingerprint (START LISTENING For Fingerprint), set the Fingerprint state to the second Fingerprint state, for example, the terminal device may set the Fingerprint state to fingerprint_state_running through SET FINGERPRINT running state ().
In step S805, the terminal device receives a trigger operation for the first button. After the screen locking application performs the determining process of steps S806-S809, the terminal device may display the second interface of the screen locking application in response to the triggering operation for the first button. For example, the terminal device may display the interface shown by f in fig. 4, and the terminal device is in a state of listening to the fingerprint.
Alternatively, in a possible implementation manner, after the terminal device completes step S809, the terminal device may restore the flag bit of the first button to the first value.
The embodiment of the application takes the case that the preset condition is related to the position of the terminal equipment supporting fingerprint unlocking, the interface displayed by the terminal equipment, the distance between the first button and the ultrasonic fingerprint unlocking module and the value of the marker bit of the first button as an example, and describes the fingerprint unlocking method in the embodiment of the application. Embodiments of the present application may also use one or more of the conditions described above to determine whether to perform a snoop fingerprint procedure, as embodiments of the present application are not limited in this respect.
The above embodiment describes the fingerprint unlocking method in the embodiment of the present application by taking the scenario shown in fig. 4 as an example. The fingerprint unlocking method provided by the embodiment of the application is described below with a scene shown in fig. 5.
The step S901 is that, at a sixth moment, the terminal device displays a fourth interface, where the fourth interface includes a fingerprint collection area identifier; the fingerprint state is a second fingerprint state.
The fourth interface may be a lock screen interface, such as the interface shown as a in fig. 5. The interface shown as a in fig. 5 includes a fingerprint acquisition area identification. The fingerprint state of the terminal device is fingerprint_state_running.
When the terminal equipment displays the lock screen interface, fingerprint monitoring is initiated, and the fingerprint state is updated to be the second fingerprint state. The second fingerprint state may be understood as: the terminal device may identify a user fingerprint of the fingerprint acquisition area in the fourth interface.
S902, at a seventh moment, the terminal equipment receives a first operation in the fourth interface, and responds to the first operation, the terminal equipment displays a fifth interface; the fifth interface comprises a shortcut operation panel and a third button; the third button is used for starting the second application; the seventh moment is later than the sixth moment.
The first operation may correspond to a trigger operation sliding up from the bottom of the screen in the interface shown in a in fig. 5. The fifth interface may be the interface shown in b in fig. 5, and the third button may be the recording application icon 502; the interface shown in b in fig. 5 includes a shortcut operation panel 501 and a recording application icon 502.
S903, at the eighth moment, a second application is run on the foreground of the terminal equipment, and the terminal equipment is in an unlocked state; the fingerprint state is a first fingerprint state; the eighth time is later than the seventh time.
The second application may be a sound recording application. After the terminal equipment starts the recording application, the foreground of the terminal equipment runs the recording application. The terminal device is in an unlocked state, which can be understood as: the terminal equipment is preset with fingerprint unlocking; at the eighth moment, the terminal device does not unlock the screen, and the terminal device only uses part of the functions of the second application.
The fingerprint state is fingerprint_state_stop, and the terminal device is in a state of not monitoring the fingerprint.
S904, at a ninth moment, the second application pulls up the screen locking application, and the terminal equipment displays a sixth interface; the sixth interface comprises a password input interface and a first button, and the flag bit of the first button is a first value; the ninth moment is later than the eighth moment.
The sixth interface may be a password input interface, and the sixth interface may correspond to the interface shown as e in fig. 5; the sixth interface may be bouncer interfaces. The sixth interface includes a first button therein, which may correspond to the first button 508 in the interface shown as e in fig. 5. The flag bit of the first button is False.
The terminal device may pull up the lock screen application using the second application. After the terminal equipment starts the screen locking application, the terminal equipment displays a password input interface, and the flag bit of the first button is a first value.
It can be understood that, at the ninth moment, the terminal device is in an unlocked state and the terminal device does not execute the fingerprint monitoring process, at this moment, the terminal device can input a password unlocking screen in the password input interface, but the terminal device cannot pass through the fingerprint unlocking screen in the password input interface.
S905, at a tenth moment, the terminal equipment receives a triggering operation for a first button, wherein a flag bit of the first button is a second value; the tenth moment is later than the ninth moment.
The trigger operation for the first button may be a trigger operation of clicking the first button 508 in the interface shown as e in fig. 5.
The terminal device may set the flag bit of the first button to the second value when receiving a trigger operation for the first button. The second value is used to indicate that the terminal device executes the listening fingerprint procedure. In one possible implementation, the flag bit of the first button may be clicking the first button (CLICK SMALL FINGERPRINT), and CLICK SMALL FINGERPRINT is assigned True when the terminal device receives a trigger operation for the first button.
S906, at an eleventh moment, responding to the triggering operation of the first button, displaying a seventh interface by the terminal equipment, wherein the seventh interface comprises a fingerprint acquisition area identifier, and setting the fingerprint state to be a second fingerprint state by the terminal equipment; the eleventh time is later than the tenth time.
The seventh interface may correspond to the interface shown as f in fig. 5. The fingerprint acquisition region identification may correspond to the fingerprint acquisition region identification 509 in the interface shown as f in fig. 5. The terminal device updates the fingerprint state from fingerprint_state_stop to fingerprint_state_running.
According to the fingerprint unlocking method provided by the embodiment of the application, the terminal equipment displays the fourth interface at the sixth moment, and the fingerprint state is the second fingerprint state; at a seventh moment, the terminal equipment receives a first operation in the fourth interface, responds to the first operation, and displays a fifth interface, wherein the fifth interface comprises a shortcut operation panel and a third button; at the eighth moment, the foreground of the terminal equipment runs a second application, and the terminal equipment is in an unlocking state; the fingerprint state is a first fingerprint state; at the ninth moment, the second application pulls up the screen locking application, and the terminal equipment displays a sixth interface; the sixth interface comprises a password input interface and a first button, and the flag bit of the first button is a first value; at a tenth moment, the terminal equipment receives triggering operation aiming at the first button, and the zone bit of the first button is a second value; at an eleventh moment, in response to the triggering operation for the first button, the terminal device displays a seventh interface, wherein the seventh interface comprises a fingerprint acquisition area identifier, and the terminal device sets the fingerprint state to a second fingerprint state. Therefore, a scene of unlocking the screen after the application program is started based on the shortcut operation panel can be provided for the user, and the use experience of the user is improved.
Optionally, steps S901 to S906 are further described below using the second application as an example of the recording application. The fingerprint unlocking method provided by the embodiment of the application further comprises the following steps:
Illustratively, at the eighth moment, the terminal device foreground runs the recording application, and the terminal device displays an eighth interface; the eighth interface includes a fourth button for stopping recording. For example, the eighth interface is an interface shown as d in fig. 5, the fourth button is a stop recording button 507, the stop recording button 507 is included in the interface shown as d in fig. 5, and the fingerprint state is fingerprint_state_stop.
At the ninth moment, the terminal device receives the triggering operation for the fourth button, and the recording application pulls up the screen locking application. For example: the terminal device receives a trigger operation for stopping the recording button 507 in the interface shown in d of fig. 5, and the terminal device starts the screen locking application and enters the interface shown in e of fig. 5. The interface shown as e in fig. 5 includes a first button with a flag bit False.
When the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the seventh interface and the verification is successful, the terminal equipment displays the stored sound recording file. For example, in the interface shown by f in fig. 5, when the terminal device identifies a fingerprint in the fingerprint acquisition area and the verification is successful, the terminal device enters the interface shown by g in fig. 5, and the interface shown by g in fig. 5 may be an interface on which a sound recording file is displayed.
In order to facilitate understanding of the fingerprint unlocking method provided by the embodiment of the present application, the fingerprint unlocking method in the embodiment of the present application is described in detail below with reference to fig. 10 in a scene shown in fig. 5, and fig. 10 shows a flow chart of the fingerprint unlocking method provided by the embodiment of the present application. As shown in fig. 10:
Exemplary, S1001, the terminal device is on screen.
S1002, the terminal device displays a fourth interface, and the fingerprint state of the terminal device is the second fingerprint state.
The fourth interface may be a lock screen interface, and the fourth interface may correspond to the interface a shown in fig. 5, where the fingerprint state of the terminal device is a second fingerprint state, and may be: FINGERPRINT RUNNING STATE is finger print_state_running.
The terminal equipment can pull up the screen locking application after the screen is lightened. The terminal equipment displays a screen locking interface of the screen locking application, the screen locking interface comprises a fingerprint acquisition area identifier, the terminal equipment is in a state of monitoring fingerprints, and at the moment, the terminal equipment can unlock the screen based on the fingerprint acquisition area identifier.
In one possible implementation, the terminal device may start the second application when the terminal device is in the unlocked state. For example, the terminal device may display an interface b shown in fig. 5, including the shortcut operation panel 501 in the interface b shown in fig. 5, when the terminal device receives an operation of sliding up from the bottom of the screen as shown in the interface a in fig. 5, and the terminal device may start the second application based on the recording application icon 502 in the shortcut operation panel 501.
S1003, when the terminal equipment starts the second application, the terminal equipment updates the fingerprint state into the first fingerprint state.
It can be understood that after the terminal device starts the second application, the terminal device foreground runs the second application, the fingerprint state of the terminal device is the first fingerprint state, and the terminal device can stop monitoring the fingerprint. For example, the terminal device sets FINGERPRINT RUNNING STATE to finger print_state_stop when running the second application. At this time, the terminal equipment can not monitor the fingerprint, also can not use ultrasonic fingerprint unblock module to gather the fingerprint.
S1004, the terminal equipment displays a sixth interface.
The sixth interface may be a password input interface, and the sixth interface may correspond to the interface shown as e in fig. 5, and the sixth interface may include the first button therein. In a possible implementation, when the terminal device foreground runs with the second application, the terminal device may display an interface as shown by c in fig. 5 or an interface as shown by d in fig. 5. When the terminal device receives a trigger operation for stopping the recording button 507 in the interface shown in d of fig. 5, the terminal device may pull up the lock screen application using the second application, and the terminal device displays a sixth interface, with the flag bit of the first button being a first value.
S1005, when the terminal device receives the trigger operation for the first button, the terminal device sets the flag bit of the first button to the second value.
And when the fingerprint unlocking parameters of the terminal equipment meet the preset conditions, the screen locking application sets the fingerprint state to be a second fingerprint state. Specifically, as shown in steps S1006 to S1009:
s1006, the screen locking application judges whether the position of the terminal equipment supporting fingerprint unlocking is in the screen.
When the location where the terminal device supports fingerprint unlocking is in the screen, the terminal device may perform step S1007.
S1007, the screen locking application judges whether the interface displayed by the terminal equipment is a password input interface.
When the interface displayed by the terminal device is a password input interface (for example, mbouncer values of the interface displayed by the terminal device are True), the terminal device may determine whether the position of the first button in the sixth interface is within a range in which the fingerprint can be identified by the ultrasonic fingerprint unlocking module, as shown in step S1008.
S1008, the screen locking application judges whether the distance between the first button and the ultrasonic fingerprint unlocking module is smaller than a first threshold value.
The distance between the first button and the ultrasonic fingerprint unlocking module is greater than or equal to the first threshold, and the terminal device may execute step S1009.
S1009, the lock screen application determines whether the flag bit of the first button is a second value.
In one possible implementation, the flag bit of the first button is a second value, e.g., CLICK SMALL FINGERPRINT is True. The terminal device may set the fingerprint state to a second fingerprint state as shown in step S1010.
S1010, the terminal equipment sets the fingerprint state to be a second fingerprint state.
In step S1005, the terminal device receives a trigger operation for the first button. After the screen locking application performs the determination process of steps S806 to S809, the terminal device may display a seventh interface of the screen locking application in response to the triggering operation for the first button. For example, the terminal device may display the interface shown by f in fig. 5, and the terminal device is in a state of listening to the fingerprint.
Alternatively, in a possible implementation manner, after the terminal device completes step S1009, the terminal device may restore the flag bit of the first button to the first value.
The principles of steps S1001 to S1010 in the embodiment of the present application are similar to those of steps S801 to S810, and the embodiment of the present application will not be described in detail in steps S1001 to S1010.
The above embodiment takes the scenario shown in fig. 5 as an example to explain the fingerprint unlocking method in the embodiment of the present application. The fingerprint unlocking method provided by the embodiment of the application is described below with a scenario shown in fig. 6.
Exemplary, S1101, at the twelfth moment, the terminal device displays a ninth interface, where the ninth interface includes a fingerprint acquisition area identifier; the fingerprint state is a second fingerprint state.
The ninth interface may be a lock screen interface, such as the interface shown as a in fig. 6. The interface shown as a in fig. 6 includes a fingerprint acquisition area identification. The fingerprint state of the terminal device is fingerprint_state_running.
When the terminal equipment displays the lock screen interface, fingerprint monitoring is initiated, and the fingerprint state is updated to be the second fingerprint state. The second fingerprint state may be understood as: the terminal device may identify a user fingerprint of the fingerprint acquisition area in the ninth interface.
S1102, at thirteenth moment, the terminal equipment receives a second operation, and responds to the second operation, and the terminal equipment displays a tenth interface; the tenth interface comprises a password input interface and a first button, and the zone bit of the first button is a first value; the thirteenth moment is later than the twelfth moment.
The second operation may correspond to a slide up operation in the interface shown as a in fig. 6. The tenth interface may be a password input interface, for example, the interface shown in b in fig. 6; the interface shown in b in fig. 6 includes a first button 601 with a flag bit False.
S1103, at a fourteenth moment, the terminal equipment receives trigger operation aiming at a first button in a tenth interface, wherein a flag bit of the first button is a second value; responding to the triggering operation for the first button, and displaying an eleventh interface by the terminal equipment; the eleventh interface comprises a fingerprint acquisition area identifier and a fifth button, and the fifth button is used for canceling fingerprint unlocking; the fourteenth moment is later than the thirteenth moment.
When the terminal equipment receives the triggering operation for the first button, the terminal equipment sets the zone bit of the first button to True. The eleventh interface may be a fingerprint authentication interface, such as the interface shown in c in fig. 6; the fifth button may be a cancel unlock button 603. The interface shown in c in fig. 6 includes a fingerprint acquisition area identification 602 and a cancel unlock button 603.
S1104, at the fifteenth moment, the terminal equipment receives a triggering operation for a fifth button, responds to the triggering operation for the fifth button, and displays a twelfth interface, wherein the fingerprint state is a third fingerprint state; the twelfth interface comprises a password input interface and a first button, and the zone bit of the first button is a first value; the third fingerprint state is used for indicating that the terminal equipment is in a state of not monitoring fingerprints, and the fifteenth moment is later than the fourteenth moment.
The twelfth interface may be a password entry interface, as shown by d in fig. 6. The fingerprint state is fingerprint_state_reporting.
Note that, at the twelfth to fourteenth moments, the fingerprint state of the terminal device is fingerprint_state_running. At the fifteenth timing, when the terminal device receives a trigger operation for canceling the unlock button 603, the terminal device switches the fingerprint state to fingerprint_state_cancel. At this time, the terminal device is in a state of not monitoring the fingerprint.
S1105, at a sixteenth moment, the terminal equipment receives a triggering operation for a first button in a twelfth interface, wherein a flag bit of the first button is a second value; the sixteenth moment is later than the fifteenth moment.
The trigger operation for the first button may correspond to a trigger operation of clicking the first button 508 in the interface shown as d in fig. 6.
The terminal device may set the flag bit of the first button to the second value when receiving a trigger operation for the first button. The second value is used to indicate that the terminal device executes the listening fingerprint procedure. In one possible implementation, the flag bit of the first button may be clicking the first button (CLICK SMALL FINGERPRINT), and CLICK SMALL FINGERPRINT is assigned True when the terminal device receives a trigger operation for the first button.
S1106, at a seventeenth moment, responding to the triggering operation of the first button, displaying a thirteenth interface by the terminal equipment, wherein the thirteenth interface comprises a fingerprint acquisition area identifier, and setting the fingerprint state to be a second fingerprint state by the terminal equipment; the seventeenth moment is later than the sixteenth moment.
The thirteenth interface may be a fingerprint verification interface, such as the interface shown as e in fig. 6; the thirteenth interface includes a fingerprint acquisition area identifier 605. The terminal device updates the fingerprint state from fingerprint_state_reporting to fingerprint_state_running. At this time, the terminal device is in a state of monitoring the fingerprint, and the terminal device can recognize the user fingerprint of the fingerprint acquisition area, as shown in step S1107.
S1107, when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the thirteenth interface and the verification is successful, the terminal equipment displays the fourteenth interface.
In the interface shown in e in fig. 6, when the terminal device identifies a fingerprint in the fingerprint acquisition area and the authentication is successful, the terminal device enters the interface shown in f in fig. 6, and the interface shown in f in fig. 6 may be a desktop.
In order to facilitate understanding of the fingerprint unlocking method provided by the embodiment of the present application, the fingerprint unlocking method in the embodiment of the present application is described in detail below with reference to fig. 12 in a scene shown in fig. 6, and fig. 12 shows a flow chart of the fingerprint unlocking method provided by the embodiment of the present application. As shown in fig. 12:
exemplary, S1201, terminal device bright screen.
S1202, the terminal device displays a ninth interface, and the fingerprint state of the terminal device is a second fingerprint state.
The ninth interface may be a lock screen interface, where the ninth interface may correspond to the interface shown in a in fig. 6, and the fingerprint state of the terminal device is a second fingerprint state and may be: FINGERPRINT RUNNING STATE is finger print_state_running.
In one possible implementation, when the terminal device is in an unlocked state, the terminal device may enter the password input interface. For example, the terminal device may receive a slide-up operation at a ninth interface (an interface shown as a in fig. 6), and the terminal device enters a tenth interface (an interface shown as b in fig. 6). When the terminal device receives a trigger operation for the first button in the tenth interface, the terminal device may display an eleventh interface (interface shown as c in fig. 6). The terminal device may enter the twelfth interface (interface shown as d in fig. 6) based on the cancel unlock button 603 in the eleventh interface.
And S1203, when the terminal device cancels fingerprint unlocking, the terminal device updates the fingerprint state into a third fingerprint state.
It is understood that when the terminal device receives a trigger operation for canceling the unlock button 603, the terminal device cancels the fingerprint unlock. The fingerprint state of the terminal device is a third fingerprint state, and the terminal device cancels the monitoring fingerprint. For example, when the terminal device cancels fingerprint unlocking, the terminal device sets FINGERPRINT RUNNING STATE to fingerprint_state_cancel. At this time, the terminal equipment can not monitor the fingerprint, also can not use ultrasonic fingerprint unblock module to gather the fingerprint.
S1204, the terminal equipment displays a twelfth interface.
The twelfth interface may correspond to the interface shown as d in fig. 6, and a first button may be included in the twelfth interface. In a possible implementation, the terminal device may display an interface as shown in c in fig. 6. When the terminal device receives a trigger operation for canceling the unlock button 603 in the interface shown in c in fig. 6, the terminal device cancels the fingerprint unlock, and the terminal device displays the twelfth interface, with the flag bit of the first button being a first value.
S1205, when the terminal device receives the trigger operation for the first button, the terminal device sets the flag bit of the first button to the second value.
When the user clicks the first button, the terminal device sets the flag bit of the first button to a second value in response to the clicking operation of the user. For example, the first button may have a flag bit of CLICKSMALLFINGERPRINT (TRUE) as the second value.
It should be noted that, when the terminal device receives the triggering operation for the first button, the terminal device may initiate monitoring the fingerprint, and the terminal device may update the fingerprint state to the second fingerprint state when the fingerprint unlocking parameter satisfies the preset condition. The preset condition may be related to a position where the terminal device supports fingerprint unlocking, an interface displayed by the terminal device, a distance between the first button and the ultrasonic fingerprint unlocking module, and/or a value of a flag bit of the first button.
And when the fingerprint unlocking parameters of the terminal equipment meet the preset conditions, the screen locking application sets the fingerprint state to be a second fingerprint state. Specifically, as shown in steps S1206 to S1209:
S1206, the screen locking application judges whether the position of the terminal equipment supporting fingerprint unlocking is in the screen.
When the location where the terminal device supports fingerprint unlocking is in the screen, the terminal device may perform step S1207.
S1207, the screen locking application judges whether the interface displayed by the terminal equipment is a password input interface.
When the interface displayed by the terminal device is a password input interface (for example, mbouncer of the interface displayed by the terminal device is True), the terminal device may determine whether the position of the first button in the twelfth interface is within the range where the fingerprint can be identified by the ultrasonic fingerprint unlocking module, as shown in step S1208.
S1208, the screen locking application judges whether the distance between the first button and the ultrasonic fingerprint unlocking module is smaller than a first threshold value.
The distance between the first button and the ultrasonic fingerprint unlocking module is greater than or equal to the first threshold, and the terminal device may execute step S1209.
S1209, the screen locking application judges whether the flag bit of the first button is a second value.
In one possible implementation, the flag bit of the first button is a second value, e.g., CLICK SMALL FINGERPRINT is True. The terminal device may set the fingerprint state to a second fingerprint state as shown in step S1210.
S1210, the terminal equipment sets the fingerprint state to be a second fingerprint state.
When the Fingerprint unlock parameter of the terminal device satisfies the preset condition, the terminal device may perform a procedure of starting to monitor the Fingerprint (START LISTENING For Fingerprint), and set the Fingerprint state to the second Fingerprint state, for example, the terminal device may set the Fingerprint state to the second Fingerprint state through SET FINGERPRINT running state ().
In step S1205, the terminal device receives a trigger operation for the first button. After the screen locking application performs the determination process of steps S1206 to S1209, the terminal device displays a thirteenth interface in response to the trigger operation for the first button. For example, the terminal device may display the interface shown as e in fig. 6, and the terminal device is in a state of listening to the fingerprint.
Alternatively, in a possible implementation manner, after the terminal device completes step S1209, the terminal device may restore the flag bit of the first button to the first value.
The fingerprint unlocking method of the embodiment of the application has been described above, and the device for executing the fingerprint unlocking method provided by the embodiment of the application is described below. It will be appreciated by those skilled in the art that the method and apparatus may be combined and referred to, and the related apparatus provided in the embodiments of the present application may perform the steps in the fingerprint unlocking method described above.
As shown in fig. 13, fig. 13 is a schematic structural diagram of a fingerprint unlocking device according to an embodiment of the present application, where the fingerprint unlocking device may be a terminal device in an embodiment of the present application, or may be a chip or a chip system in the terminal device.
As shown in fig. 13, the fingerprint unlocking apparatus 1300 may be used in a communication device, a circuit, a hardware component, or a chip, and includes: a display unit 1301, and a processing unit 1302. Wherein the display unit 1301 is used for supporting the step of displaying performed by the fingerprint unlocking device 1300; the processing unit 1302 is configured to support the fingerprint unlocking apparatus 1300 to perform the steps of information processing.
In a possible implementation, the fingerprint unlocking device 1300 may also include a communication unit 1303. Specifically, the communication unit is configured to support the fingerprint unlocking apparatus 1300 to perform the steps of transmitting data and receiving data. The communication unit 1303 may be an input or output interface, a pin, a circuit, or the like.
In a possible embodiment, the fingerprint unlocking device may further include: a storage unit 1304. The processing unit 1302 and the storage unit 1304 are connected by a line. The memory unit 1304 may include one or more memories, which may be one or more devices, circuits, or means for storing programs or data. The storage unit 1304 may exist independently and is connected to the processing unit 1302 provided in the fingerprint unlocking device through a communication line. The memory unit 1304 may also be integrated with the processing unit 1302.
The storage unit 1304 may store computer-executable instructions of a method in the terminal device to cause the processing unit 1302 to perform the method in the above-described embodiment. The storage unit 1304 may be a register, a cache, a RAM, or the like, and the storage unit 1304 may be integrated with the processing unit 1302. The memory unit 1304 may be a read-only memory (ROM) or other type of static storage device that may store static information and instructions, and the memory unit 1304 may be independent of the processing unit 1302.
The fingerprint unlocking method provided by the embodiment of the application can be applied to the electronic equipment with the communication function. The electronic device includes a terminal device, and specific device forms and the like of the terminal device may refer to the above related descriptions, which are not repeated herein.
The embodiment of the application provides a terminal device, which comprises: comprising the following steps: a processor and a memory; the memory stores computer-executable instructions; the processor executes the computer-executable instructions stored in the memory to cause the terminal device to perform the method described above.
The embodiment of the application provides a chip. The chip comprises a processor for invoking a computer program in a memory to perform the technical solutions in the above embodiments. The principle and technical effects of the present application are similar to those of the above-described related embodiments, and will not be described in detail herein.
The embodiment of the application also provides a computer readable storage medium. The computer-readable storage medium stores a computer program. The computer program realizes the above method when being executed by a processor. The methods described in the above embodiments may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. If implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer readable media can include computer storage media and communication media and can include any medium that can transfer a computer program from one place to another. The storage media may be any target media that is accessible by a computer.
In one possible implementation, the computer readable medium may include RAM, ROM, a compact disk-read only memory (CD-ROM) or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium targeted for carrying or storing the desired program code in the form of instructions or data structures and accessible by a computer. Also, any connection is properly termed a computer-readable medium. For example, if the software is transmitted from a website, server, or other remote source using a coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL), or wireless technologies such as infrared, radio, and microwave, then the coaxial cable, fiber optic cable, twisted pair, DSL, or wireless technologies such as infrared, radio, and microwave are included in the definition of medium. Disk and disc, as used herein, includes optical disc, laser disc, optical disc, digital versatile disc (DIGITAL VERSATILE DISC, DVD), floppy disk and blu-ray disc where disks usually reproduce data magnetically, while discs reproduce data optically with lasers. Combinations of the above should also be included within the scope of computer-readable media.
Embodiments of the present application provide a computer program product comprising a computer program which, when executed, causes a computer to perform the above-described method.
Embodiments of the present application are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing detailed description of the invention has been presented for purposes of illustration and description, and it should be understood that the foregoing is by way of illustration and description only, and is not intended to limit the scope of the invention.
Claims (11)
1. A fingerprint unlocking method, which is characterized by being applied to a terminal device, wherein the terminal device comprises an ultrasonic fingerprint unlocking module, and the method comprises the following steps:
At a first moment, a first application is run on the foreground of the terminal equipment, and the terminal equipment is in an unlocked state; the fingerprint state of the terminal equipment is a first fingerprint state; the first fingerprint state is used for indicating that the terminal equipment is in a state of not monitoring fingerprints;
At a second moment, the first application pulls up a screen locking application, the terminal equipment displays a first interface, the first interface comprises a password input interface provided by the screen locking application and a first button, and a zone bit of the first button is a first value; the second time is later than the first time;
At a third moment, the terminal equipment receives a triggering operation for the first button, wherein the zone bit of the first button is a second value; the second value is different from the first value; the third time is later than the second time;
At a fourth moment, responding to the triggering operation of the first button, the terminal equipment displays a second interface, wherein the second interface comprises a fingerprint acquisition area identifier, the distance between the fingerprint acquisition area identifier and the ultrasonic fingerprint unlocking module is smaller than a first threshold, and the terminal equipment sets the fingerprint state to be a second fingerprint state; the second fingerprint state is used for indicating that the terminal equipment is in a state of monitoring fingerprints, and the fourth time is later than the third time.
2. The method as recited in claim 1, further comprising:
At a fifth moment, the terminal equipment restores the zone bit of the first button to the first value; the fifth time is later than the fourth time.
3. A method according to claim 1 or 2, characterized in that before the terminal device sets the fingerprint state to a second fingerprint state, it comprises:
the screen locking application judges whether fingerprint unlocking parameters of the terminal equipment meet preset conditions or not; the preset condition is related to the position of the terminal equipment supporting fingerprint unlocking, the interface displayed by the terminal equipment, the distance between the first button and the ultrasonic fingerprint unlocking module and/or the value of the zone bit of the first button;
the terminal device sets the fingerprint state to a second fingerprint state, including:
And if the fingerprint unlocking parameter meets the preset condition, the screen locking application sets the fingerprint state to the second fingerprint state.
4. A method according to claim 3, wherein the fingerprint unlocking parameter satisfying the preset condition comprises: the position of the terminal equipment supporting fingerprint unlocking is in the screen; the interface displayed by the terminal equipment is the password input interface; the distance between the first button and the ultrasonic fingerprint unlocking module is greater than or equal to the first threshold value; and/or the flag bit of the first button is the second value.
5. The method of claim 1, wherein the first application comprises a camera application, the method comprising:
at the first moment, the camera application is operated at the foreground of the terminal equipment, the terminal equipment displays a third interface, and the third interface comprises a second button which is used for starting a gallery application;
at the second moment, the terminal equipment receives a triggering operation for the second button, and the camera application pulls up the screen locking application;
And when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the second interface and the verification is successful, the terminal equipment starts the gallery application.
6. The method according to claim 1, wherein the method further comprises:
At a sixth moment, the terminal equipment displays a fourth interface, wherein the fourth interface comprises the fingerprint acquisition area identifier; the fingerprint state is the second fingerprint state;
At a seventh moment, the terminal equipment receives a first operation in the fourth interface, and responds to the first operation, the terminal equipment displays a fifth interface; the fifth interface comprises a shortcut operation panel and a third button; the third button is used for starting a second application; the seventh time is later than the sixth time;
at the eighth moment, the second application is operated on the foreground of the terminal equipment, and the terminal equipment is in an unlocked state; the fingerprint state is the first fingerprint state; the eighth time is later than the seventh time;
at a ninth moment, the second application pulls up the screen locking application, and the terminal equipment displays a sixth interface; the sixth interface comprises the password input interface and the first button, and the flag bit of the first button is the first value; the ninth time is later than the eighth time;
At a tenth moment, the terminal equipment receives a triggering operation for the first button, wherein the zone bit of the first button is the second value; the tenth time is later than the ninth time;
At an eleventh moment, in response to a triggering operation for the first button, the terminal device displays a seventh interface, wherein the seventh interface comprises the fingerprint acquisition area identifier, and the terminal device sets the fingerprint state to the second fingerprint state; the eleventh time is later than the tenth time.
7. The method of claim 6, wherein the second application comprises a sound recording application, the method comprising:
at the eighth moment, the foreground of the terminal equipment runs the recording application, and the terminal equipment displays an eighth interface; the eighth interface comprises a fourth button, and the fourth button is used for stopping recording;
at the ninth moment, the terminal device receives a triggering operation for the fourth button, and the recording application pulls up the screen locking application;
and when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the seventh interface and the verification is successful, the terminal equipment displays the stored sound recording file.
8. The method according to claim 1, wherein the method further comprises:
at the twelfth moment, the terminal equipment displays a ninth interface, wherein the ninth interface comprises the fingerprint acquisition area identifier; the fingerprint state is the second fingerprint state;
At thirteenth moment, the terminal device receives a second operation, and in response to the second operation, the terminal device displays a tenth interface; the tenth interface comprises the password input interface and the first button, and the zone bit of the first button is the first value; the thirteenth time is later than the twelfth time;
At a fourteenth moment, the terminal device receives a trigger operation for the first button in the tenth interface, wherein a flag bit of the first button is the second value; in response to a trigger operation for the first button, the terminal device displays an eleventh interface; the eleventh interface comprises the fingerprint acquisition area identifier and a fifth button, and the fifth button is used for canceling fingerprint unlocking; the fourteenth time is later than the thirteenth time;
at a fifteenth moment, the terminal equipment receives a triggering operation for the fifth button, responds to the triggering operation for the fifth button, and displays a twelfth interface, wherein the fingerprint state is a third fingerprint state; the twelfth interface comprises the password input interface and the first button, and the zone bit of the first button is the first value; the third fingerprint state is used for indicating that the terminal equipment is in a state of not monitoring fingerprints, and the fifteenth moment is later than the fourteenth moment;
At a sixteenth moment, the terminal device receives a triggering operation for the first button in the twelfth interface, wherein a flag bit of the first button is the second value; the sixteenth time is later than the fifteenth time;
At a seventeenth moment, in response to a triggering operation for the first button, the terminal device displays a thirteenth interface, wherein the thirteenth interface comprises the fingerprint acquisition area identifier, and the terminal device sets the fingerprint state to the second fingerprint state; the seventeenth time is later than the sixteenth time;
And when the ultrasonic fingerprint unlocking module identifies the fingerprint in the fingerprint acquisition area of the thirteenth interface and the verification is successful, the terminal equipment displays the fourteenth interface.
9. A terminal device, comprising: a processor and a memory;
The memory stores computer-executable instructions;
The processor executing computer-executable instructions stored in the memory to cause the terminal device to perform the method of any one of claims 1-8.
10. A computer readable storage medium storing a computer program, which when executed by a processor implements the method according to any one of claims 1-8.
11. A computer program product comprising a computer program which, when run, causes a computer to perform the method of any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310285401.5A CN117149044B (en) | 2023-03-14 | 2023-03-14 | Fingerprint unlocking method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310285401.5A CN117149044B (en) | 2023-03-14 | 2023-03-14 | Fingerprint unlocking method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117149044A CN117149044A (en) | 2023-12-01 |
CN117149044B true CN117149044B (en) | 2024-04-30 |
Family
ID=88903285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310285401.5A Active CN117149044B (en) | 2023-03-14 | 2023-03-14 | Fingerprint unlocking method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117149044B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106886702A (en) * | 2017-03-08 | 2017-06-23 | 广东欧珀移动通信有限公司 | A kind of unlocked by fingerprint method and relevant device |
CN106886703A (en) * | 2017-03-08 | 2017-06-23 | 广东欧珀移动通信有限公司 | A kind of unlocked by fingerprint method and mobile terminal |
CN107450798A (en) * | 2017-07-21 | 2017-12-08 | 维沃移动通信有限公司 | A kind of startup method, device and mobile terminal of application program |
CN108595926A (en) * | 2018-03-30 | 2018-09-28 | 努比亚技术有限公司 | A kind of terminal, ultrasonic fingerprint unlocking method and computer readable storage medium |
CN109858225A (en) * | 2019-01-30 | 2019-06-07 | Oppo广东移动通信有限公司 | Unlocked by fingerprint method, apparatus, terminal and storage medium |
-
2023
- 2023-03-14 CN CN202310285401.5A patent/CN117149044B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106886702A (en) * | 2017-03-08 | 2017-06-23 | 广东欧珀移动通信有限公司 | A kind of unlocked by fingerprint method and relevant device |
CN106886703A (en) * | 2017-03-08 | 2017-06-23 | 广东欧珀移动通信有限公司 | A kind of unlocked by fingerprint method and mobile terminal |
CN107450798A (en) * | 2017-07-21 | 2017-12-08 | 维沃移动通信有限公司 | A kind of startup method, device and mobile terminal of application program |
CN108595926A (en) * | 2018-03-30 | 2018-09-28 | 努比亚技术有限公司 | A kind of terminal, ultrasonic fingerprint unlocking method and computer readable storage medium |
CN109858225A (en) * | 2019-01-30 | 2019-06-07 | Oppo广东移动通信有限公司 | Unlocked by fingerprint method, apparatus, terminal and storage medium |
Non-Patent Citations (1)
Title |
---|
基于指纹识别技术的车辆防盗系统设计;蔡正保;;新余学院学报;20160610(第03期);95-98 * |
Also Published As
Publication number | Publication date |
---|---|
CN117149044A (en) | 2023-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108475329B (en) | Electronic device and operation method thereof | |
CN107798223B (en) | Electronic device and operation method thereof | |
CN114371963B (en) | Fault detection method and electronic terminal | |
EP4224797A1 (en) | Method and apparatus for processing push message | |
CN114885328B (en) | Vehicle-computer connection method and device | |
KR20170014407A (en) | Apparatus and method for controlling a security of electronic device | |
CN117149044B (en) | Fingerprint unlocking method and electronic equipment | |
CN116095224B (en) | Notification display method and terminal device | |
CN116305093B (en) | Method for operating applet and electronic device | |
CN114691248B (en) | Method, device, equipment and readable storage medium for displaying virtual reality interface | |
CN117009005A (en) | Display method, automobile and electronic equipment | |
CN116708647B (en) | Notification message reply method and electronic equipment | |
CN116737036B (en) | Processing method of notification message and electronic equipment | |
CN116095223B (en) | Notification display method and terminal device | |
CN114501389B (en) | Mobile terminal, network sharing method and storage medium | |
CN117116258B (en) | Voice awakening method and electronic equipment | |
CN116662150B (en) | Application starting time-consuming detection method and related device | |
KR102559665B1 (en) | Operating method of game service using mapping | |
CN115242547B (en) | Remote assistance system and method and electronic equipment | |
US20160253072A1 (en) | Method and apparatus for displaying function execution screens | |
CN117435309A (en) | Task migration method, electronic equipment and system | |
CN117667864A (en) | Media file storage method and electronic equipment | |
CN117234351A (en) | Touch processing method, terminal equipment and storage medium | |
CN116846853A (en) | Information processing method and electronic equipment | |
KR20220078853A (en) | system that creates augmented reality-based works and uploads them to SNS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |