WO2016039529A1 - Procédé de commande du statut de verrouillage d'application et dispositif électronique le prenant en charge - Google Patents

Procédé de commande du statut de verrouillage d'application et dispositif électronique le prenant en charge Download PDF

Info

Publication number
WO2016039529A1
WO2016039529A1 PCT/KR2015/008377 KR2015008377W WO2016039529A1 WO 2016039529 A1 WO2016039529 A1 WO 2016039529A1 KR 2015008377 W KR2015008377 W KR 2015008377W WO 2016039529 A1 WO2016039529 A1 WO 2016039529A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
icon
touch input
application
controller
Prior art date
Application number
PCT/KR2015/008377
Other languages
English (en)
Korean (ko)
Inventor
리수시아
탄슈
리위안유
위차오
메이총후아
리판
송펭
양홍
카오지안
가오징팅
거쉬페이
쭝위안
Original Assignee
삼성전자 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201410460429.9A external-priority patent/CN104217151B/zh
Application filed by 삼성전자 주식회사 filed Critical 삼성전자 주식회사
Priority to EP15839208.4A priority Critical patent/EP3193247A4/fr
Priority to US15/510,519 priority patent/US20170300700A1/en
Publication of WO2016039529A1 publication Critical patent/WO2016039529A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Definitions

  • the described embodiment relates to a method for controlling a locked state of an application and an electronic device supporting the same.
  • portable terminals With the remarkable development of information and communication technology and semiconductor technology, the spread and use of various portable terminals is increasing rapidly. As portable terminals are widely used, users are using them for various purposes. For example, a user uses a portable terminal as a storage medium for storing private information. Accordingly, security-related technologies for portable terminals have been developed.
  • a screen lock function of the mobile terminal As a security related technology of a mobile terminal, there is a screen lock function of the mobile terminal.
  • the user may set a screen lock of the mobile terminal by setting a password, setting a pattern password, and the like so that others cannot use the mobile terminal without the user's permission.
  • a method of controlling an application lock state that enables a user to set or release a lock state of an application through an interaction with an icon corresponding to an application, and an electronic device supporting the same can be provided.
  • a method of controlling a lock state of an application of an electronic device comprising: receiving a first touch input for a first icon displayed on a screen, and detecting a first duration of time for which the first touch input is maintained And setting the locked state of the application corresponding to the first icon when the first duration is greater than or equal to the first threshold time.
  • the locked state of the application can be easily set or released through an interaction with an icon corresponding to the application.
  • FIG. 1 is a conceptual diagram illustrating a method for controlling an application lock state according to an embodiment of the present invention.
  • FIG. 2 is a block diagram of an electronic device according to an embodiment of the present invention.
  • FIG. 3 is a flowchart illustrating a method for controlling an application lock state according to an embodiment of the present invention.
  • FIG. 4 is a flowchart illustrating a method for setting a locked state for an application according to an embodiment of the present invention.
  • FIG. 5 is a flowchart illustrating a method of setting an application lock state using fingerprint information according to an embodiment of the present invention.
  • FIG. 6 is a flowchart illustrating a method for controlling an application lock state according to another embodiment of the present invention.
  • FIG. 7 is a flowchart illustrating a method for controlling an application lock state according to another embodiment of the present invention.
  • FIG. 8 is an exemplary diagram for describing a method for controlling an application lock state according to another embodiment of the present invention.
  • FIG. 9 is a flowchart illustrating a method of releasing an application lock state according to an embodiment of the present invention.
  • a method of controlling a lock state of an application of an electronic device comprising: receiving a first touch input for a first icon displayed on a screen, and detecting a first duration of time for which the first touch input is maintained And setting the locked state of the application corresponding to the first icon when the first duration is greater than or equal to the first threshold time.
  • the setting of the locked state may include detecting a first fingerprint from the first touch input, and registering the first fingerprint as authentication information related to the release of the locked state.
  • the registering of the first fingerprint may include comparing the first fingerprint with a fingerprint registered in advance in the electronic device, and as a result of the comparison, determining that the first fingerprint is the same as the pre-registered fingerprint. If so, it may include registering the first fingerprint.
  • the method may further include releasing the locked state of the application corresponding to the first icon, wherein releasing the locked state comprises: receiving a second touch input for the first icon; Detecting a second duration time at which the second touch input is maintained; detecting a second fingerprint from the second touch input according to a result of comparing the second duration time with a second threshold time; Comparing with the registered first fingerprint, and if it is determined that the second fingerprint is the same as the first fingerprint, the step of releasing the locked state.
  • the setting of the locked state may include registering a plurality of different fingerprints as authentication information associated with the release of the locked state, and the releasing of the locked state may include registering the second fingerprint. Comparing with at least one of the plurality of registered fingerprints, and releasing the locked state if it is determined that the second fingerprint is the same as at least one or more of the registered plurality of fingerprints. can do.
  • the method may further include receiving a third touch input for the second icon displayed on the screen, detecting a third duration of time when the third touch input is maintained, and when the third duration is greater than or equal to a third threshold time.
  • the method may further include setting a lock state of an application corresponding to the second icon, and setting the lock state of an application corresponding to the second icon may include detecting a third fingerprint from the third touch input. And registering the third fingerprint as authentication information associated with releasing the locked state of the application corresponding to the second icon, wherein the first fingerprint and the third fingerprint may be the same or different from each other. have.
  • first threshold time and the third threshold time may be the same or different from each other, and the user having the first fingerprint and the user having the third fingerprint may be the same or different from each other.
  • the setting of the locked state may include: receiving a drag input when the first duration is greater than or equal to the first threshold time, and at least one third icon included in an area corresponding to the drag input.
  • the method may include setting a locked state of at least one application from among a corresponding application or an application corresponding to at least one or more fourth icons disposed on the trajectory path of the drag input.
  • the setting of the locked state may include detecting a fingerprint from the first touch input, and registering the detected fingerprint as authentication information associated with the release of the locked state of each of the at least one or more applications. It may include.
  • the setting of the lock state may include receiving at least one or more of a lock pattern, a password, or a personal identification number (PIN) number, and authentication information related to the release of the lock state. And registering the pattern password, the password, or the PIN number.
  • PIN personal identification number
  • an electronic device may include a display for displaying a first icon, an input unit for receiving a first touch input for the first icon, and a first duration for which the first touch input is maintained.
  • the control unit may set a lock state of an application corresponding to the first icon when the first duration is greater than or equal to the first threshold time.
  • the apparatus may further include a fingerprint sensor that detects the first fingerprint from the first touch input, and the controller may register the first fingerprint as authentication information related to the release of the locked state.
  • the controller compares the first fingerprint with a fingerprint registered in advance in the electronic device, and the controller determines the first fingerprint when it is determined that the first fingerprint is identical to the fingerprint registered in advance. You can register.
  • the input unit may receive a second touch input for the first icon, the controller detects a second duration of time that the second touch input is maintained, and the fingerprint sensor has a second duration of time.
  • the second fingerprint is detected from the second touch input according to a result compared with a threshold time, and the controller compares the second fingerprint with the registered first fingerprint, and the controller determines that the second fingerprint is a result of the comparison.
  • the lock state may be released.
  • the controller may register a plurality of fingerprints different from each other as authentication information related to the release of the locked state, and the controller may compare the second fingerprint with at least one of the registered fingerprints, and the controller may be configured to As a result of the comparison, when the second fingerprint is determined to be the same as at least one or more of the plurality of registered fingerprints, the locked state may be released.
  • the input unit receives a third touch input for the second icon displayed on the display
  • the controller detects a third duration of time in which the third touch input is maintained, and the controller is configured to determine the third duration time.
  • a third threshold time or more a lock state of an application corresponding to the second icon is set
  • the fingerprint sensor detects a third fingerprint from the third touch input
  • the controller controls the application corresponding to the second icon.
  • the third fingerprint may be registered as authentication information related to the release of the locked state, and the first and third fingerprints may be the same or different from each other.
  • first threshold time and the third threshold time may be the same or different from each other.
  • the input unit may receive a drag input when the first duration is greater than or equal to the first threshold time, and the controller may include an application or the drag corresponding to at least one third icon included in an area corresponding to the drag input.
  • a lock state of at least one or more applications may be set among applications corresponding to at least one or more fourth icons disposed on the input path path.
  • the apparatus may further include a fingerprint sensor that detects a fingerprint from the first touch input, and the controller may register the detected fingerprint as authentication information associated with the release of the locked state of each of the one or more applications.
  • the input unit receives at least one or more of a lock pattern, a password, or a PIN (Personal Identification Number) number
  • the control unit is the pattern password
  • the authentication information associated with the release of the lock state The password or the PIN number can be registered.
  • an 'electronic device' may include, for example, a smartphone tablet PC, a digital camera, a computer monitor, a personal digital assistant (PDA), an electronic notebook, a desktop PC, and a portable multimedia (PMP).
  • Player a media player (for example, an MP3 player), a watch, and a game terminal.
  • FIG. 1 is a conceptual diagram illustrating a method for controlling an application lock state according to an embodiment of the present invention.
  • the electronic device may control a display to display a plurality of icons on a screen.
  • the 'icon' may be a picture or symbol displayed for selecting a function or data of an application. For example, when a user touches an icon, an application function mapped to (or corresponding to) the icon may be executed.
  • an 'icon' may be generically referred to as an item, an object, a folder, an image, or the like.
  • the unlocked state is referred to as a 'locked state' and the unlocked state is referred to as a 'unlocked state' for the application in which the lock function is set.
  • a lock state may be set for an application corresponding to the touched icon.
  • the electronic device may detect a duration when the touch input is received, that is, a duration of the touch input or a time for which the touch is maintained. When it is determined that the time at which the touch input is received is greater than or equal to a predetermined threshold time, the electronic device may obtain fingerprint information of the user. In an embodiment, the electronic device may set a lock state of an application corresponding to the icon based on the acquired fingerprint information of the user.
  • the electronic device may register fingerprint information of the user as a setting for releasing a locked state of the application. For example, when a user touches an icon to execute an application in a state in which a lock on an application is set (or in an application lock state), whether the user fingerprint information acquired by the touch and the registered user fingerprint information match each other.
  • the lock state of the application may be determined according to the determination.
  • different fingerprint information of the same user may be registered for setting the lock state for each of the plurality of applications. For example, based on fingerprint information of ten fingers of the same user, different fingerprint information may be registered for setting a lock state for each of a plurality of applications. In another embodiment, other fingerprint information of a plurality of users may be registered for setting a lock state.
  • a plurality of fingerprint information may be registered to set the lock state of one application.
  • a lock state of the application may be set by comparing the fingerprint information acquired in the electronic device with the registered fingerprint information.
  • the electronic device may store pre-registered user fingerprint information for overall function control (eg, screen lock state release, billing payment, etc.).
  • the electronic device may set a lock state of an application corresponding to the touch input icon when the obtained fingerprint information matches the registered user fingerprint information.
  • the touch input for setting the lock state of the application may be one touch input.
  • the electronic device may set a lock state for the application based on user fingerprint information obtained by one touch.
  • the touch input for setting the lock state of the application may be two or more touch inputs.
  • the electronic device may receive a touch input from the user again when the time when one touch is input is equal to or greater than a specified threshold time.
  • the fingerprint information of the user may be obtained and a lock state of the application may be set based on the obtained fingerprint information.
  • the electronic device when the user's touch input time for the icon is greater than or equal to the threshold time, the electronic device receives an input such as a lock pattern, a password, or a personal identification number (PIN) number, and receives the received information. You can set a lock state for your application based on the input you have entered. For example, when the user's touch input time for the icon is greater than or equal to the threshold time, the electronic device may output a screen for inducing input of a pattern password (or drawing a pattern password) for setting a lock state for the application. Upon receiving the pattern password input from the user, the electronic device may store the pattern password input for setting the lock state. For example, the electronic device may store the pattern password input as authentication information for releasing the lock state of the application.
  • an input such as a lock pattern, a password, or a personal identification number (PIN) number
  • PIN personal identification number
  • the electronic device may release the lock state set for the application based on the user's touch input. For example, when it is determined that the touch input time for the icon is greater than or equal to the specified threshold time, the electronic device may check whether the lock on the application is set. When the lock is set for the application, the electronic device may acquire user fingerprint information and release the lock state for the application based on the obtained fingerprint information. For example, the electronic device compares the acquired fingerprint information with the registered fingerprint information, and if the acquired fingerprint information and the registered fingerprint information match, the electronic device determines a lock state set in the application corresponding to the received icon. You can turn it off.
  • the electronic device may release the locked state of the application based on a touch input to the icon of the locked application. For example, when a touch input for an icon of an application set in a locked state is received from the user, the electronic device may obtain fingerprint information of the user. The electronic device may compare the registered fingerprint information and the acquired information to set the lock state of the application, and release the locked state of the application when the registered fingerprint information and the acquired information match.
  • 103 illustrates a screen for outputting a lock state setting notification for an application (eg, a Photo application) corresponding to the touch input icon 20.
  • an application eg, a Photo application
  • the electronic device may output a notification 40 such as "Locked for Photo".
  • the notification may be output in various ways.
  • the electronic device may output a lock state setting for the application by outputting voice, vibration, and light.
  • FIG. 2 is a block diagram of an electronic device 100 according to an embodiment of the present invention.
  • the electronic device 100 may include a communication unit 110, a display 120, a fingerprint sensor 130, an input unit 140, an audio output unit 150, a storage unit 160, and a controller 170. ) May be included.
  • the communication unit 110 may be added when the electronic device 100 is an electronic device 100 that supports a communication function, and may be omitted when the electronic device 100 does not support a communication function. It may be.
  • the communication unit 110 forms a communication channel in a set manner with a network (mobile communication network, etc.) that can be supported under the control of the control unit 170 to establish wireless communication such as voice communication, video communication, and short message service (SMS). It may transmit and receive signals related to data communication based on a message service such as a multimedia messaging service (MMS) and the Internet.
  • MMS multimedia messaging service
  • the communication unit 110 may include a transceiver for up-converting and amplifying a frequency of a transmitted signal and low-noise amplifying and down-converting a frequency of a received signal.
  • the communication unit 110 may form a data communication channel for a message service under the control of the controller 170 to process data service transmission and reception based on the message service.
  • the communication channel may be a mobile communication channel such as code division multiple access (CDMA), time division multiple access (TDMA), orthogonal frequency-division multiple access (OFDMA), and an internet communication channel such as a wired internet network or a wireless internet network. It may include.
  • the communication unit 110 may transmit the fingerprint information obtained from the user under the control of the control unit 170 to a server for performing a fingerprint authentication service. For example, when authentication for setting an application lock state, releasing an application lock state, releasing an application lock state, etc. is performed on the server, the communication unit 110 controls a touch input for an icon of an application under the control of the controller 170. User fingerprint information obtained by the transmission can be transmitted to the server or the like.
  • the display 120 may display data on the screen under the control of the controller 170.
  • the display 120 may convert the data stored in the buffer into an analog signal and display the data on the screen.
  • the display 120 controls various screens according to the use of the electronic device 100 under the control of the controller 170, for example, a lock screen, a home screen, an application execution screen, a menu screen, a keypad screen, a message writing screen, and the Internet. A screen or the like can be displayed.
  • the display 120 may be a liquid crystal display (LCD), an active matrix organic light emitting diode (AMOLED), a passive matrix organic light emitting diode (PMOLED), a flexible display, or a transparent display. It can be configured as a display.
  • LCD liquid crystal display
  • AMOLED active matrix organic light emitting diode
  • PMOLED passive matrix organic light emitting diode
  • LCD liquid crystal display
  • LCD liquid crystal display
  • AMOLED active matrix organic light emitting diode
  • PMOLED passive matrix organic light emitting diode
  • a flexible display or a transparent display. It can be configured as a display.
  • the display 120 may display at least one icon on the screen under the control of the controller 170.
  • the display 120 may output a corresponding screen when the lock on the application is set or the lock is released under the control of the controller 170, or when the lock state of the application is released.
  • the fingerprint sensor 130 may recognize the input user's finger and scan (or capture) the fingerprint of the recognized finger.
  • the information about the scanned fingerprint may be stored in the storage 160.
  • the controller 170 may extract a feature point (minutia) of the fingerprint from the fingerprint information. The controller 170 may compare the registered fingerprint information and the scanned (or acquired) fingerprint information by comparing feature points of the fingerprint.
  • the fingerprint sensor 130 may be embodied in a form embedded within the display 120.
  • the fingerprint sensor 130 when the fingerprint sensor 130 is a photo sensor, the fingerprint sensor 130 may be implemented in a form in which the photo sensor is inserted into the display 120.
  • the fingerprint sensor 130 may be implemented to be stacked on the display 120.
  • the fingerprint sensor 130 is composed of a transparent scan film
  • the transparent scan film may be stacked on the display 120.
  • the configuration of the fingerprint sensor 130 is not limited to the examples listed, and may be implemented in various ways.
  • the input unit 140 may include a touch panel or a key input unit 140.
  • the touch panel may generate a touch input (or touch event) in response to a touch of a user's finger or the like, and transmit the generated touch input to the controller 170.
  • the touch panel transmits coordinates included in a touch area, for example, an area touched by a user's finger, to the controller 170, and the controller 170 determines at least one of the coordinates included in the touch area as touch coordinates. Can be.
  • the controller 170 may generate touch input time information on an icon based on the touch input from the touch panel. For example, the controller 170 may calculate a time at which information on an area coordinate on which an icon is displayed is received from the touch panel, and generate touch input time information based on the calculated time.
  • the key input unit may include a plurality of keys for receiving numeric or character information and setting various functions. These keys may include menu call keys, screen on / off keys, power on / off keys, volume control keys, and the like.
  • the key input unit may generate a key event related to user setting and function control of the electronic device 100 and transmit the generated key event to the controller 170.
  • the key of the key input unit may be referred to as a hard key, and a virtual key displayed on the display 120 may be referred to as a soft key.
  • the audio output unit 150 may output audio (eg, voice, sound) input through the communication unit 110 or the like.
  • the audio output unit 150 may output audio stored in the storage 160 under the control of the controller 170.
  • the audio output unit 150 may include at least one of a speaker, a headphone output terminal, or an S / PDIF (Sony / Philips Digital Interface: output terminal)
  • the audio output unit 150 may include a speaker, a headphone output terminal, and a S / PDIF. It may include a combination of output terminals.
  • the audio output unit 150 may output a guide sound or an effect sound under the control of the controller 170 when the lock on the application is set or released or when the lock on the application is released. .
  • the storage 160 may store various data, programs or applications for driving and controlling the electronic device 100 under the control of the controller 170.
  • the storage unit 160 may store input / output signals or data corresponding to driving of the communication unit 110, the display 120, the input unit 140, and the audio output unit 150.
  • the storage unit 160 is a control program for controlling the electronic device 100 and the controller 170, an application initially provided from a manufacturer or downloaded from the outside, a graphical user interface (GUI) related to the application, and an object for providing a GUI. (Eg, image text, icons, buttons, etc.), user information, documents, databases, or related data.
  • GUI graphical user interface
  • the term “storage unit 160” refers to a memory card (eg, a micro SD card) mounted in the storage unit 160, the ROM of the controller 170, or the electronic device 100 or 100. , USB memory, not shown).
  • the storage 160 may include a nonvolatile memory, a volatile memory, a hard disk drive (HDD), or a solid state drive (SSD).
  • the storage 160 may store fingerprint information of the user.
  • the storage 160 may store fingerprint information registered for setting a lock state of an application.
  • the storage 160 may store fingerprint information for setting a lock state for each application.
  • a plurality of fingerprint information may be stored for one application.
  • fingerprint information of a plurality of users may be stored for setting a lock state.
  • the storage 160 may store a fingerprint recognition module (or a fingerprint recognition program).
  • the fingerprint recognition module may extract a feature point of the scanned (or obtained) fingerprint from the fingerprint sensor 130, and perform a lock state setting or a lock state release based on the extracted feature point of the fingerprint. . but.
  • the fingerprint recognition module may be stored in the storage 160, but may be configured independently of the storage 160.
  • the controller 170 may control the overall operation of the electronic device 100 and the signal flow between the internal components of the electronic device 100, and may perform a function of processing data.
  • the controller 170 may execute an operating system (OS) and various applications stored in the storage 160 when there is a user input or satisfies a preset and stored condition.
  • OS operating system
  • FIG. 3 is a flowchart illustrating a method for controlling an application lock state according to an embodiment of the present invention.
  • the controller 170 may control the display 120 to display an icon on the screen.
  • the screen may be a home screen, a menu screen, or the like.
  • the screen may consist of at least one page, and the at least one page may include an icon.
  • the icon may be a folder containing various files.
  • the controller 170 may receive a touch input on the icon.
  • the touch input for the icon may be a holding input for maintaining a direct touch (or a touch touch) on the icon for a predetermined time.
  • the touch input for the icon may be a hovering input (or indirect touch input), etc., maintained for a predetermined time with respect to the icon.
  • the controller 170 may detect a time when a touch input is received. For example, the controller 170 continuously performs coordinate information on a point at which a user's finger is touched from the input unit 140 (or a touch panel), for example, coordinate information on a point at which a touch input to an icon is maintained. Can be received. The controller 170 may calculate a time at which the coordinate information on the point where the touch input for the icon is maintained is received. The controller 170 may check the touch input time for the icon based on the calculated time.
  • the controller 170 may determine whether to set a lock state for the application according to the time at which the touch input is received. For example, when the time for which the touch input is maintained for the icon is greater than or equal to a specified threshold time, the controller 170 may determine to set a lock state for an application (or an application whose function is mapped to the icon) corresponding to the icon. have.
  • the controller 170 may execute an application corresponding to the icon when the time for which the touch input is maintained for the icon is equal to or less than a specified threshold time. For example, when the time for which the touch input is maintained is less than a specified threshold time and the lock is set in the application, the controller 170 may perform authentication to release the lock state. For example, the controller 170 may obtain fingerprint information by a touch input on the icon. The controller 170 may perform authentication for unlocking the locked state by comparing the acquired fingerprint information with the registered fingerprint information. When the acquired fingerprint information and the registered fingerprint information match, the controller 170 may release the lock state set in the application and execute the application. If the acquired fingerprint information and the registered fingerprint information do not match, the control unit 170 maintains the lock state set in the application, and outputs a notification for inducing the user to perform the input for releasing the lock state again. Can be controlled.
  • the application may be executed.
  • control unit 170 when the control unit 170 determines to set the lock state of the application corresponding to the icon by receiving a touch input for a predetermined time or more for the icon, the control unit 170 inputs for setting the application lock state. You can set a lock state for an application based on.
  • a method of setting the lock state of the application based on the lock state setting input of the application will be described in detail with reference to FIG. 3.
  • FIG. 4 is a flowchart illustrating a method for setting a locked state for an application according to an embodiment of the present invention.
  • the lock state setting for the application of FIG. 4 may be performed when the touch input time for the icon in FIG. 3 is determined to be greater than or equal to a specified threshold time and it is determined to set the lock state for the application.
  • the controller 170 may receive an input for setting an application lock state.
  • the input for setting the application lock state may be a touch input for obtaining a user fingerprint.
  • the input for setting the application lock state may be a touch input maintained for more than a time specified for the icon.
  • the controller 170 may obtain fingerprint information of the user through a touch input on the icon.
  • the touch input maintained for more than the time specified for the icon and the touch input for acquiring the user fingerprint may be one (or the same) touch input.
  • the touch input maintained for more than the time specified for the icon and the touch input for acquiring the user fingerprint may be separate (or independent) touch inputs.
  • the controller 170 may receive a touch input maintained for a predetermined time or more with respect to the icon, and may receive a touch input with respect to the icon in order to obtain a user fingerprint.
  • the input for setting the application lock state may be a pattern password setting input.
  • the controller 170 may control the display 120 to output a display for inputting a pattern password.
  • the controller 170 may receive a pattern password input for setting an application lock state through the input unit 140.
  • the input for setting the application lock state may be a password input or a PIN (Personal Identification Number) input.
  • the controller 170 may control the display 120 to output an indication for inputting a password or a PIN number.
  • the controller 170 may receive a password or PIN number input for setting an application lock state through the input unit 140.
  • the input for setting the application lock state is not limited thereto.
  • the controller 170 may set a lock state for the application. For example, the controller 170 may set a lock state for the application based on the user fingerprint information obtained by the touch input. For example, the controller 170 may register the obtained user fingerprint as a reference fingerprint when performing authentication for releasing a locked state. When a touch input for executing an application is received, the controller 170 may release the lock state according to whether the fingerprint acquired by the touch input and the fingerprint registered as the reference fingerprint match.
  • the controller 170 may set a lock state for the application based on a password or PIN number input. For example, the controller 170 may set the application lock state so that the lock state of the application is released when the password or PIN number authentication is successful for the application. In one embodiment, the controller 170 may store a password or PIN number for the application lock state to be mapped to the application.
  • FIG. 5 is a flowchart illustrating a method of setting an application lock state using fingerprint information according to an embodiment of the present invention.
  • the application lock state setting of FIG. 5 may be performed when the touch input time for the icon in FIG. 3 is determined to be greater than or equal to a specified threshold time and it is determined to set the lock state for the application.
  • the controller 170 may receive (or obtain) fingerprint information of the user.
  • the touch input maintained for more than the time specified for the icon and the touch input for acquiring the user fingerprint may be one (or the same) touch input.
  • the touch input maintained for more than the time specified for the icon and the touch input for acquiring the user fingerprint may be separate (or independent) touch inputs.
  • the controller 170 may compare the received fingerprint information with pre-registered fingerprint information.
  • the pre-registered fingerprint may be a fingerprint registered for setting an application lock state.
  • the pre-registered fingerprint may be a fingerprint registered for setting a lock state for each application.
  • the fingerprint registered for the application may be a fingerprint in which at least one finger fingerprint information of a user's thumb, index finger, middle finger, ring finger, and cub is registered.
  • the pre-registered fingerprint may be a fingerprint registered for overall function control (or authentication) of the electronic device 100.
  • the controller 170 may register at least one user fingerprint for screen lock or billing payment.
  • the controller 170 may use a fingerprint registered to perform the function of the electronic device 100, such as screen lock or billing, for application setting.
  • the controller 170 may set a lock state for the application. For example, when the received fingerprint information and the pre-registered fingerprint information match, the controller 170 may register the acquired fingerprint as a reference fingerprint when performing authentication for releasing the lock state.
  • FIG. 6 is a flowchart illustrating a method for controlling an application lock state according to another embodiment of the present invention.
  • the controller 170 may control the display 120 to display an icon on the screen.
  • the screen may be a home screen, a menu screen, or the like.
  • the screen may consist of at least one page, and the at least one page may include an icon.
  • the icon may be a folder containing various files.
  • the controller 170 may receive a touch input on the icon.
  • the touch input for the icon may be a holding input for maintaining a direct touch (or a touch touch) on the icon for a predetermined time.
  • the touch input for the icon may be a hovering input (or indirect touch input), etc., maintained for a predetermined time with respect to the icon.
  • the controller 170 may check a time when a touch input is received. For example, the controller 170 continuously performs coordinate information on a point at which a user's finger is touched from the input unit 140 (or a touch panel), for example, coordinate information on a point at which a touch input to an icon is maintained. Can be received. The controller 170 may calculate a time at which the coordinate information on the point where the touch input for the icon is maintained is received. The controller 170 may check the touch input time for the icon based on the calculated time.
  • step 607 if it is determined in step 605 that the touch input time is less than the specified threshold time, the controller 170 may perform a corresponding function. For example, the controller 170 may execute an application corresponding to a touch input icon. When the lock is set in the application, the controller 170 may perform authentication for releasing the locked state. For example, the controller 170 may compare the fingerprint acquired by the touch input and the registered fingerprint. When the fingerprint acquired by the touch input and the registered fingerprint match, the controller 170 may release the lock state set in the application and execute the application. When the fingerprint acquired by the touch input and the registration fingerprint do not match, the controller 170 outputs a notification for inducing to maintain the locked state of the application and to perform the input for releasing the locked state again. The display 120 can be controlled to do so.
  • the controller 170 may determine whether a lock is currently set for the application. For example, the controller 170 may check whether the lock on the application is set or the lock on the application is not set.
  • the controller 170 may release the lock state set for the application.
  • the controller 170 may obtain user fingerprint information to release the application lock state setting.
  • the controller 170 may compare the acquired fingerprint information with the registered fingerprint information when setting the application lock state. If the acquired fingerprint information and the registered fingerprint information match, the controller 170 may release the application lock state setting.
  • the controller 170 may delete the registered fingerprint information when setting the application lock state.
  • the controller 170 may delete the fingerprint information registered for the application and the mapped relationship between the applications when setting the application lock state.
  • the controller 170 may set a lock state for the application. For example, the controller 170 may set a lock state for the application based on the user fingerprint information obtained by the touch input. For example, the controller 170 may set the locked state of the application by registering the obtained user fingerprint as a reference fingerprint when performing authentication for releasing the locked state.
  • the controller 170 may set a lock state for the application based on a password or PIN number input. For example, the controller 170 may set the application lock state so that the lock state of the application is released when the password or PIN number authentication is successful for the application. In one embodiment, the controller 170 may store a password or PIN number for the application lock state to be mapped to the application.
  • FIG. 7 is a flowchart illustrating a method for controlling an application lock state according to another embodiment of the present invention.
  • the controller 170 may receive a touch input for at least one icon displayed on the screen.
  • the touch input for the at least one icon may be a touch holding input for maintaining a touch for a predetermined time with respect to the at least one icon.
  • the controller 170 may check a touch input reception time for at least one icon. For example, the controller 170 continuously performs coordinate information on a point at which a user's finger is touched from the input unit 140 (or a touch panel), for example, coordinate information on a point at which a touch input to an icon is maintained. Can be received. The controller 170 may calculate a time at which the coordinate information on the point where the touch input for the icon is maintained is received. The controller 170 may check the touch input time for the icon based on the calculated time.
  • the controller 170 may perform a corresponding function. For example, the controller 170 may execute an application corresponding to a touch input icon. When the lock is set in the application, the controller 170 may perform authentication for releasing the locked state. For example, the controller 170 may compare the fingerprint acquired by the touch input and the registered fingerprint. When the fingerprint acquired by the touch input and the registered fingerprint match, the controller 170 may release the lock state set in the application and execute the application. When the fingerprint acquired by the touch input and the registration fingerprint do not match, the controller 170 outputs a notification for inducing to maintain the locked state of the application and to perform the input for releasing the locked state again. The display 120 can be controlled to do so.
  • the controller 170 may receive a drag input while maintaining the touch input.
  • the present invention is not limited thereto, and the controller 170 may receive the drag input again after releasing the touch input (after removing the touched finger from the icon) without maintaining the touch input.
  • the controller 170 may select a plurality of icons based on the drag input. For example, the controller 170 may select an icon displayed in an area overlapping the dragged trajectory. In other words, the controller 170 may select at least one or more icons arranged on the trajectory path of the drag input. According to another embodiment, the controller 170 may select at least one or more icons included in the area corresponding to the drag input. For example, the controller 170 may select an icon included in the generated virtual rectangle using the start point and the end point of the drag input. According to another embodiment, the controller 170 may select an icon included in the virtual closed curve generated using the trajectory path of the drag input.
  • the controller 170 may set a lock state for applications corresponding to the selected plurality of icons.
  • the controller 170 may set a lock state for a plurality of applications based on fingerprint information of a user obtained by a touch input. For example, the controller 170 may register the obtained user fingerprint as a reference fingerprint when performing authentication for releasing a locked state. When a touch input for executing any one of a plurality of locked applications is received, the controller 170 releases the lock state according to whether a fingerprint acquired by the touch input and a fingerprint registered as the reference fingerprint match. Can be.
  • the process of obtaining fingerprint information of the user may be performed between steps 705 and 709.
  • the controller 170 may obtain fingerprint information.
  • the drag may be input while the touch input is maintained, and fingerprint information may be obtained when the drag input is released.
  • processes 703 and 705 in FIG. 7 may be performed after process 711 is performed.
  • a drag is input to an area in which a plurality of icons are displayed, and the touch input is maintained at a point before the drag input is released.
  • the time may be confirmed
  • the control unit 170 may perform process 713 when the determined time is equal to or greater than a specified threshold time.
  • FIG. 8 is an exemplary diagram for describing a method for controlling an application lock state according to another embodiment of the present invention.
  • the controller 170 may receive a touch input for an icon at 801.
  • the controller 170 may check whether the touch input reception time for the icon is greater than or equal to the threshold time.
  • the controller 170 may obtain the fingerprint information of the user when the touch input reception time is more than the threshold time.
  • control unit 170 maintains a touch on the icon 820, and inputs a drag to an area where the icon 830, the icon 840, the icon 850, and the icon 860 are displayed. Can be received.
  • the controller 170 may set a lock state for the icons 830 to 860.
  • the controller 170 may set a lock state for the application corresponding to the icons 830 to 860 based on the acquired fingerprint. For example, when an execution input for any one of the applications corresponding to the locked icons 830 to 860 is received, the controller 170 may release the lock state of the execution input application through fingerprint authentication. Can be.
  • a drag is input to the icons 830 to 860 including a touch input icon 820, and a plurality of icons according to a touch input time for the icon 860 displayed in the area where the drag is released.
  • Locks may be set for the applications corresponding to 820 to 860. For example, when a drag is input to the icons 830 to 860 sequentially and in a touch state with respect to the icon 820, and the touch is maintained for more than a threshold time specified for the icon 860, the plurality of icons is displayed.
  • a lock may be set for an application corresponding to the fields 820 to 860.
  • the controller 170 may control the display 120 to output a lock state setting notification for the applications corresponding to the selected icons.
  • the controller 170 may control the display 120 to output a phrase such as “lock is set for the selected application”.
  • the lock state setting notification is not limited thereto and may be output in a form of outputting voice, vibration, or light.
  • FIG. 9 is a flowchart illustrating a method of releasing an application lock state according to an embodiment of the present invention.
  • the controller 170 may control the display 120 to display an icon on the screen.
  • the controller 170 may receive a touch input on the icon.
  • the touch input for the icon may be a touch input received for less than a specified threshold time.
  • the controller 170 may perform authentication on an application corresponding to the touch input icon. For example, when the application corresponding to the icon is locked, the controller 170 may perform authentication to release the application lock state. For example, when the authentication for unlocking the lock is fingerprint authentication, the controller 170 may acquire fingerprint information of the user and perform fingerprint authentication based on the obtained fingerprint. For example, the controller 170 may compare the registered fingerprint and the acquired fingerprint and check whether the registered fingerprint matches the obtained fingerprint.
  • the controller 170 displays the display 120 to output an indication for inducing input of the pattern password, password, or PIN number. ) Can be controlled.
  • the controller 170 compares the input pattern password, password, or PIN number with a preset pattern password, password, or PIN number. You can check the match.
  • the controller 170 may release the locked state of the application.
  • the controller 170 may compare the registered fingerprint with the acquired fingerprint, and release the lock state for the application if the registered fingerprint matches the obtained fingerprint.
  • the controller 170 may release a lock state for an application if the input pattern password, password, or PIN number matches a set pattern password, password, or PIN number. Can be.
  • the controller 170 may execute an application.
  • the controller 170 may execute an MP3 or a video.
  • the controller 170 may control the display 120 to open a folder or display an application corresponding to an icon.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

La présente invention concerne, dans un mode de réalisation, un procédé de commande du statut de verrouillage d'une application et un dispositif électronique le prenant en charge. Un procédé de commande du statut de verrouillage d'une application d'un dispositif électronique comprend les étapes consistant à : recevoir une première entrée tactile par rapport à une première icône affichée sur un écran; détecter une première durée pendant laquelle la première entrée tactile est maintenue; et, si la première durée est la même ou si elle est plus longue qu'un premier temps seuil, régler le statut de verrouillage de l'application qui correspond à la première icône.
PCT/KR2015/008377 2014-09-11 2015-08-11 Procédé de commande du statut de verrouillage d'application et dispositif électronique le prenant en charge WO2016039529A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP15839208.4A EP3193247A4 (fr) 2014-09-11 2015-08-11 Procédé de commande du statut de verrouillage d'application et dispositif électronique le prenant en charge
US15/510,519 US20170300700A1 (en) 2014-09-11 2015-08-11 Method for controlling lock status of application and electronic device supporting same

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201410460429.9A CN104217151B (zh) 2014-09-11 2014-09-11 智能终端应用程序的加锁方法及智能终端
CN201410460429.9 2014-09-11
KR10-2015-0110884 2015-08-06
KR1020150110884A KR102299261B1 (ko) 2014-09-11 2015-08-06 어플리케이션의 잠금 상태를 제어하는 방법 및 이를 지원하는 전자장치

Publications (1)

Publication Number Publication Date
WO2016039529A1 true WO2016039529A1 (fr) 2016-03-17

Family

ID=55459254

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2015/008377 WO2016039529A1 (fr) 2014-09-11 2015-08-11 Procédé de commande du statut de verrouillage d'application et dispositif électronique le prenant en charge

Country Status (1)

Country Link
WO (1) WO2016039529A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111279339A (zh) * 2017-08-29 2020-06-12 深圳传音通讯有限公司 一种应用锁定的方法、终端设备及计算机可读介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050079896A1 (en) * 2003-10-14 2005-04-14 Nokia Corporation Method and apparatus for locking a mobile telephone touch screen
WO2013100480A1 (fr) * 2011-12-27 2013-07-04 주식회사 네오패드 Procédé et système de configuration de menu d'un dispositif intelligent
US20140002388A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Biometric Initiated Communication
WO2014042476A1 (fr) * 2012-09-14 2014-03-20 크루셜텍 주식회사 Procédé de gestion de fichiers par empreinte digitale, terminal utilisateur et support d'enregistrement associés
KR20140079960A (ko) * 2012-12-20 2014-06-30 크루셜텍 (주) 지문 인식 이용한 애플리케이션을 실행하기 위한 방법, 장치 및 컴퓨터 판독 가능 기록 매체

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050079896A1 (en) * 2003-10-14 2005-04-14 Nokia Corporation Method and apparatus for locking a mobile telephone touch screen
WO2013100480A1 (fr) * 2011-12-27 2013-07-04 주식회사 네오패드 Procédé et système de configuration de menu d'un dispositif intelligent
US20140002388A1 (en) * 2012-06-29 2014-01-02 Apple Inc. Biometric Initiated Communication
WO2014042476A1 (fr) * 2012-09-14 2014-03-20 크루셜텍 주식회사 Procédé de gestion de fichiers par empreinte digitale, terminal utilisateur et support d'enregistrement associés
KR20140079960A (ko) * 2012-12-20 2014-06-30 크루셜텍 (주) 지문 인식 이용한 애플리케이션을 실행하기 위한 방법, 장치 및 컴퓨터 판독 가능 기록 매체

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3193247A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111279339A (zh) * 2017-08-29 2020-06-12 深圳传音通讯有限公司 一种应用锁定的方法、终端设备及计算机可读介质
CN111279339B (zh) * 2017-08-29 2023-07-21 深圳传音通讯有限公司 一种应用锁定的方法、终端设备及计算机可读介质

Similar Documents

Publication Publication Date Title
KR102299261B1 (ko) 어플리케이션의 잠금 상태를 제어하는 방법 및 이를 지원하는 전자장치
WO2018117376A1 (fr) Procédé d'exploitation de contenu et dispositif électronique destiné à sa mise en œuvre
WO2015020272A1 (fr) Appareil mobile et procédé de commande correspondant
WO2015126135A1 (fr) Procédé et appareil de traitement d'informations biométriques dans un dispositif électronique
WO2014017858A1 (fr) Appareil de terminal utilisateur et procédé de commande associé
WO2016060370A1 (fr) Terminal pour un internet des objets et son procédé de fonctionnement
WO2015037960A1 (fr) Dispositif et procédé de fourniture d'écran de verrouillage
WO2016036115A1 (fr) Dispositif électronique et procédé de gestion de réenregistrement
WO2015111790A1 (fr) Montre intelligente, dispositif d'affichage et son procédé de commande
WO2017115961A1 (fr) Appareil et procédé de commande de verrouillage de porte
WO2016021924A2 (fr) Dispositif mobile, procédé d'affichage d'écran correspondant, dispositif à porter sur soi, son procédé de commande, et support d'enregistrement lisible par ordinateur
WO2013058539A1 (fr) Procédé et appareil pour fournir une fonction de recherche dans un dispositif tactile
WO2014003354A1 (fr) Procédé de commande de terminal ayant recours à la sensibilité au contexte et terminal correspondant
WO2015170797A1 (fr) Dispositif d'affichage et son procédé de commande
WO2018080198A1 (fr) Dispositif électronique et procédé pour effectuer une authentification
WO2014077611A1 (fr) Dispositif et procédé de commande de dispositif
WO2018076879A1 (fr) Procédé et appareil de sauvegarde de données, support d'informations et terminal
WO2014042476A1 (fr) Procédé de gestion de fichiers par empreinte digitale, terminal utilisateur et support d'enregistrement associés
WO2012053875A2 (fr) Appareil et système pour transmettre et recevoir des données via des informations d'empreinte digitale
WO2016013693A1 (fr) Terminal et procédé permettant de commander un terminal
WO2016200058A1 (fr) Dispositif, procédé et programme informatique de fusion binaire
WO2016039529A1 (fr) Procédé de commande du statut de verrouillage d'application et dispositif électronique le prenant en charge
WO2014208984A1 (fr) Appareil et procédé de production d'un environnement de sécurité
WO2015034161A1 (fr) Dispositif de génération de mots de passe à usage unique et procédé de génération utilisant un moyen d'entrée imaginaire
WO2018169323A1 (fr) Dispositif electronique et procédé de commande associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15839208

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2015839208

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015839208

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 15510519

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE