WO2016180234A1 - Method and apparatus for building secure environment - Google Patents

Method and apparatus for building secure environment Download PDF

Info

Publication number
WO2016180234A1
WO2016180234A1 PCT/CN2016/080355 CN2016080355W WO2016180234A1 WO 2016180234 A1 WO2016180234 A1 WO 2016180234A1 CN 2016080355 W CN2016080355 W CN 2016080355W WO 2016180234 A1 WO2016180234 A1 WO 2016180234A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
terminal
touch event
fingerprint information
screen
Prior art date
Application number
PCT/CN2016/080355
Other languages
French (fr)
Chinese (zh)
Inventor
张伟
李磊
张春
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016180234A1 publication Critical patent/WO2016180234A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a method and apparatus for constructing a security environment.
  • the user can set the fingerprint password to prevent the password from leaking.
  • the fingerprint collection device integrated on the mobile phone needs to collect the fingerprint, which is cumbersome.
  • password security services including pattern passwords, character passwords, and fingerprint passwords
  • all of these password security services provide "one-time" security services when unlocked.
  • the unlocked users there is no guarantee that they will be permanent users. You may encounter such a situation: after the phone is unlocked, suddenly there is a rush to put down the phone to handle the matter. At this time, the phone will be in a safe vacuum period before the phone reaches the automatic lock screen time, which is highly likely to be illegal. The user obtains the right to use the mobile phone.
  • This method can not only provide the mobile phone lock screen service, but also remove the security vacuum period of the mobile phone to ensure the absolute security of the mobile phone application environment.
  • the existing solution is to use the pattern password, the digital password or the specific fingerprint device to perform irregular verification on the user when the user uses the mobile phone, but the verification method makes the user feel very disgusted.
  • the application environment security protection scheme in the related art is a “one-time” security verification based on a pattern password, a character password, and a specific device fingerprint password, that is, once the verification is passed, the user's security policy is not identified twice or from time to time; Even if there is a secondary verification strategy, the pattern password, the character password, and the specific device fingerprint password are used to interact with the user. This method does not detect in time whether the user after the verification passes changes, and thus cannot guarantee the mobile application environment. And absolute privacy of personal privacy.
  • the invention provides a method and a device for constructing a security environment, which are used to solve the problem that a security scheme in the related art has a security vulnerability and thus has a security risk.
  • a security environment construction method including:
  • the fingerprint information of the user is collected from time to time through the terminal screen
  • the touch event is responded to.
  • the terminal screen when the terminal is in the security mode, if the terminal screen is in the unlocked state, when the user touches the touch event of the terminal screen, when the user touches, the terminal screen is used.
  • the fingerprint information of the user is collected from time to time, and when the collected fingerprint information matches the pre-stored fingerprint information, the touch event is responded.
  • a touch event of the user to the terminal screen is detected
  • Detecting whether the touch event is a touch event for a protection item pre-selected by the user Detecting whether the touch event is a touch event for a protection item pre-selected by the user.
  • the fingerprint information of the user is collected through the terminal screen.
  • the types of the protection items include: system software, third-party software installed by a user, and user files.
  • the touch event is not responded, and the lock screen processing is performed.
  • a security environment construction apparatus including:
  • the detecting module is configured to detect a touch event of the user to the terminal screen when the terminal screen is in an unlocked state, and trigger a fingerprint collection and verification module;
  • the fingerprint collection and verification module is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
  • An execution module configured to respond to the touch event.
  • the detecting module is configured to: when the terminal is in the safe mode, if the terminal screen is in the unlocked state, when the touch event of the user to the terminal screen is detected, the detecting device is triggered.
  • the fingerprint acquisition and verification module is configured to: when the terminal is in the safe mode, if the terminal screen is in the unlocked state, when the touch event of the user to the terminal screen is detected, the detecting device is triggered.
  • the detecting module is configured to detect a touch event of the user on the screen of the terminal when the screen of the terminal is in an unlocked state, and detect whether the touch event is pre-selected for the user.
  • the touch event of the fixed protection item in the case of YES, triggers the fingerprint collection and verification module.
  • the types of the protection items include: system software, third-party software installed by a user, and user files.
  • the execution module is further configured to not respond to the touch event when the collected fingerprint information does not match the pre-stored fingerprint information, and perform a lock screen process.
  • Another embodiment of the present invention provides a computer storage medium, where the computer storage medium stores execution instructions.
  • the execution instructions are used to perform the method in the above embodiments.
  • the user fingerprint is obtained, and the verification is completed in the background, and the verification is correct, and the system can correctly respond to the user operation, thereby realizing the terminal application environment without the user's perception.
  • the full-time lock removes the terminal security vacuum period and ensures the security of the terminal information to the greatest extent.
  • FIG. 1 is a flowchart of a method for constructing a security environment according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for constructing a security environment according to an application example 1 of the present invention
  • FIG. 3 is a flowchart of a security environment construction method provided by application example 2 of the present invention.
  • FIG. 4 is a structural block diagram of a security environment construction apparatus according to Embodiment 2 of the present invention.
  • An embodiment of the present invention provides a security environment construction method, which is applied to a terminal. As shown in FIG. 1 , the method may include:
  • Step S101 When the terminal screen is in an unlocked state, detecting a touch event of the user on the terminal screen;
  • Step S102 when the user touches, collect the fingerprint information of the user from time to time through the terminal screen
  • Step S103 When the collected fingerprint information matches the pre-stored fingerprint information, respond to the touch event.
  • the user obtains the fingerprint of the user through the touch operation of the user, and performs verification in the background, and the verification is correct, and the system can correctly respond to the user operation, thereby realizing that the user is not aware.
  • a full-time lock of the terminal application environment is constructed to ensure the security of the terminal information to the greatest extent.
  • triggering modes that can trigger the execution of the method in this embodiment are listed below.
  • the following triggering modes are merely enumerated, not exhaustive, and those skilled in the art can according to their own needs. Make flexible settings.
  • Manner 1 The method described in this embodiment is used as a function item that can be turned off and on. The user can flexibly enable or disable the function corresponding to the method in this embodiment.
  • Manner 2 The method described in this embodiment is implemented in a security system environment; for example, in the process of starting the user, whether the user enters the normal system environment or the security system environment, when entering the security system environment (ie, the terminal) Running in safe mode), then the method described in this embodiment is automatically enabled.
  • step S101 is implemented as follows: when the terminal screen is in the unlocked state, the touch event of the user to the terminal screen is detected, and it is detected whether the touch event is a touch event for the protection item selected by the user in advance. In the case of YES, steps S102 and S103 are performed.
  • the touch event for the protection item pre-selected by the user includes clicking to open the protection item and all touch events during the operation after the protection item is turned on. That is, the protection item is locked in full time.
  • the types of protection items include: system software, third-party software installed by users, and user files.
  • the user fingerprint is collected through the screen to increase the fingerprint matching success rate. As long as one fingerprint information matches the pre-stored fingerprint information, it is determined that the matching is successful, and the touch operation is performed. Respond.
  • the touch event is not responded, and the lock screen processing is performed.
  • This application example describes a process of time-checking a user's touch operation using a method of time-finding fingerprint verification.
  • fingerprint information of a legitimate user needs to be collected in advance. Because the user has different habits and which finger touches the screen, the fingerprint information of all the fingers of the user is preferably collected to increase the matching success rate.
  • the security environment construction method provided by this application example includes:
  • S201 The mobile phone enters the security system environment opened up.
  • S202 Start the fingerprint collection and verification module and run in the background; wherein the fingerprint collection and verification module initiates two synchronized concurrent threads, one acquires a fingerprint and one matches a fingerprint.
  • step S205 When the fingerprint information in S204 has at least one match, step S206 is performed; otherwise, step S207 is performed.
  • step S206 the system normally responds to the user touch operation, and then continues to loop S203, S204, and S205.
  • step S207 when the information does not match, the user is not responded to and the screen is locked.
  • This application example describes the process of verifying the touch operation of each individual application that needs to be protected by using the method of time fingerprint verification. This process is different from the time verification of the entire system. This process is only used when the user clicks the application with a finger. Icon, collection and verification when launching a single app or content for security protection.
  • the security environment construction method provided by this application example includes:
  • S301 The mobile phone enters the security system environment opened up.
  • S302 Start the fingerprint collection and verification module and run in the background; wherein the fingerprint collection and verification module initiates two synchronized concurrent threads, one acquires a fingerprint and one matches a fingerprint.
  • step S306 When the fingerprint information in S304 has at least one match, step S306 is performed; otherwise, step S307 is performed.
  • step S306 the system normally responds to the user operation and starts the application.
  • the loops S303, S304, and S305 are continued to protect the scene after the application is started.
  • Step S307 when the information does not match, the user is not allowed to start the operation of the application and locks the screen.
  • the fingerprint acquisition and verification module is realized. It is through the verification system running in the background, without interacting with the user (that is, in the case that the user is not aware of it), using the touch screen of the mobile phone when the user operates, when the finger touches the screen to start to leave the screen So far, collect the user's fingerprint from time to time, and compare the collected result with the pre-stored standard data. If the two match, the user is a legitimate user and can use the mobile phone system normally; if the two do not match, the user is determined to have changed. For illegal users, the mobile phone system will not respond The user requests and locks the screen.
  • An embodiment of the present invention provides a security environment construction apparatus, which is applied to a terminal, as shown in FIG. 4, and includes:
  • the detecting module 410 is configured to detect a touch event of the user to the terminal screen when the terminal screen is in the unlocked state, and trigger a fingerprint collection and verification module;
  • the fingerprint collection and verification module 420 is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
  • the execution module 430 is configured to respond to the touch event.
  • the detecting module 410 is configured to trigger the fingerprint collection and calibration when the terminal touches the terminal screen when the terminal is in the unlocked state when the terminal is in the safe mode.
  • Module 420 is configured to trigger the fingerprint collection and calibration when the terminal touches the terminal screen when the terminal is in the unlocked state when the terminal is in the safe mode.
  • the detecting module 410 is configured to detect a touch event of the user to the terminal screen when the terminal screen is in the unlocked state, and detect whether the touch event is pre-selected for the user.
  • the touch event of the protection item in the case of YES, triggers the fingerprint acquisition and verification module 420.
  • the types of protection items include: system software, third-party software installed by users, and user files.
  • the executing module 430 is further configured to: when the collected fingerprint information does not match the pre-stored fingerprint information, does not respond to the touch event, and performs a lock screen process.
  • Embodiments of the present invention also provide a storage medium.
  • an execution instruction is stored in the storage medium, and the execution instruction is used to execute the foregoing method.
  • the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), and a Random Access Memory (RAM).
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • the present invention collects the fingerprint of the current user based on the touch operation of the user during the user's use of the terminal, and verifies the fingerprint, verifies the correctness, and responds correctly to the user operation, thereby realizing that the user is not aware.
  • a full-time lock of the terminal application environment is constructed to ensure the security of the terminal information to the greatest extent.
  • the security environment construction method and apparatus provided by the embodiments of the present invention have the following beneficial effects: in the user touch operation, the user fingerprint is obtained, and the verification is completed in the background, the verification is correct, and the system can correctly respond to the user.
  • the operation realizes the full-time lock of the terminal application environment without the user's perception, and removes the terminal security vacuum period, thereby ensuring the security of the terminal information to the greatest extent.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)
  • Image Input (AREA)
  • Collating Specific Patterns (AREA)

Abstract

Disclosed are a method and an apparatus for building a secure environment. The method comprises: when a terminal screen is in an unlocked state, detecting a touch event of a user on the terminal screen; during a touch of the user, collecting fingerprint information of the user now and then by using the terminal screen; when the collected fingerprint information matches prestored fingerprint information, making a response to the touch event. By means of the solution of the present invention, during a touch operation of a user, a fingerprint of the user is acquired, and authentication of the fingerprint is completed in the background. When the fingerprint is authenticated, a system may correctly respond to an operation of the user, so that it is implemented that without the perception by a user, a full-time lock of an application environment of a terminal is built, thereby eliminating a secure void of the terminal, and ensuring information security of the terminal to the greatest extent.

Description

一种安全环境构建方法和装置Safety environment construction method and device 技术领域Technical field
本发明涉及移动通信领域,尤其涉及一种安全环境构建方法和装置。The present invention relates to the field of mobile communications, and in particular, to a method and apparatus for constructing a security environment.
背景技术Background technique
绝大多数智能手机终端用户目前都采用字符密码或图案密码来保证手机系统的安全,但手机图案密码或数字密码存在泄露的风险。Most smartphone terminal users currently use character passwords or pattern passwords to ensure the security of the mobile phone system, but there is a risk of leakage of the mobile phone pattern password or digital password.
用户可以通过设定指纹密码来达到防止密码泄露的目的,但是,需要手机上集成的专门指纹采集设备对指纹进行采集,操作比较繁琐。The user can set the fingerprint password to prevent the password from leaking. However, the fingerprint collection device integrated on the mobile phone needs to collect the fingerprint, which is cumbersome.
并且,所有的这些密码安全服务(包括图案密码、字符密码和指纹密码),都是在解锁时提供“一次性”的安全服务,至于解锁后的使用用户,无法保证其永久是合法用户,我们可能会遇到这样的情况:手机解锁后,突然有急事而放下手机,去处理事情,这时,在手机到达自动锁屏时间之前,手机会处于一种安全真空期,是极有可能被非法用户取得手机使用权的。Moreover, all of these password security services (including pattern passwords, character passwords, and fingerprint passwords) provide "one-time" security services when unlocked. As for the unlocked users, there is no guarantee that they will be permanent users. You may encounter such a situation: after the phone is unlocked, suddenly there is a rush to put down the phone to handle the matter. At this time, the phone will be in a safe vacuum period before the phone reaches the automatic lock screen time, which is highly likely to be illegal. The user obtains the right to use the mobile phone.
这样就需要一种保证手机安全的方法,这种方法既能提供手机锁屏服务,又能去除手机安全真空期进而保证手机应用环境的绝对安全。为了达到该目的,目前已有的方案是,在用户使用手机时,利用图案密码、数字密码或特定指纹设备对用户进行不定时校验,但这种校验方式会让用户感到十分反感。This requires a method to ensure the security of the mobile phone. This method can not only provide the mobile phone lock screen service, but also remove the security vacuum period of the mobile phone to ensure the absolute security of the mobile phone application environment. In order to achieve this goal, the existing solution is to use the pattern password, the digital password or the specific fingerprint device to perform irregular verification on the user when the user uses the mobile phone, but the verification method makes the user feel very disgusted.
可见,相关技术中的应用环境安全保护方案是建立在图案密码、字符密码以及特定设备指纹密码的“一次性”安全验证,即一次验证通过,便不再二次或时时辨别用户的安全策略;即使有二次验证策略,也是采用图案密码、字符密码以及特定设备指纹密码与用户交互进行的方式,这种方式并不能及时察觉一次验证通过后的使用用户是否发生变化,从而不能保证手机应用环境和个人隐私的绝对安全。It can be seen that the application environment security protection scheme in the related art is a “one-time” security verification based on a pattern password, a character password, and a specific device fingerprint password, that is, once the verification is passed, the user's security policy is not identified twice or from time to time; Even if there is a secondary verification strategy, the pattern password, the character password, and the specific device fingerprint password are used to interact with the user. This method does not detect in time whether the user after the verification passes changes, and thus cannot guarantee the mobile application environment. And absolute privacy of personal privacy.
发明内容Summary of the invention
本发明提供一种安全环境构建方法和装置,用以解决相关技术中的安全方案有安全漏洞,进而存在安全隐患的问题。The invention provides a method and a device for constructing a security environment, which are used to solve the problem that a security scheme in the related art has a security vulnerability and thus has a security risk.
依据本发明的一个方面,提供一种安全环境构建方法,包括:According to an aspect of the present invention, a security environment construction method is provided, including:
在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;When the terminal screen is in the unlocked state, the touch event of the user to the terminal screen is detected;
在用户触控时,通过终端屏幕时时采集用户的指纹信息;When the user touches, the fingerprint information of the user is collected from time to time through the terminal screen;
当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。 When the collected fingerprint information matches the pre-stored fingerprint information, the touch event is responded to.
可选地,本发明所述方法中,当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。Optionally, in the method of the present invention, when the terminal is in the security mode, if the terminal screen is in the unlocked state, when the user touches the touch event of the terminal screen, when the user touches, the terminal screen is used. The fingerprint information of the user is collected from time to time, and when the collected fingerprint information matches the pre-stored fingerprint information, the touch event is responded.
可选地,本发明所述方法中,所述检测到用户对终端屏幕的触控事件,在用户触控时,通过终端屏幕时时采集用户的指纹信息,包括:Optionally, in the method of the present invention, the user touches the touch event of the terminal screen, and when the user touches, collects the fingerprint information of the user from the terminal screen, including:
检测到用户对终端屏幕的触控事件;A touch event of the user to the terminal screen is detected;
检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,在用户触控时,通过终端屏幕时时采集用户的指纹信息。Detecting whether the touch event is a touch event for a protection item pre-selected by the user. In the case of the user, when the user touches, the fingerprint information of the user is collected through the terminal screen.
可选地,本发明所述方法中,所述保护项的类型包括:系统软件、用户安装的第三方软件和用户文件。Optionally, in the method of the present invention, the types of the protection items include: system software, third-party software installed by a user, and user files.
可选地,本发明所述方法中,当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。Optionally, in the method of the present invention, when the collected fingerprint information does not match the pre-stored fingerprint information, the touch event is not responded, and the lock screen processing is performed.
依据本发明的另一个方面,提供一种安全环境构建装置,包括:According to another aspect of the present invention, a security environment construction apparatus is provided, including:
检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,触发指纹采集与校验模块;The detecting module is configured to detect a touch event of the user to the terminal screen when the terminal screen is in an unlocked state, and trigger a fingerprint collection and verification module;
指纹采集与校验模块,设置为在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,触发执行模块;The fingerprint collection and verification module is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
执行模块,设置为对所述触控事件进行响应。An execution module configured to respond to the touch event.
可选地,本发明所述装置中,所述检测模块,设置为当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,触发所述指纹采集与校验模块。Optionally, in the device of the present invention, the detecting module is configured to: when the terminal is in the safe mode, if the terminal screen is in the unlocked state, when the touch event of the user to the terminal screen is detected, the detecting device is triggered. The fingerprint acquisition and verification module.
可选地,本发明所述装置中,所述检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,触发所述指纹采集与校验模块。Optionally, in the device of the present invention, the detecting module is configured to detect a touch event of the user on the screen of the terminal when the screen of the terminal is in an unlocked state, and detect whether the touch event is pre-selected for the user. The touch event of the fixed protection item, in the case of YES, triggers the fingerprint collection and verification module.
可选地,本发明所述装置中,所述保护项的类型包括:系统软件、用户安装的第三方软件和用户文件。Optionally, in the device of the present invention, the types of the protection items include: system software, third-party software installed by a user, and user files.
可选地,本发明所述装置中,所述执行模块,还设置为当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。Optionally, in the device of the present invention, the execution module is further configured to not respond to the touch event when the collected fingerprint information does not match the pre-stored fingerprint information, and perform a lock screen process.
本发明另一实施例提供了一种计算机存储介质,所述计算机存储介质存储有执行指令, 所述执行指令用于执行上述实施例中的方法。Another embodiment of the present invention provides a computer storage medium, where the computer storage medium stores execution instructions. The execution instructions are used to perform the method in the above embodiments.
本发明有益效果如下:The beneficial effects of the present invention are as follows:
本发明所述方案,在用户触控操作中,获取用户指纹,并在后台完成校验,校验正确,系统可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,去除了终端安全真空期,最大程度的保障了终端信息的安全。According to the solution of the present invention, in the user touch operation, the user fingerprint is obtained, and the verification is completed in the background, and the verification is correct, and the system can correctly respond to the user operation, thereby realizing the terminal application environment without the user's perception. The full-time lock removes the terminal security vacuum period and ensures the security of the terminal information to the greatest extent.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或相关技术中的技术方案,下面将对实施例或相关技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention or related art, the drawings used in the embodiments or the related art description will be briefly described below. Obviously, the drawings in the following description are merely Some embodiments of the present invention may also be used to obtain other drawings based on these drawings without departing from the prior art.
图1为本发明实施例一提供的一种安全环境构建方法的流程图;FIG. 1 is a flowchart of a method for constructing a security environment according to Embodiment 1 of the present invention;
图2为本发明应用示例一提供的一种安全环境构建方法的流程图;2 is a flowchart of a method for constructing a security environment according to an application example 1 of the present invention;
图3为本发明应用示例二提供的一种安全环境构建方法的流程图;3 is a flowchart of a security environment construction method provided by application example 2 of the present invention;
图4为本发明实施例二提供的一种安全环境构建装置的结构框图。FIG. 4 is a structural block diagram of a security environment construction apparatus according to Embodiment 2 of the present invention.
具体实施方式detailed description
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
实施例一Embodiment 1
本发明实施例提供一种安全环境构建方法,应用于终端,如图1所示,所述方法可以包括:An embodiment of the present invention provides a security environment construction method, which is applied to a terminal. As shown in FIG. 1 , the method may include:
步骤S101,在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;Step S101: When the terminal screen is in an unlocked state, detecting a touch event of the user on the terminal screen;
步骤S102,在用户触控时,通过终端屏幕时时采集用户的指纹信息;Step S102, when the user touches, collect the fingerprint information of the user from time to time through the terminal screen;
步骤S103,当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。Step S103: When the collected fingerprint information matches the pre-stored fingerprint information, respond to the touch event.
综上可知,本发明在用户使用终端过程中,通过用户的触控操作,获取用户的指纹,并在后台完成校验,校验正确,系统可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,最大程度的保障了终端信息的安全。 In summary, in the process of using the terminal, the user obtains the fingerprint of the user through the touch operation of the user, and performs verification in the background, and the verification is correct, and the system can correctly respond to the user operation, thereby realizing that the user is not aware. In this case, a full-time lock of the terminal application environment is constructed to ensure the security of the terminal information to the greatest extent.
为了使本发明的目的、技术方案和优点更加清楚,下面给出几个具体及优选实施方式,用以细化和优化本发明所述方法的功能。需要说明的是,在不冲突的情况下,如下特征可以互相任意组合。In order to clarify the objects, technical solutions and advantages of the present invention, several specific and preferred embodiments are presented below to refine and optimize the function of the method of the present invention. It should be noted that, in the case of no conflict, the following features can be arbitrarily combined with each other.
为了使本发明的方案实施起来更加可控,以下列举两个可以触发执行本实施例所述方法的触发方式,当然,以下触发方式只是列举,并非穷举,本领域技术人员可以根据自己的需求进行灵活设定。In order to make the solution of the present invention more controllable, two triggering modes that can trigger the execution of the method in this embodiment are listed below. Of course, the following triggering modes are merely enumerated, not exhaustive, and those skilled in the art can according to their own needs. Make flexible settings.
方式一:将本实施例所述方法作为一种可以关闭及开启的功能项,用户通过自身需求,灵活的开启或关闭本实施例所述方法对应的功能。Manner 1: The method described in this embodiment is used as a function item that can be turned off and on. The user can flexibly enable or disable the function corresponding to the method in this embodiment.
方式二:将本实施例所述方法在一种安全系统环境下实施;例如,在用户开机的过程中,可以选定是进入普通系统环境还是安全系统环境,当进入安全系统环境时(即终端运行在安全模式下),那么就自动使能本实施例所述方法。Manner 2: The method described in this embodiment is implemented in a security system environment; for example, in the process of starting the user, whether the user enters the normal system environment or the security system environment, when entering the security system environment (ie, the terminal) Running in safe mode), then the method described in this embodiment is automatically enabled.
在本发明的一个优选实施例中,用户还可以根据自己的需求,针对于某些需要保护的应用或内容来实施本实施例所述方法。此时,步骤S101按如下方式实施:在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测该触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,执行步骤S102和S103。In a preferred embodiment of the present invention, the user may also implement the method described in this embodiment for some applications or content that need to be protected according to his own needs. At this time, step S101 is implemented as follows: when the terminal screen is in the unlocked state, the touch event of the user to the terminal screen is detected, and it is detected whether the touch event is a touch event for the protection item selected by the user in advance. In the case of YES, steps S102 and S103 are performed.
其中,针对于用户预先选定的保护项的触控事件包含点击开启该保护项以及该保护项开启后运行期间的所有触控事件。即对该保护项进行全时锁。其中,保护项的类型包括:系统软件、用户安装的第三方软件和用户文件等。The touch event for the protection item pre-selected by the user includes clicking to open the protection item and all touch events during the operation after the protection item is turned on. That is, the protection item is locked in full time. Among them, the types of protection items include: system software, third-party software installed by users, and user files.
在本发明实施例中,在用户触控时,通过屏幕时时的采集用户指纹是为了增加指纹匹配成功率,只要有一个指纹信息与预存的指纹信息匹配,就判定为匹配成功,对触控操作予以响应。In the embodiment of the present invention, when the user touches, the user fingerprint is collected through the screen to increase the fingerprint matching success rate. As long as one fingerprint information matches the pre-stored fingerprint information, it is determined that the matching is successful, and the touch operation is performed. Respond.
可选地,本发明实施例中,当采集的指纹信息与预存的指纹信息均不匹配时,对所述触摸事件不予响应,并进行锁屏处理。Optionally, in the embodiment of the present invention, when the collected fingerprint information does not match the pre-stored fingerprint information, the touch event is not responded, and the lock screen processing is performed.
为了更清楚的阐述本发明,下面结合方法的流程图和具体应用示例对本发明进行详细描述。In order to explain the present invention more clearly, the present invention will be described in detail below with reference to the flowchart of the method and the specific application examples.
应用示例一:Application example one:
本应用示例描述了采用时时指纹校验的方法对用户的触控操作进行时时校验的过程。This application example describes a process of time-checking a user's touch operation using a method of time-finding fingerprint verification.
在实施本发明所述方法前,需要预先采集合法用户的指纹信息,由于用户习惯不同,用哪个手指触碰屏幕不定,所以优选地采集用户所有手指的指纹信息,以增加匹配成功率。Before implementing the method of the present invention, fingerprint information of a legitimate user needs to be collected in advance. Because the user has different habits and which finger touches the screen, the fingerprint information of all the fingers of the user is preferably collected to increase the matching success rate.
如图2所示,本应用示例提供的安全环境构建方法,包括:As shown in FIG. 2, the security environment construction method provided by this application example includes:
S201:手机进入所开辟的安全系统环境。 S201: The mobile phone enters the security system environment opened up.
S202:启动指纹采集与校验模块并在后台运行;其中,指纹采集与校验模块发起两个同步的并发线程,一个采集指纹,一个匹配指纹。S202: Start the fingerprint collection and verification module and run in the background; wherein the fingerprint collection and verification module initiates two synchronized concurrent threads, one acquires a fingerprint and one matches a fingerprint.
S203:监听用户触控操作。S203: Monitor user touch operation.
S204:当用户触摸屏幕,有触控操作时,采集用户指纹信息并同时进行匹配,当用户手指离开屏幕,停止指纹的采集与匹配。S204: When the user touches the screen and has a touch operation, the user fingerprint information is collected and matched at the same time, and when the user's finger leaves the screen, the fingerprint collection and matching are stopped.
S205:当S204中指纹信息有至少一次匹配时,执行步骤S206;否则,执行步骤S207。S205: When the fingerprint information in S204 has at least one match, step S206 is performed; otherwise, step S207 is performed.
步骤S206,系统正常响应用户触控操作,然后继续循环S203、S204、S205。In step S206, the system normally responds to the user touch operation, and then continues to loop S203, S204, and S205.
步骤S207,当信息都不匹配时,不予响应用户操作并锁屏。In step S207, when the information does not match, the user is not responded to and the screen is locked.
应用示例二:Application example two:
本应用示例描述了采用时时指纹校验的方法对需要保护的每单个应用的触控操作进行校验的过程,此过程区别于对整个系统的时时校验,此过程只在用户用手指点击应用图标,启动单个以进行安全防护的app应用或内容时,才进行采集和校验。This application example describes the process of verifying the touch operation of each individual application that needs to be protected by using the method of time fingerprint verification. This process is different from the time verification of the entire system. This process is only used when the user clicks the application with a finger. Icon, collection and verification when launching a single app or content for security protection.
如图3所示,本应用示例提供的安全环境构建方法,包括:As shown in FIG. 3, the security environment construction method provided by this application example includes:
S301:手机进入所开辟的安全系统环境。S301: The mobile phone enters the security system environment opened up.
S302:启动指纹时时采集与校验模块并在后台运行;其中,指纹采集与校验模块发起两个同步的并发线程,一个采集指纹,一个匹配指纹。S302: Start the fingerprint collection and verification module and run in the background; wherein the fingerprint collection and verification module initiates two synchronized concurrent threads, one acquires a fingerprint and one matches a fingerprint.
S303:监听用户触控操作。S303: Monitor user touch operation.
S304:当用户点击应用图标时,采集用户指纹信息并同时进行匹配,并在用户手指离开屏幕,停止指纹的采集与匹配。S304: When the user clicks the application icon, the user fingerprint information is collected and matched at the same time, and the fingerprint is stopped and captured when the user's finger leaves the screen.
S305:当S304中指纹信息有至少一次匹配时,执行步骤S306;否则,执行步骤S307。S305: When the fingerprint information in S304 has at least one match, step S306 is performed; otherwise, step S307 is performed.
步骤S306,系统正常响应用户操作,启动应用。优选地,在应用启动后,继续循环S303、S304、S305,以对应用启动后的场景进行保护。In step S306, the system normally responds to the user operation and starts the application. Preferably, after the application is started, the loops S303, S304, and S305 are continued to protect the scene after the application is started.
步骤S307,当信息都不匹配时,不予响应用户启动应用的操作并锁屏。Step S307, when the information does not match, the user is not allowed to start the operation of the application and locks the screen.
综上所述,可知在手机正常运行后(未设传统密码的手机唤醒后或设定传统密码的手机解锁后),当用户在安全系统环境模式下时,指纹时时采集与校验模块的实现是通过在后台运行的校验系统,在不与用户交互的情况下(也就是在用户察觉不到的情况下),利用手机触摸屏在用户进行操作的时候,在手指触摸到屏幕开始到离开屏幕为止,去时时采集用户指纹,并将采集结果与预存的标准数据进行对比,如两者匹配,则用户是合法用户,可以正常使用手机系统;如果两者不匹配,则判定用户已经发生变化,为非法用户,手机系统将不予响应 用户请求并锁屏。In summary, it can be seen that after the normal operation of the mobile phone (after the wake-up of the mobile phone without the traditional password or after the mobile phone with the traditional password is unlocked), when the user is in the security system environment mode, the fingerprint acquisition and verification module is realized. It is through the verification system running in the background, without interacting with the user (that is, in the case that the user is not aware of it), using the touch screen of the mobile phone when the user operates, when the finger touches the screen to start to leave the screen So far, collect the user's fingerprint from time to time, and compare the collected result with the pre-stored standard data. If the two match, the user is a legitimate user and can use the mobile phone system normally; if the two do not match, the user is determined to have changed. For illegal users, the mobile phone system will not respond The user requests and locks the screen.
实施例二Embodiment 2
本发明实施例提供一种安全环境构建装置,应用于终端,如图4所示,包括:An embodiment of the present invention provides a security environment construction apparatus, which is applied to a terminal, as shown in FIG. 4, and includes:
检测模块410,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,触发指纹采集与校验模块;The detecting module 410 is configured to detect a touch event of the user to the terminal screen when the terminal screen is in the unlocked state, and trigger a fingerprint collection and verification module;
指纹采集与校验模块420,设置为在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,触发执行模块;The fingerprint collection and verification module 420 is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
执行模块430,设置为对所述触控事件进行响应。The execution module 430 is configured to respond to the touch event.
基于上述结构框架及实施原理,下面给出在上述结构下的几个具体及优选实施方式,用以细化和优化本发明所述装置的功能,以使本发明方案的实施更方便,准确。具体涉及如下内容:Based on the above structural framework and implementation principle, several specific and preferred embodiments under the above structure are given below to refine and optimize the functions of the device of the present invention, so that the implementation of the solution of the present invention is more convenient and accurate. Specifically related to the following:
在本发明的一个实施例中,检测模块410,设置为当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,触发指纹采集与校验模块420。In an embodiment of the present invention, the detecting module 410 is configured to trigger the fingerprint collection and calibration when the terminal touches the terminal screen when the terminal is in the unlocked state when the terminal is in the safe mode. Module 420.
在本发明的另一个实施例中,检测模块410,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,触发指纹采集与校验模块420。In another embodiment of the present invention, the detecting module 410 is configured to detect a touch event of the user to the terminal screen when the terminal screen is in the unlocked state, and detect whether the touch event is pre-selected for the user. The touch event of the protection item, in the case of YES, triggers the fingerprint acquisition and verification module 420.
其中,保护项的类型包括:系统软件、用户安装的第三方软件和用户文件等。Among them, the types of protection items include: system software, third-party software installed by users, and user files.
可选地,本发明实施例中,执行模块430,还设置为当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。Optionally, in the embodiment of the present invention, the executing module 430 is further configured to: when the collected fingerprint information does not match the pre-stored fingerprint information, does not respond to the touch event, and performs a lock screen process.
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质中存储有执行指令,该执行指令用于执行上述的方法。Embodiments of the present invention also provide a storage medium. Optionally, in this embodiment, an execution instruction is stored in the storage medium, and the execution instruction is used to execute the foregoing method.
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。Optionally, in the embodiment, the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), and a Random Access Memory (RAM). A variety of media that can store program code, such as a hard disk, a disk, or an optical disk.
综上可知,本发明在用户使用终端过程中,基于用户的触控操作,时时采集当前用户的指纹,并对指纹进行校验,校验正确,正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,最大程度的保障了终端信息的安全。In summary, the present invention collects the fingerprint of the current user based on the touch operation of the user during the user's use of the terminal, and verifies the fingerprint, verifies the correctness, and responds correctly to the user operation, thereby realizing that the user is not aware. In this case, a full-time lock of the terminal application environment is constructed to ensure the security of the terminal information to the greatest extent.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是其与其他实施例的不同之处。尤其对于装置实施例而言,由于其基本相似与方法实施例,所以,描述的比较简单,相关之处参见方法实施例的部 分说明即可。The various embodiments in the specification are described in a progressive manner, and the same or similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. Especially for the device embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts are referred to the part of the method embodiment. It can be explained.
虽然通过实施例描述了本申请,本领域的技术人员知道,本申请有许多变形和变化而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。While the present invention has been described by the embodiments of the invention, it will be understood that Thus, it is intended that the present invention cover the modifications and modifications of the invention
工业实用性Industrial applicability
如上所述,本发明实施例提供的一种安全环境构建方法和装置具有以下有益效果:在用户触控操作中,获取用户指纹,并在后台完成校验,校验正确,系统可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,去除了终端安全真空期,最大程度的保障了终端信息的安全。 As described above, the security environment construction method and apparatus provided by the embodiments of the present invention have the following beneficial effects: in the user touch operation, the user fingerprint is obtained, and the verification is completed in the background, the verification is correct, and the system can correctly respond to the user. The operation realizes the full-time lock of the terminal application environment without the user's perception, and removes the terminal security vacuum period, thereby ensuring the security of the terminal information to the greatest extent.

Claims (11)

  1. 一种安全环境构建方法,应用于终端,包括:A security environment construction method is applied to a terminal, including:
    在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;When the terminal screen is in the unlocked state, the touch event of the user to the terminal screen is detected;
    在用户触控时,通过终端屏幕时时采集用户的指纹信息;When the user touches, the fingerprint information of the user is collected from time to time through the terminal screen;
    当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。When the collected fingerprint information matches the pre-stored fingerprint information, the touch event is responded to.
  2. 如权利要求1所述的方法,其中,所述方法包括:The method of claim 1 wherein said method comprises:
    当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。When the terminal is in the safe mode, if the terminal screen is in the unlocked state, when the user touches the touch event of the terminal screen, when the user touches, the fingerprint information of the user is collected through the terminal screen, and the fingerprint is collected. When the information matches the pre-stored fingerprint information, the information is responded to by the touch event.
  3. 如权利要求1或2所述的方法,其中,所述检测到用户对终端屏幕的触控事件,在用户触控时,通过终端屏幕时时采集用户的指纹信息,包括:The method of claim 1 or 2, wherein the detecting a touch event of the user on the screen of the terminal, when the user touches, collecting the fingerprint information of the user from the terminal screen, including:
    检测到用户对终端屏幕的触控事件;A touch event of the user to the terminal screen is detected;
    检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,在用户触控时,通过终端屏幕时时采集用户的指纹信息。Detecting whether the touch event is a touch event for a protection item pre-selected by the user. In the case of the user, when the user touches, the fingerprint information of the user is collected through the terminal screen.
  4. 如权利要求3所述的方法,其中,所述保护项的类型包括:系统软件、用户安装的第三方软件和用户文件。The method of claim 3, wherein the type of protection item comprises: system software, user-installed third party software, and user files.
  5. 如权利要求1或2或4所述的方法,其中,当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。The method according to claim 1 or 2 or 4, wherein when the collected fingerprint information does not match the pre-stored fingerprint information, the touch event is not responded, and the screen lock processing is performed.
  6. 一种安全环境构建装置,应用于终端,包括:A security environment construction device is applied to a terminal, including:
    检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,触发指纹采集与校验模块;The detecting module is configured to detect a touch event of the user to the terminal screen when the terminal screen is in an unlocked state, and trigger a fingerprint collection and verification module;
    指纹采集与校验模块,设置为在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,触发执行模块;The fingerprint collection and verification module is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
    执行模块,设置为对所述触控事件进行响应。An execution module configured to respond to the touch event.
  7. 如权利要求6所述的装置,其中,所述检测模块,设置为当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,触发所述指纹采集与校验模块。The device of claim 6, wherein the detecting module is configured to: when the terminal is in the unlocked state when the terminal is operating in the safe mode, triggering the touch event when the user touches the terminal screen The fingerprint acquisition and verification module.
  8. 如权利要求6或7所述的装置,其中,所述检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,触发所述指纹采集与校验模块。The device of claim 6 or 7, wherein the detecting module is configured to detect a touch event of the user on the screen of the terminal when the screen of the terminal is in an unlocked state, and detect whether the touch event is for the user The touch event of the pre-selected protection item, if yes, triggers the fingerprint acquisition and verification module.
  9. 如权利要求8所述的装置,其中,所述保护项的类型包括:系统软件、用户安装的第三 方软件和用户文件。The apparatus of claim 8, wherein the type of the protection item comprises: system software, user-installed third Party software and user files.
  10. 如权利要求6或7或9所述的装置,其中,所述执行模块,还设置为当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。The device of claim 6 or 7 or 9, wherein the execution module is further configured to not respond to the touch event when the collected fingerprint information does not match the pre-stored fingerprint information, and Lock screen processing.
  11. 一种计算机存储介质,所述计算机存储介质存储有执行指令,所述执行指令用于执行权利要求1至5中任一项所述的方法。 A computer storage medium storing execution instructions for performing the method of any one of claims 1 to 5.
PCT/CN2016/080355 2015-10-21 2016-04-27 Method and apparatus for building secure environment WO2016180234A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510686318.4 2015-10-21
CN201510686318.4A CN106611113A (en) 2015-10-21 2015-10-21 Security environment construction method and apparatus

Publications (1)

Publication Number Publication Date
WO2016180234A1 true WO2016180234A1 (en) 2016-11-17

Family

ID=57247702

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/080355 WO2016180234A1 (en) 2015-10-21 2016-04-27 Method and apparatus for building secure environment

Country Status (2)

Country Link
CN (1) CN106611113A (en)
WO (1) WO2016180234A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259360A (en) * 2020-02-14 2020-06-09 珠海格力电器股份有限公司 Touch screen state control method and device of terminal equipment and terminal equipment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762835A (en) * 2018-05-17 2018-11-06 Oppo广东移动通信有限公司 Application operation method, apparatus, storage medium and electronic device
CN113468490B (en) * 2020-03-30 2024-05-03 阿里巴巴集团控股有限公司 Screen locking method, device and equipment of terminal equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101809581A (en) * 2007-09-24 2010-08-18 苹果公司 Embedded authentication systems in an electronic device
CN104765552A (en) * 2015-04-28 2015-07-08 小米科技有限责任公司 Authority management method and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104049901A (en) * 2014-07-03 2014-09-17 南昌欧菲生物识别技术有限公司 Mobile terminal and touch button operating method of mobile terminal
CN104618577B (en) * 2014-12-30 2018-05-29 广东欧珀移动通信有限公司 A kind of response method and device of button request

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101809581A (en) * 2007-09-24 2010-08-18 苹果公司 Embedded authentication systems in an electronic device
CN104765552A (en) * 2015-04-28 2015-07-08 小米科技有限责任公司 Authority management method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259360A (en) * 2020-02-14 2020-06-09 珠海格力电器股份有限公司 Touch screen state control method and device of terminal equipment and terminal equipment

Also Published As

Publication number Publication date
CN106611113A (en) 2017-05-03

Similar Documents

Publication Publication Date Title
JP6239788B2 (en) Fingerprint authentication method, apparatus, intelligent terminal, and computer storage medium
TWI676910B (en) Method, device and system for displaying human-machine interface
JP6096301B2 (en) Theft prevention in firmware
US20170193212A1 (en) Screen Interface Unlocking Method And Screen Interface Unlocking Device
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
US20160366588A1 (en) User mode control method and system based on iris recognition technology for mobile terminal
WO2015014128A1 (en) Authentication method for wearable device, and wearable device
WO2013067486A1 (en) Secure boot administration in a unified extensible firmware interface (uefi)- compliant computing device
KR20150012989A (en) Method and apparatus for application protection
WO2017036345A1 (en) Information input method and device
US9560527B2 (en) Version protection method and apparatus for mobile terminal
US20150047019A1 (en) Information processing method and electronic device
US20170169213A1 (en) Electronic device and method for running applications in different security environments
WO2017166689A1 (en) Privacy protection method and device
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
WO2017067507A1 (en) Method and device for determining a use permission of an apparatus
WO2016127448A1 (en) System switching method, system switching apparatus and terminal
KR20230064623A (en) Mobile devices with secure personal memory
WO2018000509A1 (en) Safe operation method, operation device, and terminal
WO2016171992A1 (en) Detecting and preventing illicit use of device
WO2016180234A1 (en) Method and apparatus for building secure environment
CN105138881A (en) Screen locking method and device
EP3336734B1 (en) Fingerprint information secure call method, apparatus, and mobile terminal
WO2016078429A1 (en) Identity recognition method and apparatus
CN113221095A (en) Application program protection method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16792084

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16792084

Country of ref document: EP

Kind code of ref document: A1