WO2017185464A1 - 一种数据清除方法与终端设备 - Google Patents

一种数据清除方法与终端设备 Download PDF

Info

Publication number
WO2017185464A1
WO2017185464A1 PCT/CN2016/084092 CN2016084092W WO2017185464A1 WO 2017185464 A1 WO2017185464 A1 WO 2017185464A1 CN 2016084092 W CN2016084092 W CN 2016084092W WO 2017185464 A1 WO2017185464 A1 WO 2017185464A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
terminal device
fingerprint image
touch track
preset
Prior art date
Application number
PCT/CN2016/084092
Other languages
English (en)
French (fr)
Inventor
罗鹏
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017185464A1 publication Critical patent/WO2017185464A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a data clearing method and a terminal device.
  • the embodiment of the invention provides a data clearing method and a terminal device, which are used for conveniently and optionally clearing data in the terminal device.
  • a first aspect of the embodiments of the present invention discloses a data clearing method, including:
  • the fingerprint image is consistent with the preset fingerprint image, acquiring a touch trajectory of the user's finger;
  • the touch track is consistent with the preset touch track, the user data in the terminal device is cleared.
  • the clearing user data in the terminal device includes:
  • the display screen is not displayed normally, the user data in the terminal device is cleared; if the display screen can be displayed normally, the display screen is displayed with a first prompt message; wherein the first prompt message is used The user is prompted to determine whether to clear the user data in the terminal device.
  • the method further includes:
  • the display screen can be displayed normally, before the user data in the terminal device is cleared, the display screen is displayed to display a second prompt message for asking the user whether to back up the user data to the cloud.
  • the acquiring a fingerprint image of the user includes:
  • the acquiring a user's finger touch trajectory includes:
  • the fingerprint image of the user is acquired multiple times within a preset time, and the fingerprint image acquired multiple times is counted to obtain a touch track.
  • the preset touch track includes more than one type of touch track, and each touch track has a different range of user data for deletion.
  • a second aspect of the embodiment of the present invention discloses a terminal device, including:
  • a fingerprint acquiring module configured to acquire a fingerprint image of the user
  • a fingerprint verification module configured to verify whether the fingerprint image is consistent with a preset fingerprint image
  • a trajectory acquiring module configured to acquire a touch trajectory of the finger of the user when the fingerprint image is consistent with the preset fingerprint image
  • a track verification module configured to verify whether the touch track is consistent with the preset touch track
  • the data clearing module is configured to clear user data in the terminal device when the touch track is consistent with the preset touch track.
  • the data clearing module includes:
  • a display detection sub-module configured to detect whether the display screen of the terminal device can be displayed normally
  • Clearing a sub-module configured to clear user data in the terminal device when the display screen is not displayed normally
  • a first prompt sub-module configured to: when the display screen is normally displayed, cause the display screen to display a first prompt message; wherein the first prompt message is used to prompt the user whether to determine to clear the terminal device User data.
  • the terminal device further includes:
  • a second prompting module configured to: when the display screen is normally displayed, clear the user data in the terminal device, and then display the second prompt message on the display screen to ask the user whether the user data needs to be Back up to the cloud.
  • the fingerprint acquiring module is specifically configured to monitor a user's finger pressing on the fingerprint identification module to obtain a fingerprint image
  • the trajectory acquiring module is specifically configured to monitor a sliding of a user's finger on the touch panel to obtain a touch trajectory
  • the fingerprint image of the user is acquired multiple times within a preset time, and the fingerprint image acquired multiple times is obtained to obtain a touch track.
  • the terminal device further includes:
  • the storage module is configured to store the preset fingerprint image and the preset touch track; wherein the preset touch track includes more than one type of touch track, and the range of user data for each touch track is different.
  • the fingerprint image of the user is obtained; whether the fingerprint image is consistent with the preset fingerprint image; if the fingerprint image is consistent with the preset fingerprint image, the user touches the trajectory of the finger; and the touch trajectory is verified. Whether the preset touch track is consistent; if the touch track is consistent with the preset touch track, the user data in the terminal device is cleared. It can be seen that the embodiment of the present invention can easily and quickly clear the user data in the terminal device, thereby preventing the user's personal information from being leaked.
  • FIG. 1 is a schematic flowchart of a data clearing method according to an embodiment of the present invention.
  • FIG. 2 is a schematic flowchart diagram of another data clearing method according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic structural diagram of still another terminal device according to an embodiment of the present invention.
  • the embodiment of the invention provides a data clearing method and a terminal device, which can conveniently and quickly clear user data in the terminal device, thereby preventing the user's personal information from being leaked.
  • the details are described below separately.
  • FIG. 1 is a schematic flowchart of a data clearing method according to an embodiment of the present invention.
  • the data clearing method shown in FIG. 1 may include the following steps:
  • the terminal device may be various terminal devices that can store data, such as a smart phone, a digital camera, a smart wearable device, a personal digital assistant (PDA), and a point of sale (POS of Sales, POS). And so on, the embodiments of the present invention will not be repeated in the following.
  • the terminal device is pre-equipped with a fingerprint collection device, such as a fingerprint identification module, a fingerprint touch panel, etc., and the device can be configured on the front or the back of the terminal device, for the fingerprint collection device used, and the device.
  • a fingerprint collection device such as a fingerprint identification module, a fingerprint touch panel, etc.
  • the location of the present invention is not limited.
  • the terminal device when the terminal device is in the awake state, the user performs fingerprint input on the fingerprint touch panel.
  • the terminal device monitors the user's finger contact with the fingerprint touch panel, obtains the fingerprint image of the user, and performs preliminary image processing such as noise reduction and binarization on the fingerprint image.
  • verify whether the fingerprint image is consistent with the preset fingerprint image This can be done by collecting nodes and verifying nodes.
  • the node refers to the coordinate position of the bifurcation, termination or circle of the fingerprint of the human body, and has a unique feature of height.
  • the user fingerprint image of the preliminary image processing is extracted and the node information is compared with the node information of the preset fingerprint image, and the degree of similarity between the two is calculated, and the obtained user fingerprint image and the preset fingerprint image can be obtained. Whether the result of the judgment is consistent.
  • the fingerprint image is consistent with the preset fingerprint image, acquiring a user's finger touch track.
  • the step of verifying the user fingerprint is used to identify the user identity, and after determining that the identity of the user is legal, the user's finger touch track is acquired to delete the user data in the terminal device.
  • a plurality of touch tracks can be set, and the range of user data deleted by each touch track is different.
  • the terminal device stores a plurality of preset touch trajectories, and each touch trajectory corresponds to deleting different ranges of user data in the terminal device.
  • the terminal device may store three types of preset touch tracks, and the touch track 1 corresponds to deleting user data including: short messages, call records, address books, mails, photos, and videos; and the touch track 2 corresponds to deleting the above.
  • software such as Alipay, WeChat, QQ and Internet Banking, which may involve user property security, is also uninstalled; touch track 3 corresponds to clearing all user data in the terminal device. Then, the user can selectively delete different ranges of user data in the terminal device by inputting different touch trajectories included in the preset touch trajectory.
  • the touch track is consistent with the preset touch track, the user data in the terminal device is cleared.
  • the user data corresponding to the range of the touch track is deleted.
  • an operation similar to the factory reset can be performed first, so that the user can be stored in the process of using the terminal device.
  • Data in the terminal device can also restore changes to system settings. After performing an operation similar to the factory reset, write the random data over the storage area multiple times to ensure that the deleted data cannot be recovered.
  • the user is first identified as a legitimate user by fingerprint identification. After the user passes the identity authentication, the range of user data to be cleared is determined by the touch track input by the user.
  • the user's terminal device has high-risk personal information such as private information and property information, you can choose to clear all the data in the terminal device.
  • This method can be completely used by writing random data multiple times. Clear the data stored in the terminal device to prevent data from being restored. Therefore, the embodiment of the present invention can conveniently and optionally clear the user data in the terminal device, and can completely clear the user data when needed, thereby eliminating the risk of data being recovered, thereby protecting the user's personal information. .
  • FIG. 2 is a schematic flowchart diagram of another data clearing method disclosed in an embodiment of the present invention.
  • the data clearing method shown in FIG. 2 may include the following steps:
  • the terminal device may be provided with a fingerprint recognition module and a touch panel, and the fingerprint recognition module is used to acquire the fingerprint image, and the touch panel is used to acquire the touch track.
  • the fingerprint identification module and the touchpad can be configured on the back of the terminal device, which is not limited in the embodiment of the present invention.
  • the terminal device when the terminal device is in the awake state, the user performs fingerprint input on the fingerprint identification module.
  • the terminal device monitors the finger contact of the user by using the fingerprint recognition module, obtains the fingerprint image of the user, and performs preliminary image processing such as noise reduction and binarization on the fingerprint image.
  • verifying whether the fingerprint image is consistent with the preset fingerprint image may be implemented by collecting a node and verifying the node.
  • the node refers to the coordinate position of the bifurcation, termination or circle of the fingerprint of the human body, and has a unique feature of height.
  • the user fingerprint image of the preliminary image processing is extracted and the node information is compared with the node information of the preset fingerprint image, and the degree of similarity between the two is calculated, and the obtained user fingerprint image and the preset fingerprint image can be obtained. Whether the result of the judgment is consistent.
  • the step of verifying the user fingerprint is used to identify the user identity, and after determining that the identity of the user is legal, the user's finger touch track is acquired to delete the user data in the terminal device.
  • a plurality of touch tracks can be set, and the range of user data deleted by each touch track is different.
  • the touch trajectory can be obtained by monitoring the sliding of the user's finger on the touchpad.
  • the fingerprint identification module may be used to acquire the fingerprint image of the user multiple times within a preset time, and the fingerprint image acquired multiple times is obtained to obtain a touch track.
  • a plurality of preset touch tracks are stored in the terminal device, and each The touch track corresponds to deleting different ranges of user data in the terminal device.
  • the terminal device may store three types of preset touch tracks, and the touch track 1 corresponds to deleting user data including: short messages, call records, address books, mails, photos, and videos; and the touch track 2 corresponds to deleting the above.
  • software such as Alipay, WeChat, QQ and Internet Banking, which may involve user property security, is also uninstalled; touch track 3 corresponds to clearing all user data in the terminal device. Then, the user can selectively delete different ranges of user data in the terminal device by inputting different touch trajectories included in the preset touch trajectory.
  • step 208 is performed.
  • the display screen of the terminal device cannot be displayed normally, the user cannot operate the terminal device by viewing the content displayed on the display screen, and then the fingerprint recognition module and the touchpad can be used to implement the clearing terminal device. The need for user data within.
  • the first prompt message may be displayed on the display screen before the user data in the terminal device is cleared.
  • the first prompt message is used to prompt the user whether to determine to clear user data in the terminal device.
  • the user data may be uploaded to the cloud for backup before the user data in the terminal device is cleared, so that the data needs to be used later. Therefore, before clearing the user data, the terminal device can display a second prompt message on the display screen to ask the user whether to back up the user data to the cloud.
  • an operation similar to the factory resetting may be performed first, so that not only the user may be stored in the terminal device during the process of using the terminal device. Data, you can also restore changes to system settings. After performing an operation similar to the factory reset, write the random data over the storage area multiple times to ensure that the deleted data cannot be recovered.
  • the user data in the terminal device is cleared by the touch track input by the user.
  • FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • the terminal device may include:
  • the fingerprint obtaining module 301 is configured to acquire a fingerprint image of the user.
  • the user when the terminal device is in the awake state, the user performs fingerprint input on the fingerprint obtaining module 301.
  • the fingerprint acquisition module 301 monitors the user's finger contact, obtains the fingerprint image of the user, and performs preliminary image processing such as noise reduction and binarization on the fingerprint image.
  • the fingerprint verification module 302 is configured to verify whether the fingerprint image is consistent with the preset fingerprint image.
  • verifying whether the fingerprint image is consistent with the preset fingerprint image may be implemented by collecting a node and verifying the node.
  • the node refers to the coordinate position of the bifurcation, termination or circle of the fingerprint of the human body, and has a unique feature of height.
  • the fingerprint verification module 302 extracts the node information of the user fingerprint image subjected to the preliminary image processing, and performs fuzzy comparison with the node information of the preset fingerprint image to calculate the degree of similarity between the two, thereby obtaining the obtained user fingerprint image and The result of judging whether the fingerprint image is consistent or not.
  • the trajectory obtaining module 303 is configured to acquire a finger touch trajectory of the user when the fingerprint image is consistent with the preset fingerprint image.
  • the step of verifying the fingerprint of the user is used to identify the identity of the user.
  • the trajectory obtaining module 303 acquires the touch track of the user's finger to delete the user data in the terminal device.
  • a plurality of touch tracks can be set, and the range of user data deleted by each touch track is different.
  • the track verification module 304 is configured to verify whether the touch track is consistent with the preset touch track.
  • the terminal device stores a plurality of preset touch trajectories, and each touch trajectory corresponds to deleting different ranges of user data in the terminal device.
  • the terminal device may store three types of preset touch tracks, and the touch track 1 corresponds to deleting user data including: short messages, call records, address books, mails, photos, and videos; and the touch track 2 corresponds to deleting the above.
  • software such as Alipay, WeChat, QQ and Internet Banking, which may involve user property security, is also uninstalled; touch track 3 corresponds to clearing all user data in the terminal device. The user can selectively delete different modes in the terminal device by inputting different touch tracks included in the preset touch track. User data around.
  • the data clearing module 305 is configured to clear user data in the terminal device when the touch track is consistent with the preset touch track.
  • the data clearing module 305 deletes the user data corresponding to the range of the touch track. For example, when all the user data in the terminal device is selected to be cleared, as an optional implementation manner, the data clearing module 305 may perform an operation similar to the factory reset, so that the user can not only use the terminal device. The data stored in the terminal device during the process can also restore changes to the system settings. After performing an operation similar to the factory reset, write the random data over the storage area multiple times to ensure that the deleted data cannot be recovered.
  • the terminal device described in FIG. 3 whether the user is a legitimate user is first identified by fingerprint identification. After the user passes the identity authentication, the user data in the terminal device is cleared by the touch track input by the user. By implementing the embodiments of the present invention, user data in the terminal device can be conveniently and optionally cleared.
  • FIG. 4 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
  • the terminal device shown in FIG. 4 is optimized by the terminal device shown in FIG. 3.
  • the data clearing unit 305 may include:
  • the display detection sub-module 3051 is configured to detect whether the display screen of the terminal device can be normally displayed.
  • the display screen of the terminal device cannot be displayed normally, the user cannot operate the terminal device by viewing the content displayed on the display screen, and then the fingerprint recognition module and the touchpad can be used to implement the clearing terminal device. The need for user data within.
  • the first prompt sub-module 3052 is configured to display the first prompt message when the display screen can be normally displayed.
  • the first prompting sub-module 3052 may display the first prompt message on the display screen.
  • the first prompt message is used to prompt the user whether to determine to clear user data in the terminal device.
  • the clearing sub-module 3053 is configured to clear user data in the terminal device when the display screen cannot be displayed normally.
  • an operation similar to the factory resetting operation may be performed first, so that the user can use the terminal device instead.
  • the data stored in the terminal device during the process can also restore changes to the system settings. After performing an operation similar to the factory reset, write the random data over the storage area multiple times to ensure that the deleted data cannot be recovered.
  • the terminal device shown in FIG. 4 may further include:
  • the second prompting module 306 is configured to display the second prompt message on the display screen before the user data in the terminal device is cleared when the display screen can be normally displayed.
  • the user data may be uploaded to the cloud for backup before the user data in the terminal device is cleared, so that the data needs to be used later. Therefore, before the user data is cleared, the second prompting module 306 can display a second prompt message on the display screen to ask the user whether the user data needs to be backed up to the cloud.
  • the storage module 307 is configured to store a preset fingerprint image and a preset touch track.
  • the preset touch track includes more than one type of touch track, and each touch track has different user data ranges for deletion.
  • a plurality of preset touch trajectories are stored in the terminal device, and each touch trajectory corresponds to deleting different ranges of user data. Therefore, the user can selectively delete the user data in the terminal device by inputting different touch trajectories.
  • FIG. 5 is a schematic structural diagram of still another terminal device according to an embodiment of the present invention.
  • the terminal device may include:
  • the terminal device shown in FIG. 5 includes, but is not limited to, various terminal devices such as a mobile phone, a mobile computer, a tablet computer, and a personal digital assistant (PDA).
  • PDA personal digital assistant
  • the input device 501 is configured to implement interaction between the user and the terminal device and/or information input into the terminal device.
  • the input device 501 can be a touchpad and a fingerprint recognition device that collects operational actions on which the user touches or approaches.
  • the user uses an action of any suitable object or accessory such as a finger or a stylus on the touch panel or near the touchpad, and drives the corresponding connecting device according to a preset program.
  • the touchpad can include touch detection devices and touch Touch the two parts of the controller.
  • the touch detection device detects a touch operation of the user, converts the detected touch operation into an electrical signal, and transmits the electrical signal to the touch controller; the touch controller receives the electrical signal from the touch detection device and converts it into The contact coordinates are sent to the processor 502.
  • the touch controller can also receive commands from the processor 502 and execute them.
  • touch panels can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the fingerprint identification device can identify the fingerprint image of the user and compare it with the pre-stored fingerprint image to verify whether the user is a legitimate user.
  • the processor 502 is a control center of the terminal device that connects various portions of the entire terminal device using various interfaces and lines, by running or executing program codes and/or modules stored in the memory 505, and recalling data stored in the memory 505. To perform various functions of the terminal device and/or process data.
  • the processor may be composed of an integrated circuit (IC), for example, may be composed of a single packaged IC, or may be composed of a plurality of packaged ICs that have the same function or different functions.
  • the processor 502 may include only a central processing unit (CPU), or may be a CPU, a digital signal processor (DSP), or a graphics processing unit (GPU). And a combination of control chips (eg, baseband chips) in the communication unit.
  • the CPU may be a single operation core, and may also include multiple operation cores.
  • the output device 503 can include, but is not limited to, an image output unit, a sound output, and a tactile output unit.
  • the image output unit is used to output text, pictures, and/or video.
  • the image output unit may include a display panel, such as a display configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or a field emission display (FED). panel.
  • the image output unit may comprise a reflective display, such as an electrophoretic display, or a display utilizing an Interferometric Modulation of Light.
  • the image output unit may comprise a single display or multiple displays of different sizes.
  • the communication circuit 504 is used to establish a communication link.
  • the communication circuit 504 can be used to upload user data in the terminal device to the cloud for storage by using a local area network, a wireless cellular network, or the like.
  • the communication circuit 504 may include a Wireless Local Area Network (Wireless Local Area Network) module, a Bluetooth module, and Near Field Communication (referred to as Near Field Communication).
  • NFC Wireless Local Area Network
  • baseband module and other wireless communication modules and wired communication modules such as Ethernet, Universal Serial Bus (USB), Lightning interface (Lightning, currently used by Apple for iPhone6/6s, etc.).
  • the memory 505 can be used to store program code and modules, and the processor 502 executes various functional applications of the terminal and implements data processing by running program code and modules stored in the memory 505.
  • the memory 505 mainly includes a program storage area and a data storage area, wherein the program storage area can store an operating system, program code required for at least one function, such as program code for repeatedly writing random data to completely clear the storage area of the terminal device.
  • the data storage area can store data (such as audio data, phone book, etc.) created according to the use of the terminal device.
  • the memory 505 may include a volatile memory, such as a nonvolatile volatile random access memory (NVRAM), a phase change random access memory (PRAM), or a phase change random access memory (PRAM).
  • NVRAM nonvolatile volatile random access memory
  • PRAM phase change random access memory
  • PRAM phase change random access memory
  • a magnetoresistive random access memory (MRAM) may also include a non-volatile memory, such as at least one disk storage device, and an electrically erasable programmable read-only memory (EEPROM). ), flash memory devices, such as NOR flash memory or NAND flash memory.
  • EEPROM electrically erasable programmable read-only memory
  • flash memory devices such as NOR flash memory or NAND flash memory.
  • the non-volatile memory stores the operating system and program code executed by the processor.
  • the processor loads the running program and data from the non-volatile memory into the memory and stores the digital content in a large number of storage devices.
  • the operating system includes controls and management of general system tasks such as memory management, storage device control, power management, etc., as well as various components and/or drivers that facilitate communication between various hardware and software.
  • the operating system may be an Android system of Google Inc., an iOS system developed by Apple Inc., or a Windows operating system developed by Microsoft Corporation, or an embedded operating system such as Vxworks.
  • Power source 506 is used to power different components of the terminal device to maintain its operation.
  • the power source 506 can be a built-in battery, such as a conventional lithium ion battery, a nickel metal hydride battery, etc., and an external power source that directly supplies power to the terminal device, such as an AC adapter.
  • the power supply 506 can also be more widely defined, for example, can also include a power management system, a charging system, a power failure detection circuit, a power converter or an inverter, and a power status indicator (eg, Light-emitting diodes), as well as any other components associated with the generation, management and distribution of electrical energy of the mobile terminal.
  • the processor 502 can call a program stored in the memory 505. Code to do the following:
  • the fingerprint image is consistent with the preset fingerprint image, acquiring a finger touch trajectory input by the user on the input device 501;
  • the delete user data code stored in the memory 505 is called to clear the user data in the terminal device.
  • the processor 502 calls the program code stored in the memory 505, and is also used to perform the following operations:
  • the first prompt message and the second prompt message are displayed by using the output device 503, wherein the first prompt message is used to query the user whether to delete the user data in the terminal device, and the second prompt message is used to query whether the user needs to upload the user data to Backup in the cloud.
  • the processor 502 can invoke the communication circuit 504 to upload user data in the terminal device to the cloud for storage.
  • a plurality of preset touch trajectories are stored in the terminal device, and each touch trajectory corresponds to deleting different ranges of user data. Therefore, the user can selectively delete the user data in the terminal device by inputting different touch trajectories.
  • each unit included is only divided according to functional logic, but is not limited to the foregoing division, as long as the corresponding functions can be implemented;
  • the specific names are also for convenience of distinguishing from each other and are not intended to limit the scope of the present invention.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • PROM Programmable Read-Only Memory
  • EPROM Erasable Programmable Memory
  • OTPROM One-Time Programmable Read-Only Memory
  • EEPROM Electronically-Erasable Programmable Read-Only Memory
  • CD-ROM Read Only Compact Disc Read-Only Memory
  • CD-ROM Compact Disc Read-Only Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Image Input (AREA)

Abstract

一种数据清除方法与终端设备,所述方法包括:获取用户的指纹图像(101);验证上述指纹图像与预设指纹图像是否一致(102);若该指纹图像与预设指纹图像一致,获取用户的手指触摸轨迹(103);验证上述触摸轨迹与预设触摸轨迹是否一致(104);若该触摸轨迹与预设触摸轨迹一致,则清除终端设备内的用户数据(105)。所述方法可以快速、方便地清除终端设备内的用户数据,进而保护用户隐私安全。

Description

一种数据清除方法与终端设备
本申请要求于2016年04月29日提交中国专利局,申请号为201610281680.8、发明名称为“一种数据清除方法与终端设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域,尤其涉及一种数据清除方法与终端设备。
背景技术
随着智能手机、平板电脑、笔记本电脑等终端设备的更新换代越来越快,人们也愈加频繁地更换性能更好的新设备,旧的设备往往被废弃或者通过二手交易卖给他人。在旧的终端设备中,存储有用户的联系人信息、短信、照片和视频等个人信息,因此在废弃或二手交易前,需要彻底清除旧终端设备中的用户数据,以免用户数据被泄露。清除用户数据的方法有用户手动删除和恢复出厂设置等,存在操作繁琐或数据清除范围不可控等问题。因此,如何方便、可选地清除终端设备中的数据,成为一个亟待解决的问题。
除此以外,当用户的终端设备屏幕损坏,无法进行正常显示时,将终端设备送去维修或废弃前,用户无法通过手动删除或恢复出厂设置来清除终端设备中的数据。因此,如何在这样的情况下清除终端设备中的数据,也是一个需要解决的问题。
发明内容
本发明实施例提供了一种数据清除方法与终端设备,用于方便、可选地清除终端设备中的数据。
本发明实施例第一方面公开了一种数据清除方法,包括:
获取用户的指纹图像;
验证所述指纹图像与预设指纹图像是否一致;
若所述指纹图像与预设指纹图像一致,获取用户的手指触摸轨迹;
验证所述触摸轨迹与预设触摸轨迹是否一致;
若所述触摸轨迹与预设触摸轨迹一致,则清除终端设备内的用户数据。
作为一种可选的实施方式,所述清除终端设备内的用户数据,包括:
检测所述终端设备的显示屏是否可以正常显示;
若所述显示屏不能正常显示,则清除所述终端设备内的用户数据;若所述显示屏能正常显示,则使所述显示屏显示第一提示消息;其中,所述第一提示消息用于提示用户是否确定清除所述终端设备内的用户数据。
作为一种可选的实施方式,所述方法还包括:
若所述显示屏可以正常显示,则清除所述终端设备内的用户数据之前,使所述显示屏显示第二提示消息,用以询问用户是否需要将所述用户数据备份至云端。
作为一种可选的实施方式,所述获取用户的指纹图像,包括:
监测用户手指在指纹识别模块上的按压以获取指纹图像;
所述获取用户的手指触摸轨迹,包括:
监测用户手指在触摸板上的滑动以获取触摸轨迹;
或者,在预设时间内多次获取用户的指纹图像,统计所述多次获取的指纹图像以获得触摸轨迹。
作为一种可选的实施方式,所述预设触摸轨迹包括多于一种触摸轨迹,每种触摸轨迹用于删除的用户数据范围不同。
本发明实施例第二方面公开了一种终端设备,包括:
指纹获取模块,用于获取用户的指纹图像;
指纹验证模块,用于验证所述指纹图像与预设指纹图像是否一致;
轨迹获取模块,用于当所述指纹图像与预设指纹图像一致时,获取用户的手指触摸轨迹;
轨迹验证模块,用于验证所述触摸轨迹与预设触摸轨迹是否一致;
数据清除模块,用于当所述触摸轨迹与预设触摸轨迹一致时,清除终端设备内的用户数据。
作为一种可选的实施方式,所述数据清除模块,包括:
显示屏检测子模块,用于检测所述终端设备的显示屏是否可以正常显示;
清除子模块,用于当所述显示屏不能正常显示时,清除所述终端设备内的用户数据;
第一提示子模块,用于当所述显示屏能正常显示时,使所述显示屏显示第一提示消息;其中,所述第一提示消息用于提示用户是否确定清除所述终端设备内的用户数据。
作为一种可选的实施方式,所述终端设备还包括:
第二提示模块,用于当所述显示屏可以正常显示时,清除所述终端设备内的用户数据之前,使所述显示屏显示第二提示消息,用以询问用户是否需要将所述用户数据备份至云端。
作为一种可选的实施方式,所述指纹获取模块,具体用于监测用户手指在指纹识别模块上的按压以获取指纹图像;
所述轨迹获取模块,具体用于监测用户手指在触摸板上的滑动以获取触摸轨迹;或者,
具体用于在预设时间内多次获取用户的指纹图像,统计所述多次获取的指纹图像以获得触摸轨迹。
作为一种可选的实施方式,所述终端设备还包括:
存储模块,用于存储预设指纹图像与预设触摸轨迹;其中,所述预设触摸轨迹包括多于一种触摸轨迹,每种触摸轨迹用于删除的用户数据范围不同。
从以上技术方案可以看出,本发明实施例具有以下优点:
本发明实施例中,获取用户的指纹图像;验证所述指纹图像与预设指纹图像是否一致;若所述指纹图像与预设指纹图像一致,获取用户的手指触摸轨迹;验证所述触摸轨迹与预设触摸轨迹是否一致;若所述触摸轨迹与预设触摸轨迹一致,则清除终端设备内的用户数据。由此可见,实施本发明实施例,可以方便快速地清除终端设备内的用户数据,从而避免用户的个人信息被泄露。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提 下,还可以根据这些附图获得其他的附图。
图1为本发明实施例公开的一种数据清除方法的流程示意图;
图2为本发明实施实例公开的另一种数据清除方法的流程示意图;
图3为本发明实施例公开的一种终端设备的结构示意图;
图4为本发明实施例公开的另一种终端设备的结构示意图;
图5为本发明实施例公开的又一种终端设备的结构示意图。
具体实施方式
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部份实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
本发明实施例提供了一种数据清除方法与终端设备,可以方便快速地清除终端设备内的用户数据,从而避免用户的个人信息被泄露。以下分别进行详细说明。
请参阅图1,图1是本发明实施例公开的一种数据清除方法的流程示意图。其中,图1所示的数据清除方法可以包括以下步骤:
101、获取用户的指纹图像。
本发明实施例中,终端设备可以是各种可存储数据的终端设备,如智能手机、数码相机、智能可穿戴设备、个人数字助理(Personal Digital Assistant,PDA)、销售终端(Point of Sales,POS)等,本发明实施例后续不作复述。
本发明实施例中,终端设备中预先设有指纹采集装置,如指纹识别模块、指纹触摸板等,同时,该装置可配置在终端设备的正面或背面,对于采用的指纹采集装置,以及装置的位置,本发明实施例不作限定。
作为一种可选的实施方式,当终端设备处于唤醒状态时,用户在上述指纹触摸板上进行指纹输入。终端设备利用指纹触摸板监测用户的手指接触,获得用户的指纹图像,并对指纹图像进行降噪、二值化等初步的图像处理。
102、验证上述指纹图像与预设指纹图像是否一致。
作为一种可选的实施方式,验证上述指纹图像与预设指纹图像是否一致, 可通过采集节点并验证节点来实现。节点指人体指纹纹路的分叉、终止或打圈处的坐标位置,具有高度的唯一性特征。将进行过初步图像处理的用户指纹图像提取节点信息,并与预设指纹图像的节点信息进行模糊比较,计算出两者间的相似程度,便能得出获取的用户指纹图像与预设指纹图像是否一致的判断结果。
103、若指纹图像与预设指纹图像一致,获取用户的手指触摸轨迹。
本发明实施例中,上述验证用户指纹的步骤用于鉴定用户身份,在确定用户的身份为合法后,再获取用户的手指触摸轨迹用以删除终端设备内的用户数据。其中,可以设置多种触摸轨迹,每种触摸轨迹删除的用户数据的范围不同。
104、验证上述触摸轨迹与预设触摸轨迹是否一致。
作为一种可选的实施方式,终端设备中存储有多种预设的触摸轨迹,每种触摸轨迹对应于删除终端设备中不同范围的用户数据。举例来说,终端设备中可以存储3种预设触摸轨迹,触摸轨迹1对应于删除包括:短信、通话记录、通讯录、邮件、照片以及视频等用户数据;触摸轨迹2对应于,除了删除上述内容外,还卸载支付宝、微信、QQ和网络银行等可能涉及用户财产安全的软件;触摸轨迹3则对应于清除终端设备中所有用户数据。则用户通过输入包含在预设触摸轨迹中的、不同的触摸轨迹,可以有选择地删除终端设备中不同范围的用户数据。
105、若触摸轨迹与预设触摸轨迹一致,则清除终端设备内的用户数据。
本发明实施例中,若用户输入的触摸轨迹与预设的触摸轨迹一致,则删除对应于该触摸轨迹的范围的用户数据。举例来说,当选择清除终端设备中所有的用户数据时,作为一种可选的实施方式,可先执行类似于恢复出厂设置的操作,这样不但可以清除用户在使用终端设备的过程中存储在终端设备中的数据,还可以还原对于系统设置的更改。在执行类似于恢复出厂设置的操作后,再多次写入随机数据覆盖存储区域,确保被删除的数据无法被恢复。
在图1所描述的方法中,先通过指纹识别鉴定用户是否为合法用户,当用户通过身份鉴定后,再通过用户输入的触摸轨迹确定需要清除的用户数据的范围。当用户的终端设备里有隐私信息和财产信息等高危个人信息时,可以选择清除终端设备内的所有数据,该方法通过多次写入随机数据的方法,可以彻底 清除终端设备中存储的数据,防止数据被恢复。因此,实施本发明实施例,可以方便、可选地清除终端设备中的用户数据,并能够在需要的情况下,彻底清除用户数据,消除了数据被恢复的风险,从而保护用户的个人信息安全。
请参阅图2,图2是本发明实施例公开的另一种数据清除方法的流程示意图。其中,图2所示的数据清除方法可以包括以下步骤:
201、监测用户手指在指纹识别模块上的按压以获取指纹图像。
本发明实施例中,终端设备可以设有指纹识别模块和触摸板,利用指纹识别模块获取指纹图像,利用触摸板获取触摸轨迹。其中,指纹识别模块和触摸板可配置在终端设备的背面,本发明实施例不作限定。
作为一种可选的实施方式,当终端设备处于唤醒状态时,用户在上述指纹识别模块上进行指纹输入。终端设备利用指纹识别模块监测用户的手指接触,获得用户的指纹图像,并对指纹图像进行降噪、二值化等初步的图像处理。
202、验证上述指纹图像与预设指纹图像是否一致。
作为一种可选的实施方式,验证上述指纹图像与预设指纹图像是否一致,可通过采集节点并验证节点来实现。节点指人体指纹纹路的分叉、终止或打圈处的坐标位置,具有高度的唯一性特征。将进行过初步图像处理的用户指纹图像提取节点信息,并与预设指纹图像的节点信息进行模糊比较,计算出两者间的相似程度,便能得出获取的用户指纹图像与预设指纹图像是否一致的判断结果。
203、若指纹图像与预设指纹图像一致,监测用户手指在触摸板上的滑动以获取触摸轨迹。
本发明实施例中,上述验证用户指纹的步骤用于鉴定用户身份,在确定用户的身份为合法后,再获取用户的手指触摸轨迹用以删除终端设备内的用户数据。其中,可以设置多种触摸轨迹,每种触摸轨迹删除的用户数据的范围不同。
作为一种可选的实施方式,可通过监测用户手指在触摸板上的滑动以获取触摸轨迹。除此之外,也可以利用指纹识别模块,在预设时间内多次获取用户的指纹图像,统计多次获取的指纹图像以获得触摸轨迹。
204、验证上述触摸轨迹与预设触摸轨迹是否一致。
作为一种可选的实施方式,终端设备中存储有多种预设的触摸轨迹,每种 触摸轨迹对应于删除终端设备中不同范围的用户数据。举例来说,终端设备中可以存储3种预设触摸轨迹,触摸轨迹1对应于删除包括:短信、通话记录、通讯录、邮件、照片以及视频等用户数据;触摸轨迹2对应于,除了删除上述内容外,还卸载支付宝、微信、QQ和网络银行等可能涉及用户财产安全的软件;触摸轨迹3则对应于清除终端设备中所有用户数据。则用户通过输入包含在预设触摸轨迹中的、不同的触摸轨迹,可以有选择地删除终端设备中不同范围的用户数据。
205、若触摸轨迹与预设触摸轨迹一致,检测该终端设备的显示屏是否可以正常显示,若显示屏能正常显示,则执行步骤206和207;若显示屏不能正常显示,则执行步骤208。
本发明实施例中,当终端设备的显示屏无法正常显示时,用户无法通过查看显示屏上显示的内容来对终端设备进行操作,这时便可以利用指纹识别模块和触摸板来实现清除终端设备内的用户数据的需求。
206、使显示屏显示第一提示消息。
本发明实施例中,在清除终端设备中的用户数据以前,可以在显示屏上显示第一提示消息。其中,第一提示消息用于提示用户是否确定清除终端设备内的用户数据。
207、使显示屏显示第二提示消息。
本发明实施例中,可在清除终端设备中的用户数据以前,可以将用户数据上传至云端进行备份,以备以后有需要用到这部分数据的需求。因此,在清除用户数据以前,终端设备可以在显示屏显示第二提示消息,用以询问用户是否需要将用户数据备份至云端。
208、清除终端设备内的用户数据。
当选择清除终端设备中所有的用户数据时,作为一种可选的实施方式,可先执行类似于恢复出厂设置的操作,这样不但可以清除用户在使用终端设备的过程中存储在终端设备中的数据,还可以还原对于系统设置的更改。在执行类似于恢复出厂设置的操作后,再多次写入随机数据覆盖存储区域,确保被删除的数据无法被恢复。
在图2所描述的方法中,先通过指纹识别鉴定用户是否为合法用户,当用 户通过身份鉴定后,再通过用户输入的触摸轨迹清除终端设备中的用户数据。通过实施本发明实施例,可以方便、可选地清除终端设备中的用户数据。
请参阅图3,图3是本发明实施例公开的一种终端设备的结构示意图。如图3所示,该终端设备可以包括:
指纹获取模块301,用于获取用户的指纹图像。
作为一种可选的实施方式,当终端设备处于唤醒状态时,用户在指纹获取模块301上进行指纹输入。指纹获取模块301监测用户的手指接触,获得用户的指纹图像,并对指纹图像进行降噪、二值化等初步的图像处理。
指纹验证模块302,用于验证上述指纹图像与预设指纹图像是否一致。
作为一种可选的实施方式,验证上述指纹图像与预设指纹图像是否一致,可通过采集节点并验证节点来实现。节点指人体指纹纹路的分叉、终止或打圈处的坐标位置,具有高度的唯一性特征。指纹验证模块302将进行过初步图像处理的用户指纹图像提取节点信息,并与预设指纹图像的节点信息进行模糊比较,计算出两者间的相似程度,便能得出获取的用户指纹图像与预设指纹图像是否一致的判断结果。
轨迹获取模块303,用于当指纹图像与预设指纹图像一致时,获取用户的手指触摸轨迹。
本发明实施例中,上述验证用户指纹的步骤用于鉴定用户身份,在确定用户的身份为合法后,轨迹获取模块303再获取用户的手指触摸轨迹用以删除终端设备内的用户数据。其中,可以设置多种触摸轨迹,每种触摸轨迹删除的用户数据的范围不同。
轨迹验证模块304,用于验证上述触摸轨迹与预设触摸轨迹是否一致。
作为一种可选的实施方式,终端设备中存储有多种预设的触摸轨迹,每种触摸轨迹对应于删除终端设备中不同范围的用户数据。举例来说,终端设备中可以存储3种预设触摸轨迹,触摸轨迹1对应于删除包括:短信、通话记录、通讯录、邮件、照片以及视频等用户数据;触摸轨迹2对应于,除了删除上述内容外,还卸载支付宝、微信、QQ和网络银行等可能涉及用户财产安全的软件;触摸轨迹3则对应于清除终端设备中所有用户数据。则用户通过输入包含在预设触摸轨迹中的、不同的触摸轨迹,可以有选择地删除终端设备中不同范 围的用户数据。
数据清除模块305,用于当触摸轨迹与预设触摸轨迹一致时,清除终端设备内的用户数据。
本发明实施例中,若用户输入的触摸轨迹与预设的触摸轨迹一致,则数据清除模块305删除对应于该触摸轨迹的范围的用户数据。举例来说,当选择清除终端设备中所有的用户数据时,作为一种可选的实施方式,数据清除模块305可先执行类似于恢复出厂设置的操作,这样不但可以清除用户在使用终端设备的过程中存储在终端设备中的数据,还可以还原对于系统设置的更改。在执行类似于恢复出厂设置的操作后,再多次写入随机数据覆盖存储区域,确保被删除的数据无法被恢复。
在图3所描述的终端设备中,先通过指纹识别鉴定用户是否为合法用户,当用户通过身份鉴定后,再通过用户输入的触摸轨迹清除终端设备中的用户数据。通过实施本发明实施例,可以方便、可选地清除终端设备中的用户数据。
请参阅图4,图4是本发明实施例公开的另一种终端设备的结构示意图。其中,图4所示的终端设备是由图3所示的终端设备进行优化得到的,与图3所示的终端设备相比,数据清除单元305可以包括:
显示屏检测子模块3051,用于检测终端设备的显示屏是否可以正常显示。
本发明实施例中,当终端设备的显示屏无法正常显示时,用户无法通过查看显示屏上显示的内容来对终端设备进行操作,这时便可以利用指纹识别模块和触摸板来实现清除终端设备内的用户数据的需求。
第一提示子模块3052,用于当显示屏能正常显示时,使显示屏显示第一提示消息。
本发明实施例中,在清除终端设备中的用户数据以前,第一提示子模块3052可以在显示屏上显示第一提示消息。其中,第一提示消息用于提示用户是否确定清除终端设备内的用户数据。
清除子模块3053,用于当显示屏不能正常显示时,清除终端设备内的用户数据。
当选择清除终端设备中所有的用户数据时,作为一种可选的实施方式,可先执行类似于恢复出厂设置的操作,这样不但可以清除用户在使用终端设备的 过程中存储在终端设备中的数据,还可以还原对于系统设置的更改。在执行类似于恢复出厂设置的操作后,再多次写入随机数据覆盖存储区域,确保被删除的数据无法被恢复。
可选地,图4所示的终端设备还可以包括:
第二提示模块306,用于当显示屏可以正常显示时,清除终端设备内的用户数据之前,使显示屏显示第二提示消息。
本发明实施例中,可在清除终端设备中的用户数据以前,可以将用户数据上传至云端进行备份,以备以后有需要用到这部分数据的需求。因此,在清除用户数据以前,第二提示模块306可以在显示屏显示第二提示消息,用以询问用户是否需要将用户数据备份至云端。
存储模块307,用于存储预设指纹图像与预设触摸轨迹;其中,预设触摸轨迹包括多于一种触摸轨迹,每种触摸轨迹用于删除的用户数据范围不同。
根据图4所描述的终端设备,终端设备内存储有多种预设的触摸轨迹,每种触摸轨迹对应于删除不同范围的用户数据。因此,用户通过输入不同的触摸轨迹,可以有选择地删除终端设备内的用户数据。
请参阅图5,图5是本发明实施例公开的又一种终端设备的结构示意图。如图5所示,该终端设备可以包括:
输入装置501、处理器502、输出装置503、通信电路504、存储器505和电源506等组件。这些组件通过一条或多条总线进行通信。本领域技术人员可以理解,图5所示的终端的结构并不构成对本发明的限定,它既可以是总线形结构,也可以是星型结构,还可以包括比图5所示的结构更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本发明实施方式中,图5所示的终端设备包括但不限于移动电话、移动电脑、平板电脑、个人数字助理(Personal Digital Assistant,PDA)等各种终端设备。
输入装置501用于实现用户与终端设备的交互和/或信息输入到终端设备中。在本发明具体实施方式中,输入装置501可以是触摸板和指纹识别装置,触摸板可收集用户在其上触摸或接近的操作动作。比如用户使用手指、触笔等任何适合的物体或附件在触摸板上或接近触摸板的位置的操作动作,并根据预先设定的程式驱动相应的连接装置。可选的,触摸板可包括触摸检测装置和触 摸控制器两个部分。其中,触摸检测装置检测用户的触摸操作,并将检测到的触摸操作转换为电信号,以及将电信号传送给触摸控制器;触摸控制器从触摸检测装置上接收电信号,并将它转换成触点坐标,再送给处理器502。触摸控制器还可以接收处理器502发来的命令并执行。此外,可以采用电阻式、电容式、红外线(Infrared)以及表面声波等多种类型实现触摸板。指纹识别装置可以识别用户的指纹图像,与预先存储的指纹图像进行对比,验证用户是否为合法用户
处理器502为终端设备的控制中心,利用各种接口和线路连接整个终端设备的各个部分,通过运行或执行存储在存储器505内的程序代码和/或模块,以及调用存储在存储器505内的数据,以执行终端设备的各种功能和/或处理数据。处理器可以由集成电路(Integrated Circuit,简称IC)组成,例如可以由单颗封装的IC所组成,也可以由连接多颗相同功能或不同功能的封装IC而组成。举例来说,处理器502可以仅包括中央处理器(Central ProcessingUnit,简称CPU),也可以是CPU、数字信号处理器(digital signal processor,简称DSP)、图形处理器(Graphic Processing Unit,简称GPU)及通信单元中的控制芯片(例如基带芯片)的组合。在本发明实施方式中,CPU可以是单运算核心,也可以包括多运算核心。
输出装置503可以包括但不限于影像输出单元、声音输出和触感输出单元。影像输出单元用于输出文字、图片和/或视频。影像输出单元可包括显示面板,例如采用LCD(Liquid Crystal Display,液晶显示器)、OLED(Organic Light-Emitting Diode,有机发光二极管)、场发射显示器(field emission display,简称FED)等形式来配置的显示面板。或者影像输出单元可以包括反射式显示器,例如电泳式(electrophoretic)显示器,或利用光干涉调变技术(Interferometric Modulation of Light)的显示器。影像输出单元可以包括单个显示器或不同尺寸的多个显示器。
通信电路504用于建立通信链接,本发明实施例中,通信电路504可用于利用局域网、无线蜂窝网络等,将终端设备内的用户数据上传至云端进行保存。通信电路504可以包括无线局域网(Wireless Local Area Network,简称wireless LAN)模块、蓝牙模块、近距离无线通信(Near Field Communication,简称 NFC)、基带(Base Band)模块等无线通信模块和以太网、通用串行总线(Universal Serial Bus,简称USB)、闪电接口(Lightning,目前Apple用于iPhone6/6s等设备)等有线通信模块。
存储器505可用于存储程序代码以及模块,处理器502通过运行存储在存储器505的程序代码以及模块,从而执行终端的各种功能应用以及实现数据处理。存储器505主要包括程序存储区和数据存储区,其中,程序存储区可存储操作系统、至少一个功能所需的程序代码,比如用于多次写入随机数据从而彻底清空终端设备存储区域的程序代码;数据存储区可存储根据终端设备的使用所创建的数据(比如音频数据、电话本等)等。在本发明具体实施方式中,存储器505可以包括易失性存储器,例如非挥发性动态随机存取内存(Nonvolatile RandomAccess Memory,简称NVRAM)、相变化随机存取内存(Phase Change RAM,简称PRAM)、磁阻式随机存取内存(Magetoresistive RAM,简称MRAM)等,还可以包括非易失性存储器,例如至少一个磁盘存储器件、电子可抹除可规划只读存储器(Electrically Erasable ProgrammableRead-OnlyMemory,简称EEPROM)、闪存器件,例如反或闪存(NOR flash memory)或是反及闪存(NAND flash memory)。非易失存储器储存处理器所执行的操作系统及程序代码。处理器从非易失存储器加载运行程序与数据到内存并将数字内容储存于大量储存装置中。操作系统包括用于控制和管理常规系统任务,例如内存管理、存储设备控制、电源管理等,以及有助于各种软硬件之间通信的各种组件和/或驱动器。在本发明实施方式中,操作系统可以是Google公司的Android系统、Apple公司开发的iOS系统或Microsoft公司开发的Windows操作系统等,或者是Vxworks这类的嵌入式操作系统。
电源506用于给终端设备的不同部件进行供电以维持其运行。作为一般性理解,电源506可以是内置的电池,例如常见的锂离子电池、镍氢电池等,也包括直接向终端设备供电的外接电源,例如AC适配器等。在本发明的一些实施方式中,电源506还可以作更为广泛的定义,例如还可以包括电源管理系统、充电系统、电源故障检测电路、电源转换器或逆变器、电源状态指示器(如发光二极管),以及与移动终端的电能生成、管理及分布相关联的其他任何组件。
在图5所示的终端设备中,处理器502可以调用存储器505中存储的程序 代码,用于执行以下操作:
获取用户在输入装置501上输入的指纹图像;
与存储在存储器505中的预设指纹图像进行对比,验证指纹图像与预设指纹图像是否一致;
若指纹图像与预设指纹图像一致,获取用户在输入装置501上输入的手指触摸轨迹;
与存储在存储器505中的预设触摸轨迹进行对比,验证触摸轨迹与预设触摸轨迹是否一致;
若触摸轨迹与预设触摸轨迹一致,则调用存储在存储器505中的删除用户数据代码,清除终端设备内的用户数据。
作为一种可选的实施方式,处理器502调用存储器505中存储的程序代码,还用于执行以下操作:
利用输出装置503显示第一提示消息和第二提示消息;其中,第一提示消息用于询问用户是否确定删除终端设备中的用户数据,第二提示消息用于询问用户是否需要将用户数据上传至云端进行备份。
作为一种可选的实施方式,处理器502可以调用通信电路504,将终端设备中的用户数据上传至云端进行保存。
根据图5所描述的终端设备,终端设备内存储有多种预设的触摸轨迹,每种触摸轨迹对应于删除不同范围的用户数据。因此,用户通过输入不同的触摸轨迹,可以有选择地删除终端设备内的用户数据。
值得注意的是,上述用户设备和基站实施例中,所包括的各个单元只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。
另外,本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质包括只读存储器(Read-Only Memory,ROM)、随机存储器(Random Access Memory,RAM)、可编程只读存储器(Programmable Read-only Memory,PROM)、可擦除可编程只读存储器(Erasable Programmable  Read Only Memory,EPROM)、一次可编程只读存储器(One-time Programmable Read-Only Memory,OTPROM)、电子抹除式可复写只读存储器(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储器、磁盘存储器、磁带存储器、或者能够用于携带或存储数据的计算机可读的任何其他介质。
以上仅为本发明较佳的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明实施例揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应该以权利要求的保护范围为准。

Claims (10)

  1. 一种数据清除方法,其特征在于,包括:
    获取用户的指纹图像;
    验证所述指纹图像与预设指纹图像是否一致;
    若所述指纹图像与预设指纹图像一致,获取用户的手指触摸轨迹;
    验证所述触摸轨迹与预设触摸轨迹是否一致;
    若所述触摸轨迹与预设触摸轨迹一致,则清除终端设备内的用户数据。
  2. 根据权利要求1所述方法,其特征在于,所述清除终端设备内的用户数据,包括:
    检测所述终端设备的显示屏是否可以正常显示;
    若所述显示屏不能正常显示,则清除所述终端设备内的用户数据;若所述显示屏能正常显示,则使所述显示屏显示第一提示消息;其中,所述第一提示消息用于提示用户是否确定清除所述终端设备内的用户数据。
  3. 根据权利要求2所述方法,其特征在于,所述方法还包括:
    若所述显示屏可以正常显示,则清除所述终端设备内的用户数据之前,使所述显示屏显示第二提示消息,用以询问用户是否需要将所述用户数据备份至云端。
  4. 根据权利要求3所述方法,其特征在于,所述获取用户的指纹图像,包括:
    监测用户手指在指纹识别模块上的按压以获取指纹图像;
    所述获取用户的手指触摸轨迹,包括:
    监测用户手指在触摸板上的滑动以获取触摸轨迹;
    或者,在预设时间内多次获取用户的指纹图像,统计所述多次获取的指纹图像以获得触摸轨迹。
  5. 根据权利要求1~4中任意一项所述方法,其特征在于,
    所述预设触摸轨迹包括多于一种触摸轨迹,每种触摸轨迹用于删除的用户数据范围不同。
  6. 一种终端设备,其特征在于,包括:
    指纹获取模块,用于获取用户的指纹图像;
    指纹验证模块,用于验证所述指纹图像与预设指纹图像是否一致;
    轨迹获取模块,用于当所述指纹图像与预设指纹图像一致时,获取用户的手指触摸轨迹;
    轨迹验证模块,用于验证所述触摸轨迹与预设触摸轨迹是否一致;
    数据清除模块,用于当所述触摸轨迹与预设触摸轨迹一致时,清除终端设备内的用户数据。
  7. 根据权利要求6所述的终端设备,其特征在于,所述数据清除模块,包括:
    显示屏检测子模块,用于检测所述终端设备的显示屏是否可以正常显示;
    清除子模块,用于当所述显示屏不能正常显示时,清除所述终端设备内的用户数据;
    第一提示子模块,用于当所述显示屏能正常显示时,使所述显示屏显示第一提示消息;其中,所述第一提示消息用于提示用户是否确定清除所述终端设备内的用户数据。
  8. 根据权利要求7所述的终端设备,其特征在于,所述终端设备还包括:
    第二提示模块,用于当所述显示屏可以正常显示时,清除所述终端设备内的用户数据之前,使所述显示屏显示第二提示消息,用以询问用户是否需要将所述用户数据备份至云端。
  9. 根据权利要求8所述的终端设备,其特征在于,
    所述指纹获取模块,具体用于监测用户手指在指纹识别模块上的按压以获取指纹图像;
    所述轨迹获取模块,具体用于监测用户手指在触摸板上的滑动以获取触摸轨迹;或者,
    具体用于在预设时间内多次获取用户的指纹图像,统计所述多次获取的指纹图像以获得触摸轨迹。
  10. 根据权利要求6~9中任意一项所述的终端设备,其特征在于,所述终端设备还包括:
    存储模块,用于存储预设指纹图像与预设触摸轨迹;其中,所述预设触摸轨迹包括多于一种触摸轨迹,每种触摸轨迹用于删除的用户数据范围不同。
PCT/CN2016/084092 2016-04-29 2016-05-31 一种数据清除方法与终端设备 WO2017185464A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610281680.8A CN105956442A (zh) 2016-04-29 2016-04-29 一种数据清除方法与终端设备
CN201610281680.8 2016-04-29

Publications (1)

Publication Number Publication Date
WO2017185464A1 true WO2017185464A1 (zh) 2017-11-02

Family

ID=56913309

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/084092 WO2017185464A1 (zh) 2016-04-29 2016-05-31 一种数据清除方法与终端设备

Country Status (2)

Country Link
CN (1) CN105956442A (zh)
WO (1) WO2017185464A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106502537B (zh) * 2016-10-31 2019-08-23 珠海格力电器股份有限公司 一种指纹控制方法及系统
CN107045604A (zh) * 2017-02-22 2017-08-15 北京小米移动软件有限公司 信息处理方法及装置
CN109117645A (zh) * 2017-06-26 2019-01-01 深圳回收宝科技有限公司 数据清除方法及其装置
CN109756886A (zh) * 2017-11-08 2019-05-14 中兴通讯股份有限公司 利旧终端信息处理方法、装置及计算机可读存储介质
CN108984095A (zh) * 2018-07-04 2018-12-11 Oppo广东移动通信有限公司 手势交互方法、装置、存储介质和电子设备
CN112395118A (zh) * 2020-12-08 2021-02-23 广州绿怡信息科技有限公司 设备数据检测方法及装置

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092503A (zh) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 移动终端的解锁及验证方法与解锁及验证装置
CN103514390A (zh) * 2013-09-18 2014-01-15 吴先洪 数据自销毁方法、装置和数码设备
CN103886240A (zh) * 2014-04-11 2014-06-25 快车科技有限公司 一种通过多指纹识别提高设备安全性的方法及装置
CN104573451A (zh) * 2013-10-29 2015-04-29 深圳市腾讯计算机系统有限公司 一种用户验证方法、装置及电子装置
CN104580691A (zh) * 2014-12-02 2015-04-29 惠州Tcl移动通信有限公司 一种短信删除方法及终端
CN104765994A (zh) * 2015-04-17 2015-07-08 努比亚技术有限公司 用户身份识别方法及装置
EP2892002A2 (en) * 2014-01-02 2015-07-08 Samsung Electronics Co., Ltd Method of executing function of electronic device and electronic device using the same
CN104933339A (zh) * 2015-06-16 2015-09-23 广东欧珀移动通信有限公司 一种解锁控制方法及移动终端
CN105159701A (zh) * 2015-07-30 2015-12-16 广东欧珀移动通信有限公司 系统重置方法及终端

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8543833B2 (en) * 2010-12-29 2013-09-24 Microsoft Corporation User identification with biokinematic input
CN103870356B (zh) * 2012-12-11 2017-12-01 联想(北京)有限公司 一种信息处理方法及电子设备
CN104516666B (zh) * 2013-09-30 2020-02-07 腾讯科技(深圳)有限公司 一种智能终端中的通知删除方法、装置及智能终端
CN103645825B (zh) * 2013-11-22 2017-03-29 华为终端有限公司 消息的处理方法及装置
CN104572348A (zh) * 2014-12-03 2015-04-29 深圳市金立通信设备有限公司 一种终端
CN104834520A (zh) * 2015-04-17 2015-08-12 惠州Tcl移动通信有限公司 智能终端应用启动的方法及智能终端
CN104951343A (zh) * 2015-06-18 2015-09-30 广东欧珀移动通信有限公司 应用程序开启方法和应用程序开启系统
CN105224194B (zh) * 2015-08-31 2019-01-15 珠海市魅族通讯设备有限公司 一种数据处理方法及终端

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092503A (zh) * 2012-10-11 2013-05-08 百度在线网络技术(北京)有限公司 移动终端的解锁及验证方法与解锁及验证装置
CN103514390A (zh) * 2013-09-18 2014-01-15 吴先洪 数据自销毁方法、装置和数码设备
CN104573451A (zh) * 2013-10-29 2015-04-29 深圳市腾讯计算机系统有限公司 一种用户验证方法、装置及电子装置
EP2892002A2 (en) * 2014-01-02 2015-07-08 Samsung Electronics Co., Ltd Method of executing function of electronic device and electronic device using the same
CN103886240A (zh) * 2014-04-11 2014-06-25 快车科技有限公司 一种通过多指纹识别提高设备安全性的方法及装置
CN104580691A (zh) * 2014-12-02 2015-04-29 惠州Tcl移动通信有限公司 一种短信删除方法及终端
CN104765994A (zh) * 2015-04-17 2015-07-08 努比亚技术有限公司 用户身份识别方法及装置
CN104933339A (zh) * 2015-06-16 2015-09-23 广东欧珀移动通信有限公司 一种解锁控制方法及移动终端
CN105159701A (zh) * 2015-07-30 2015-12-16 广东欧珀移动通信有限公司 系统重置方法及终端

Also Published As

Publication number Publication date
CN105956442A (zh) 2016-09-21

Similar Documents

Publication Publication Date Title
WO2017185464A1 (zh) 一种数据清除方法与终端设备
US10395089B2 (en) Application and picture display verification methods, apparatuses, and electronic device
US11262895B2 (en) Screen capturing method and apparatus
CN105593868B (zh) 一种指纹识别方法、装置及移动终端
US7865172B2 (en) Method and apparatus for data protection for mobile devices
US9513790B2 (en) Electronic device and method for unlocking screen of electronic device
US20160092064A1 (en) Method and Apparatus for Displaying Application Interface, and Electronic Device
US9848072B2 (en) Electronic device monitoring method and apparatus
US20150067829A1 (en) Electronic Device and Method for Unlocking Screen of Electronic Device
US9372981B2 (en) Electronic device and method for unlocking screen of electronic device
WO2016197337A1 (zh) 短信息处理方法、装置及电子设备
CN106650490B (zh) 云账号的登录方法及装置
CN106776908B (zh) 数据清理方法、装置及终端
EP3021250A1 (en) Electronic device and method for suggesting response manual in occurrence of denial
CN107562356B (zh) 指纹识别定位方法、装置、存储介质及电子设备
US10402083B2 (en) Fingerprint event processing method, apparatus, and terminal
KR102096824B1 (ko) 보안 환경을 제공하는 장치 및 방법
KR20120018965A (ko) 모바일 단말과 휴대용 컴퓨팅 기기를 위한 파일 백업, 복원 및 데이터 영구삭제 서비스 제공 시스템 및 그 방법
US20160202832A1 (en) Method for controlling multiple touchscreens and electronic device
WO2020113469A1 (zh) 开机检测方法、开机检测装置及移动终端
JP7055995B2 (ja) 決済管理システム、決済管理装置、決済管理方法、およびプログラム
CN111542047A (zh) 数据上传方法、装置、存储介质和相关设备
CN113297616A (zh) 数据操作方法、装置、电子设备及可读存储介质
JP5594390B2 (ja) 端末装置及びプログラム

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16899974

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16899974

Country of ref document: EP

Kind code of ref document: A1