WO2018094567A1 - Input method and terminal device - Google Patents

Input method and terminal device Download PDF

Info

Publication number
WO2018094567A1
WO2018094567A1 PCT/CN2016/106783 CN2016106783W WO2018094567A1 WO 2018094567 A1 WO2018094567 A1 WO 2018094567A1 CN 2016106783 W CN2016106783 W CN 2016106783W WO 2018094567 A1 WO2018094567 A1 WO 2018094567A1
Authority
WO
WIPO (PCT)
Prior art keywords
input
terminal device
determining
fingerprint
information
Prior art date
Application number
PCT/CN2016/106783
Other languages
French (fr)
Chinese (zh)
Inventor
卢虹宇
代理军
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to CN201680001827.1A priority Critical patent/CN106687970A/en
Priority to PCT/CN2016/106783 priority patent/WO2018094567A1/en
Publication of WO2018094567A1 publication Critical patent/WO2018094567A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the embodiments of the present application relate to the field of information technology, and more specifically, to an input method and a terminal device.
  • the user can pre-enter one or more fingerprint information through the fingerprint collection device.
  • the terminal device can generate a corresponding fingerprint template according to the fingerprint information that is pre-recorded.
  • the fingerprint may be used to verify the legal identity of the user.
  • anyone can operate the terminal device for example, view information such as pictures, video files, short messages, and call records saved by the terminal device. This may result in the leakage of privacy of the user.
  • anyone can perform normal operations on the app such as viewing content saved in the app. This will also cause leakage of the user's privacy.
  • the application that the user logs in and unlocks is an application related to financial property, the user's property may also be lost. For example, if the application is a bank client, anyone can view account balances, transaction records, etc. after the user logs in and unlocks the application. If you know the transaction password of the user, you can transfer the funds in the user account to other accounts without authorization.
  • the embodiment of the present application provides an input method and a terminal device to improve security of the terminal device.
  • an embodiment of the present application provides an input method, including: determining, in an unlocked state, a validity of an input acquired in a touch recognition area, including: collecting the input fingerprint information. Next, determine whether the matching fingerprint template is saved in the fingerprint database. If the matching fingerprint template is saved in the fingerprint database, it is determined that the input is a valid input. If the matching fingerprint template is not saved in the fingerprint database or the input fingerprint information is not collected, the input is determined to be an invalid input.
  • the matching fingerprint template is a fingerprint template matching the input fingerprint information; determining the input input information, wherein the input input information includes the duration of the input and the input position change information; according to the input
  • the input information determines an operation event; in the case where the input is a valid input, the operation event is executed, wherein the validity of the acquired input is determined each time the input is acquired in the touch recognition area.
  • the method further includes: determining, after determining the validity of the input obtained by the touch recognition area, that the terminal device is running the specified application, where
  • the specified application is a pre-set application.
  • the above technical solution may specify one or more applications, and each time the input is detected in the touch recognition area, it is required to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application.
  • the above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
  • the method further includes: determining, before determining the validity of the input obtained by the touch recognition area, determining that the terminal device is running the specified function of the application
  • the module wherein the designated function module is a function module preset by a user or a function module that needs to verify that the user is a legitimate user.
  • the determining the input information of the input includes: acquiring a start time of the input, and End time of the input; determining a duration of the input according to the start time of the input and the end time of the input; acquiring a start position of the input and an end position of the input; The input position change information is determined based on the input start position and the input end position.
  • the determining, according to the input input information, an operation event including: according to the input The duration and the input position change information determine whether the operation event is a click operation or a long press operation; or determine the operation event as a sliding operation according to the input position change information.
  • the embodiment of the present application provides a terminal device, where the terminal device includes a touch recognition unit, a fingerprint identification unit, and a processing unit: the processing unit is configured to determine that the touch recognition unit is touching when the terminal device is in an unlocked state. Identifying the validity of the input obtained by the area, wherein the processing unit determines whether the matching fingerprint template is saved in the fingerprint database, and saves the matching in the fingerprint database, in the case that the fingerprint identification unit collects the input fingerprint information.
  • the fingerprint template determines that the input is a valid input, and if the matching fingerprint template is not saved in the fingerprint database or the fingerprint identification unit does not collect the input fingerprint information, determining that the input is an invalid input, wherein the matching fingerprint template a fingerprint template matching the input fingerprint information;
  • the touch recognition unit is configured to determine input information of the input, wherein the input input information includes a duration of the input and position change information of the input;
  • the processing unit also used to determine the operation based on the input information of the input An event, and in the case where the input is a valid input, the operation event is performed; wherein the processing unit determines the input acquired by the touch recognition unit each time the touch recognition unit acquires an input in the touch recognition area Effectiveness.
  • the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the specified application , wherein the specified application is a pre-set application.
  • the above technical solution may specify one or more applications, and each time the input is detected in the touch recognition area, it is required to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application.
  • the above technical solution not only satisfies the convenience of using the terminal device, but also In order to protect the privacy of users and the purpose of property security.
  • the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the application
  • the function module is specified, wherein the specified function module is a function module preset by the user or a function module that needs to be verified that the user is a legitimate user.
  • the touch recognition unit is configured to acquire a start time of the input and the input End time, determining a duration of the input according to the start time of the input and the end time of the input; acquiring a start position of the input and an end position of the input, according to the start position of the input and the input The end position determines the position change information of the input.
  • the processing unit is specifically configured to use the duration of the input and the input location
  • the change information determines whether the operation event is a click operation or a long press operation; or determines the operation event as a sliding operation according to the input position change information.
  • the above technical solution can greatly improve the security of the terminal device, thereby protecting the privacy of the user and the security of the property.
  • FIG. 1 is a schematic flowchart of an input method according to an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a terminal device in an unlocked state.
  • FIG. 3 is a schematic diagram of another terminal device in an unlocked state.
  • FIG. 4 is a structural block diagram of a terminal device according to an embodiment of the present application.
  • the touch recognition area of the terminal device in the present application includes a fingerprint collection area used by the terminal device to collect fingerprints.
  • the terminal device may be a mobile phone, a tablet computer, a computer, etc., and the application is implemented. This example is not limited to this.
  • the manner in which the terminal device implements touch recognition in the touch recognition area in the embodiment of the present application includes, but is not limited to, a capacitive touch sensor and an inductive touch sensor.
  • the manner in which the terminal device implements fingerprint collection in the fingerprint collection area in the embodiment of the present application includes, but is not limited to, a push type fingerprint recognition device and an optical fingerprint recognition device.
  • the location of the fingerprint collection area in the embodiment of the present application may be located on the front, the back, or the side of the terminal device, or may be located in the display area of the terminal device.
  • FIG. 1 is a schematic flowchart of an input method according to an embodiment of the present application. The method shown in Figure 1 can be performed by a terminal device.
  • an operation event is determined according to the input input information.
  • the operation event is performed, wherein the validity of the acquired input is determined each time an input is acquired in the touch recognition area of the terminal device.
  • the method may further include: determining that the terminal device is running the specified application, wherein the specified application It is a pre-set application.
  • the preset may be preset by the user or may be preset by the operating system of the terminal device.
  • the above technical solution can specify one One or more applications, each time the input is detected in the touch recognition area, it is necessary to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application.
  • the above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
  • the specified one or more applications may be applications that involve personal privacy, such as photos, text messages, applications related to financial assets (eg, bank clients), and the like.
  • the other application may be an application that does not involve personal privacy, such as games, information applications, and the like.
  • a non-designated application such as a game or an information application.
  • only legitimate users can use photos, text messages, etc. to specify applications.
  • the method may further include: determining that the terminal device is running a specified function module of the application, wherein the designated function module A function module preset for the user or a function module that needs to verify that the user is a legitimate user.
  • the terminal device is running a specified function module of the application, wherein the designated function module A function module preset for the user or a function module that needs to verify that the user is a legitimate user.
  • An application may include different functional modules.
  • the phone application can include a call recording function module, a contact function module, and a dial keypad function module.
  • the user of the terminal device may preset the call record module and the contact function module as the designated function module. In this way, anyone can make a call using the dial pad function module of the phone application of the terminal device, but the call record and the contact information cannot be viewed.
  • the user sets the specified function module, the user needs to verify that the user is a legitimate user.
  • Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
  • the camera application can include a camera function module, a camera function module, and an album function module.
  • the user of the terminal device can preset the album function module as the designated function module. In this way, anyone can take photos with the camera function module or use the camera function module to take pictures, but cannot view photos saved in the album. Similarly, when setting the specified function module, the user needs to verify that the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
  • bank client applications typically include functional modules related to financial assets, such as transfers, transaction record inquiries, and purchase of wealth management products.
  • Bank client applications usually include some information function modules, such as financial product recommendation, financial information, and so on. Users need to authenticate when using functional modules related to financial assets.
  • the functional module related to the financial property can only be run if the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
  • the functional module related to the financial property is the designated functional module.
  • the determining the input information of the input comprises: acquiring a start time of the input and an end time of the input; determining, according to the start time of the input and the end time of the input, The duration of the input; the start position of the input and the end position of the input; and the position change information of the input is determined according to the start position of the input and the end position of the input.
  • the input is sequentially started, and the touch object is separated from the touch recognition area to indicate that the input ends.
  • a double-click operation is an operational event that results from two inputs. This is because when the user completes a click, they need to raise their finger and then click on the same location again.
  • the touch state is moved back to the touch recognition area after moving from the touch recognition area to the non-touch recognition area (for example, the border of the terminal device) during the continuous movement of the finger, the input is also two times.
  • determining the operation event according to the input information of the input includes: determining, according to the duration of the input and the position change information of the input, the operation event as a click operation or a long press operation Or determining the operation event as a sliding operation according to the input position change information.
  • the operation event is a click operation.
  • the first operation time is determined to be a slide operation. Further, according to the input position change information and the input The duration determines the sliding speed of the sliding operation.
  • FIG. 2 is a schematic diagram of a terminal device in an unlocked state.
  • the terminal device 200 shown in FIG. 2 includes a display screen 201 and a button 202.
  • the touch recognition area of the terminal device 200 includes an area where the display screen 201 is located and an area where the button 202 is located.
  • the fingerprint identification area of the terminal device 200 is located in the area where the button 202 is located.
  • FIG. 2 is a schematic diagram of the terminal device 200 in an unlocked state. As shown in FIG. 2, when the terminal device 200 is in the unlocked state, the display interface of the display screen 201 presents a total of 16 icons in 4 rows and 4 columns.
  • the icon indicated by the first dotted line of the first line of the display interface 201 of the terminal device 200 shown in FIG. 2 is the default candidate icon.
  • the registered finger referred to in the following embodiment means that the terminal device 200 holds a fingerprint template corresponding to the registered finger. In other words, the terminal device 200 can confirm that the input generated by the registered finger is a valid input.
  • the unregistered finger referred to in the following embodiment means that the terminal device 200 does not store a fingerprint template corresponding to the unregistered finger. In other words, the terminal device 200 can determine that the input generated by the unregistered finger is an invalid input.
  • the terminal device 200 When the terminal device 200 is in the unlocked state, it is necessary to judge the validity of the acquired input each time the input is acquired in the touch recognition area. Taking FIG. 2 as an example, whether the user is a legitimate user or not, the input of the icon selected by the user directly on the display screen 201 using the finger is an invalid input. This is because the input fingerprint is not acquired in the area where the display 201 is located, and thus the input fingerprint information generated by the finger cannot be detected. Inputs that cannot detect fingerprint information are invalid inputs.
  • the user can operate the terminal 200 in the fingerprint identification area. For example, the user can click on the fingerprint identification area using the registered finger (ie, touch an area within the range of the fingerprint identification area (ie, the area where the button 202 is located) and quickly lift up, the input is not in the fingerprint identification area. Move and the duration of this input is very short). In this case, the input can be considered a click operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a one-click operation. The result of the operation of the terminal device 200 performing the click operation may be to start an application corresponding to the candidate icon. If the user clicks on the fingerprint identification area using an unregistered finger, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a click operation.
  • the terminal device 200 can determine that the operation event generated by the input is a rightward sliding operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a rightward sliding operation. As a result of the terminal device 200 performing the rightward sliding operation, the candidate icon can be changed from the icon of the first line of the first line as shown in FIG. 2 to the other icon. Similarly, if the user is using an unregistered finger to make a right swipe input on the fingerprint recognition area, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a sliding operation to the right.
  • the terminal device 200 may determine the changed candidate icon according to the sliding distance of the sliding operation. For example, if the sliding distance is less than the first distance threshold, the changed candidate icon is the second icon of the first line. For another example, if the sliding distance is greater than the first distance threshold and less than the second distance threshold, the changed candidate icon is the third icon of the first line.
  • the terminal device 200 may determine the changed candidate icon according to the sliding speed of the sliding operation.
  • the terminal device 200 may determine a better candidate icon according to the sliding speed and the sliding distance of the sliding operation.
  • the user can also use the registered finger to slide the selection candidate icon in other directions.
  • the specific implementation is similar to the manner of sliding the selection candidate icon by swiping to the right, and need not be described here.
  • the user can use the registered finger to long press the fingerprint identification area (ie, an area of the fingerprint identification area is known and stays for a period of time, and the input does not move within the fingerprint identification area).
  • the input can be considered to be a long press operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a long press operation. The result of the terminal device 200 performing the long press operation may be that the preset content is presented on the display screen 201 of the terminal device 200. Similarly, if the user uses an unregistered finger to press the fingerprint recognition area, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a long press operation.
  • the terminal device 200 can determine a corresponding operation according to an operation event that the user continuously inputs a plurality of times. For example, the terminal device 200 detects that the user clicks the fingerprint recognition area using the registered finger for two consecutive times within a certain time range, and the terminal device 200 can perform a double-click operation. However, if the user clicks the fingerprint recognition area once each time using the registered finger and the unregistered finger in the time range, the terminal device 200 cannot perform the double-click operation.
  • the user can select an application that is desired to run in the terminal device 200 through the fingerprint identification area.
  • the terminal device 200 is running the specified application or the designation of the application Function module
  • the user can also select the content in the application that he wants to open through the fingerprint identification area. For example, the user can use the registered finger to perform a sliding input in the fingerprint recognition area to select a candidate content that is desired to be opened, and then use the registered finger to click the fingerprint identification area to open the selected candidate content.
  • FIG. 3 is a schematic diagram of another terminal device in an unlocked state.
  • the terminal device 300 shown in FIG. 3 includes a display screen 301.
  • the touch recognition area of the terminal device 300 includes an area where the display screen 301 is located.
  • the fingerprint identification area of the terminal device 300 also includes the area where the display screen 301 is located. That is to say, the area where the display screen 301 is located can acquire input input information as well as input fingerprint information.
  • the terminal device 300 performs only an operation event generated by the user using the input of the registered finger in the area where the display screen 301 is located. If the input is made by the unregistered finger on the display screen 301, the terminal device 300 does not perform the operation event corresponding to the input. That is, the user can normally operate the terminal device 300 using the registered finger, such as clicking an icon presented on the display screen 301, dragging the icon, and switching the displayed icon by sliding. However, even if the terminal device 300 is already in the unlocked state, the unregistered finger cannot operate the terminal device 300, or can only operate the limited application or the function module in the application set by the legitimate user or the terminal device.
  • FIG. 4 is a structural block diagram of a terminal device according to an embodiment of the present application.
  • the terminal device 400 shown in FIG. 4 includes a processing unit 401, a touch recognition unit 402, and a fingerprint recognition unit 403.
  • the processing unit 401 is configured to determine, when the terminal device 400 is in the unlocked state, the validity of the input acquired by the touch recognition unit 402 in the touch recognition area, where the processing unit 401 collects the input fingerprint information in the fingerprint identification unit 403. And determining whether the matching fingerprint template is saved in the fingerprint database, and determining that the input is a valid input when the matching fingerprint template is saved in the fingerprint database, and the matching fingerprint template is not saved in the fingerprint database or the fingerprint identification unit 403 is not collected.
  • the input is determined to be an invalid input in the case of the input fingerprint information, wherein the matching fingerprint template is a fingerprint template that matches the input fingerprint information.
  • the touch recognition unit 402 is configured to determine input information of the input, wherein the input input information includes a duration of the input and position change information of the input.
  • the processing unit 401 is further configured to determine an operation event according to the input input information, and execute the operation event if the input is a valid input, where the processing unit 401 is in the touch recognition area each time the touch recognition unit 402 is located In the case where the input is obtained, the validity of the input acquired by the touch recognition unit 402 is judged.
  • the terminal device 400 In the case where the terminal device 400 is in the unlocked state, each time the user inputs the touch recognition area, it is necessary to determine whether the user who performed the input is a legitimate user. Thus, even if the terminal device 400 is in the unlocked state, the non-legitimate user cannot operate the end device by a touch operation. In this way, the security of the terminal device 400 can be greatly improved.
  • the processing unit 401 is further configured to determine that the terminal device is running a specified application, where the specified application is a preset application.
  • the processing unit 401 is further configured to determine that the terminal device is running a specified function module of the application, where the designated function module is a function module preset by the user or needs to verify that the user is a legitimate user. Access to the function module.
  • the touch recognition unit 402 is configured to acquire a start time of the input and an end time of the input, and determine a duration of the input according to the start time of the input and the end time of the input; and acquiring the input
  • the start position and the end position of the input determine the position change information of the input based on the start position of the input and the end position of the input.
  • the processing unit 401 is specifically configured to determine, according to the duration of the input and the position change information of the input, that the operation event is a click operation or a long press operation; or the processing unit 401, specifically for the location according to the input
  • the change information determines that the operation event is a sliding operation.
  • Processing unit 401 can be implemented by a processor.
  • Touch recognition unit 402 can be implemented by a touch sensor including, but not limited to, a capacitive touch sensor, an inductive touch sensor.
  • the fingerprint identification unit 403 can be implemented by a fingerprint recognition device including, but not limited to, a push type fingerprint recognition device and an optical fingerprint recognition device.
  • the terminal device 400 may also include some other units, such as a power source, a communication unit, an imaging unit, and the like.
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in the various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

An input method and a terminal device. The method comprises: determining the validity of an input acquired in a touch recognition area when a terminal device is in an unlocked state (101), which comprises: determining whether a matched fingerprint template is stored in a fingerprint database in a case where input fingerprint information is collected, determining that the input is a valid input if the matched fingerprint template is stored in the fingerprint database, and determining that the input is an invalid input where the matched fingerprint template is not stored in the fingerprint database or the input fingerprint information is not collected; determining input information about the input (102); determining an operation event according to the input information about the input (103); and where the input is a valid input, executing the operation event (104), wherein each time an input is acquired in the touch recognition area, the validity of the acquired input is determined. The technical solution can improve the security of the terminal device.

Description

输入方法和终端设备Input method and terminal device 技术领域Technical field
本申请实施例涉及信息技术领域,并且更具体地,涉及一种输入方法和终端设备。The embodiments of the present application relate to the field of information technology, and more specifically, to an input method and a terminal device.
背景技术Background technique
随着技术的发展和对于信息安全的需求,越来越多的终端设备上设置了指纹采集装置。用户可以通过指纹采集装置预先录入一个或多个指纹信息。该终端设备可以根据预先录入的指纹信息,生成相应的指纹模版。在一些应用场景中,例如对该终端设备进行解锁,启动该终端设备中的应用等,可以利用指纹对用户的合法身份进行验证。With the development of technology and the demand for information security, more and more terminal devices are provided with fingerprint collection devices. The user can pre-enter one or more fingerprint information through the fingerprint collection device. The terminal device can generate a corresponding fingerprint template according to the fingerprint information that is pre-recorded. In some application scenarios, for example, unlocking the terminal device, starting an application in the terminal device, and the like, the fingerprint may be used to verify the legal identity of the user.
但是,一旦完成了合法身份验证后,任何人都可以对该终端设备进行操作。例如,在该终端设备处于解锁状态时,任何人都可以对该终端设备进行操作,例如查看该终端设备保存的图片、视频文件、短信、通话记录等信息。这就可能造成该用户隐私的泄漏。再如,在用户登陆并解锁应用后,任何人都可以对该应用进行正常操作,例如查看该应用中保存的内容。这样,也会造成该用户隐私的泄漏。此外,如果用户登陆并解锁的应用是与金融财产相关的应用,则也可能造成用户的财产损失。例如,如果该应用是银行客户端,在用户登陆并解锁该应用后,任何人都可以查看账户余额、交易记录等信息。如果知道该用户的交易密码,也可以擅自将该用户账户中的资金转移到其他账户。However, once the legal identity verification is completed, anyone can operate the terminal device. For example, when the terminal device is in the unlocked state, anyone can operate the terminal device, for example, view information such as pictures, video files, short messages, and call records saved by the terminal device. This may result in the leakage of privacy of the user. For another example, after the user logs in and unlocks the app, anyone can perform normal operations on the app, such as viewing content saved in the app. This will also cause leakage of the user's privacy. In addition, if the application that the user logs in and unlocks is an application related to financial property, the user's property may also be lost. For example, if the application is a bank client, anyone can view account balances, transaction records, etc. after the user logs in and unlocks the application. If you know the transaction password of the user, you can transfer the funds in the user account to other accounts without authorization.
因此,如何提高终端设备或者终端设备中运行的应用解锁后的安全性是一个亟待解决的问题。Therefore, how to improve the security of an application running in a terminal device or a terminal device after unlocking is an urgent problem to be solved.
发明内容Summary of the invention
本申请实施例提供一种输入方法和终端设备,以提高终端设备的安全性。The embodiment of the present application provides an input method and a terminal device to improve security of the terminal device.
第一方面,本申请实施例提供一种输入方法,该方法包括:在终端设备处于解锁状态下判断在触摸识别区域获取到的输入的有效性,包括:在采集到该输入的指纹信息的情况下,确定指纹数据库中是否保存匹配指纹模版, 若该指纹数据库中保存该匹配指纹模版,则确定该输入为有效输入,若该指纹数据库中未保存该匹配指纹模版或未采集到该输入的指纹信息的情况下,则确定该输入为无效输入,其中,该匹配指纹模版为与该输入的指纹信息匹配的指纹模版;确定该输入的输入信息,其中,该输入的输入信息包括该输入的持续时间和该输入的位置变化信息;根据该输入的输入信息,确定操作事件;在该输入为有效输入的情况下,执行该操作事件,其中,在每次在该触摸识别区域获取到输入的情况下,判断获取到的输入的有效性。基于上述技术方案,在该终端设备处于解锁状态的情况下,用户的每次在触摸识别区域的输入均需要判断执行该输入的用户是否是合法用户。这样,即使该终端设备处于解锁状态,非合法用户也无法通过触摸操作对该端设备进行操作。这样,可以大大提高该终端设备的安全性。In a first aspect, an embodiment of the present application provides an input method, including: determining, in an unlocked state, a validity of an input acquired in a touch recognition area, including: collecting the input fingerprint information. Next, determine whether the matching fingerprint template is saved in the fingerprint database. If the matching fingerprint template is saved in the fingerprint database, it is determined that the input is a valid input. If the matching fingerprint template is not saved in the fingerprint database or the input fingerprint information is not collected, the input is determined to be an invalid input. The matching fingerprint template is a fingerprint template matching the input fingerprint information; determining the input input information, wherein the input input information includes the duration of the input and the input position change information; according to the input The input information determines an operation event; in the case where the input is a valid input, the operation event is executed, wherein the validity of the acquired input is determined each time the input is acquired in the touch recognition area. Based on the above technical solution, in the case that the terminal device is in the unlocked state, each time the user inputs the touch recognition area, it is required to determine whether the user who performs the input is a legitimate user. Thus, even if the terminal device is in the unlocked state, the non-legitimate user cannot operate the end device through a touch operation. In this way, the security of the terminal device can be greatly improved.
结合第一方面,在第一方面的第一种可能的实现方式中,该方法还包括:在该判断在触摸识别区域获取到的输入的有效性之前,确定该终端设备正在运行指定应用,其中该指定应用是预先设置的应用。上述技术方案可以指定一个或多个应用,在这些应用的运行过程中,每次在触摸识别区域检测到输入时均需要验证产生该输入的用户是否是合法用户。而其他应用(即不属于该指定的一个或多个应用的应用)在运行过程中无需每次验证触摸区域检测到的输入是否是合法用户输入的。这样,任何人都可以使用该终端设备来运行该其他应用。上述技术方案既满足了终端设备使用的便捷性,又可以达到保护用户隐私和财产安全的目的。With reference to the first aspect, in a first possible implementation manner of the first aspect, the method further includes: determining, after determining the validity of the input obtained by the touch recognition area, that the terminal device is running the specified application, where The specified application is a pre-set application. The above technical solution may specify one or more applications, and each time the input is detected in the touch recognition area, it is required to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application. The above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
结合第一方面,在第一方面的第二种可能的实现方式中,该方法还包括:在该判断在触摸识别区域获取到的输入的有效性之前,确定该终端设备正在运行应用的指定功能模块,其中,该指定功能模块为用户预先设置的功能模块或者需要验证用户为合法用户才能访问的功能模块。基于上述技术方案,任何人都可以正常使用应用的非指定功能模块,但是只有合法用户才能使用该指定功能模块。上述技术方案既满足了终端设备使用的便捷性,又可以达到保护用户隐私和财产安全的目的。With reference to the first aspect, in a second possible implementation manner of the first aspect, the method further includes: determining, before determining the validity of the input obtained by the touch recognition area, determining that the terminal device is running the specified function of the application The module, wherein the designated function module is a function module preset by a user or a function module that needs to verify that the user is a legitimate user. Based on the above technical solution, anyone can use the non-designated function module of the application normally, but only the legal user can use the specified function module. The above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
结合第一方面或第一方面的上述任一种可能的实现方式,在第一方面的第三种可能的实现方式中,该确定该输入的输入信息,包括:获取该输入的起始时刻和该输入的结束时刻;根据该输入的起始时刻和该输入的结束时刻,确定该输入的持续时间;获取该输入的起始位置和该输入的结束位置; 根据该输入的起始位置和该输入的结束位置,确定该输入的位置变化信息。In combination with the first aspect or any one of the foregoing possible implementation manners of the first aspect, in a third possible implementation manner of the first aspect, the determining the input information of the input includes: acquiring a start time of the input, and End time of the input; determining a duration of the input according to the start time of the input and the end time of the input; acquiring a start position of the input and an end position of the input; The input position change information is determined based on the input start position and the input end position.
结合第一方面或第一方面的上述任一种可能的实现方式,在第一方面的第四种可能的实现方式中,该根据该输入的输入信息,确定操作事件,包括:根据该输入的持续时间和该输入的位置变化信息,确定该操作事件为单击操作或长按操作;或者根据该输入的位置变化信息,确定该操作事件为滑动操作。With reference to the first aspect or any one of the foregoing possible implementation manners of the first aspect, in a fourth possible implementation manner of the first aspect, the determining, according to the input input information, an operation event, including: according to the input The duration and the input position change information determine whether the operation event is a click operation or a long press operation; or determine the operation event as a sliding operation according to the input position change information.
第二方面,本申请实施例提供一种终端设备,该终端设备包括触摸识别单元、指纹识别单元和处理单元:该处理单元,用于在该终端设备处于解锁状态下判断该触摸识别单元在触摸识别区域获取到的输入的有效性,其中,该处理单元在该指纹识别单元采集到该输入的指纹信息的情况下,确定指纹数据库中是否保存匹配指纹模板,并在该指纹数据库中保存该匹配指纹模板时确定该输入为有效输入,而在该指纹数据库中未保存该匹配指纹模板或该指纹识别单元未采集到该输入的指纹信息的情况下确定该输入为无效输入,其中该匹配指纹模板为与该输入的指纹信息匹配的指纹模板;该触摸识别单元,用于确定该输入的输入信息,其中,该输入的输入信息包括该输入的持续时间和该输入的位置变化信息;该处理单元,还用于根据该输入的输入信息,确定操作事件,并在该输入为有效输入的情况下,执行该操作事件;其中该处理单元在每次该触摸识别单元在该触摸识别区域获取到输入的情况下,判断该触摸识别单元获取到的输入的有效性。基于上述技术方案,在该终端设备处于解锁状态的情况下,用户的每次在触摸识别区域的输入均需要判断执行该输入的用户是否是合法用户。这样,即使该终端设备处于解锁状态,非合法用户也无法通过触摸操作对该端设备进行操作。这样,可以大大提高该终端设备的安全性。In a second aspect, the embodiment of the present application provides a terminal device, where the terminal device includes a touch recognition unit, a fingerprint identification unit, and a processing unit: the processing unit is configured to determine that the touch recognition unit is touching when the terminal device is in an unlocked state. Identifying the validity of the input obtained by the area, wherein the processing unit determines whether the matching fingerprint template is saved in the fingerprint database, and saves the matching in the fingerprint database, in the case that the fingerprint identification unit collects the input fingerprint information. The fingerprint template determines that the input is a valid input, and if the matching fingerprint template is not saved in the fingerprint database or the fingerprint identification unit does not collect the input fingerprint information, determining that the input is an invalid input, wherein the matching fingerprint template a fingerprint template matching the input fingerprint information; the touch recognition unit is configured to determine input information of the input, wherein the input input information includes a duration of the input and position change information of the input; the processing unit , also used to determine the operation based on the input information of the input An event, and in the case where the input is a valid input, the operation event is performed; wherein the processing unit determines the input acquired by the touch recognition unit each time the touch recognition unit acquires an input in the touch recognition area Effectiveness. Based on the above technical solution, in the case that the terminal device is in the unlocked state, each time the user inputs the touch recognition area, it is required to determine whether the user who performs the input is a legitimate user. Thus, even if the terminal device is in the unlocked state, the non-legitimate user cannot operate the end device through a touch operation. In this way, the security of the terminal device can be greatly improved.
结合第二方面,在第二方面的第一种可能的实现方式中,该处理单元,还用于在该判断在触摸识别区域获取到的输入的有效性之前,确定该终端设备正在运行指定应用,其中该指定应用是预先设置的应用。上述技术方案可以指定一个或多个应用,在这些应用的运行过程中,每次在触摸识别区域检测到输入时均需要验证产生该输入的用户是否是合法用户。而其他应用(即不属于该指定的一个或多个应用的应用)在运行过程中无需每次验证触摸区域检测到的输入是否是合法用户输入的。这样,任何人都可以使用该终端设备来运行该其他应用。上述技术方案既满足了终端设备使用的便捷性,又可 以达到保护用户隐私和财产安全的目的。With reference to the second aspect, in a first possible implementation manner of the second aspect, the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the specified application , wherein the specified application is a pre-set application. The above technical solution may specify one or more applications, and each time the input is detected in the touch recognition area, it is required to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application. The above technical solution not only satisfies the convenience of using the terminal device, but also In order to protect the privacy of users and the purpose of property security.
结合第二方面,在第二方面的第二种可能的实现方式中,该处理单元,还用于在该判断在触摸识别区域获取到的输入的有效性之前,确定该终端设备正在运行应用的指定功能模块,其中,该指定功能模块为用户预先设置的功能模块或者需要验证用户为合法用户才能访问的功能模块。基于上述技术方案,任何人都可以正常使用应用的非指定功能模块,但是只有合法用户才能使用该指定功能模块。上述技术方案既满足了终端设备使用的便捷性,又可以达到保护用户隐私和财产安全的目的。With reference to the second aspect, in a second possible implementation manner of the second aspect, the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the application The function module is specified, wherein the specified function module is a function module preset by the user or a function module that needs to be verified that the user is a legitimate user. Based on the above technical solution, anyone can use the non-designated function module of the application normally, but only the legal user can use the specified function module. The above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
结合第二方面或第二方面的上述任一种可能的实现方式,在第二方面的第三种可能的实现方式中,该触摸识别单元,具体用于获取该输入的起始时刻和该输入的结束时刻,根据该输入的起始时刻和该输入的结束时刻,确定该输入的持续时间;获取该输入的起始位置和该输入的结束位置,根据该输入的起始位置和该输入的结束位置,确定该输入的位置变化信息。With reference to the second aspect or any one of the foregoing possible implementation manners of the second aspect, in a third possible implementation manner of the second aspect, the touch recognition unit is configured to acquire a start time of the input and the input End time, determining a duration of the input according to the start time of the input and the end time of the input; acquiring a start position of the input and an end position of the input, according to the start position of the input and the input The end position determines the position change information of the input.
结合第二方面或第二方面的上述任一种可能的实现方式,在第二方面的第四种可能的实现方式中,该处理单元,具体用于根据该输入的持续时间和该输入的位置变化信息,确定该操作事件为单击操作或长按操作;或者根据该输入的位置变化信息,确定该操作事件为滑动操作。With reference to the second aspect or any one of the foregoing possible implementation manners of the second aspect, in the fourth possible implementation manner of the second aspect, the processing unit is specifically configured to use the duration of the input and the input location The change information determines whether the operation event is a click operation or a long press operation; or determines the operation event as a sliding operation according to the input position change information.
上述技术方案可以可以大大提高该终端设备的安全性,从而起到保护用户隐私和财产安全的目的。The above technical solution can greatly improve the security of the terminal device, thereby protecting the privacy of the user and the security of the property.
附图说明DRAWINGS
图1是根据本申请实施例提供的一种输入方法的示意性流程图。FIG. 1 is a schematic flowchart of an input method according to an embodiment of the present application.
图2是一个处于解锁状态的终端设备的示意图。2 is a schematic diagram of a terminal device in an unlocked state.
图3是另一个处于解锁状态的终端设备的示意图。3 is a schematic diagram of another terminal device in an unlocked state.
图4是根据本申请实施例提供的终端设备的结构框图。FIG. 4 is a structural block diagram of a terminal device according to an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述。The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
本申请中的终端设备的触摸识别区域包括该终端设备用于采集指纹的指纹采集区域。该终端设备可以是手机、平板电脑、计算机等,本申请实施 例对此并不限定。The touch recognition area of the terminal device in the present application includes a fingerprint collection area used by the terminal device to collect fingerprints. The terminal device may be a mobile phone, a tablet computer, a computer, etc., and the application is implemented. This example is not limited to this.
本申请实施例中终端设备在触摸识别区域实现触摸识别的方式包括但不限于采用电容式触摸传感器、电感式触摸传感器。The manner in which the terminal device implements touch recognition in the touch recognition area in the embodiment of the present application includes, but is not limited to, a capacitive touch sensor and an inductive touch sensor.
本申请实施例中终端设备实现在指纹采集区域采集指纹的方式包括但不限于采用按压式指纹识别装置、光学式指纹识别装置。The manner in which the terminal device implements fingerprint collection in the fingerprint collection area in the embodiment of the present application includes, but is not limited to, a push type fingerprint recognition device and an optical fingerprint recognition device.
本申请实施例中指纹采集区域的位置可以位于终端设备的正面、背面或侧面,也可以位于该终端设备的显示区域,本申请实施例对此并不限定。The location of the fingerprint collection area in the embodiment of the present application may be located on the front, the back, or the side of the terminal device, or may be located in the display area of the terminal device.
图1是根据本申请实施例提供的一种输入方法的示意性流程图。图1所示的方法可以由终端设备执行。FIG. 1 is a schematic flowchart of an input method according to an embodiment of the present application. The method shown in Figure 1 can be performed by a terminal device.
101,在终端设备处于解锁状态下判断在该终端设备的触摸识别区域获取到的输入的有效性,其中,该终端设备处于解锁状态下判断在触摸识别区域获取到的输入的有效性包括:在采集到该输入的指纹信息的情况下,确定指纹数据库中是否保存匹配指纹模版,若该指纹数据库中保存该匹配指纹模版,则确定该输入为有效输入,若该指纹数据库中未保存该匹配指纹模版或未采集到该输入的指纹信息,则确定该输入为无效输入,其中,该匹配指纹模版为与该输入的指纹信息匹配的指纹模版。101. Determine the validity of the input acquired in the touch recognition area of the terminal device when the terminal device is in the unlocked state, where determining, by the terminal device, the validity of the input acquired in the touch recognition area is: When the input fingerprint information is collected, it is determined whether a matching fingerprint template is saved in the fingerprint database, and if the matching fingerprint template is saved in the fingerprint database, it is determined that the input is a valid input, and if the matching fingerprint is not saved in the fingerprint database The template or the fingerprint information of the input is not collected, and the input is determined to be an invalid input, wherein the matching fingerprint template is a fingerprint template matching the input fingerprint information.
102,确定该输入的输入信息,其中,该输入的输入信息包括该输入的持续时间和该输入的位置变化信息。102. Determine input information of the input, wherein the input information of the input includes a duration of the input and location change information of the input.
103,在该输入为有效输入的情况下,根据该输入的输入信息,确定操作事件。103. In case the input is a valid input, an operation event is determined according to the input input information.
104,在该输入为有效输入的情况下,执行该操作事件,其中,在每次在该终端设备的触摸识别区域获取到输入的情况下,判断获取到的输入的有效性。104. In the case where the input is a valid input, the operation event is performed, wherein the validity of the acquired input is determined each time an input is acquired in the touch recognition area of the terminal device.
根据图1所示的方法,在该终端设备处于解锁状态的情况下,用户的每次在触摸识别区域的输入均需要判断执行该输入的用户是否是合法用户。这样,即使该终端设备处于解锁状态,非合法用户也无法通过触摸操作对该端设备进行操作。这样,可以大大提高该终端设备的安全性。According to the method shown in FIG. 1, in the case where the terminal device is in the unlocked state, each time the user inputs the touch recognition area, it is necessary to determine whether the user who performs the input is a legitimate user. Thus, even if the terminal device is in the unlocked state, the non-legitimate user cannot operate the end device through a touch operation. In this way, the security of the terminal device can be greatly improved.
可选的,在一些实施例中,在该判断在该终端设备的触摸识别区域获取到的输入的有效性之前,该方法还可以包括:确定该终端设备正在运行指定的应用,其中该指定应用是预先设置的应用。该预先设置可以是用户预先设置的也可以是该终端设备的操作系统预先设置的。上述技术方案可以指定一 个或多个应用,在这些应用的运行过程中,每次在触摸识别区域检测到输入时均需要验证产生该输入的用户是否是合法用户。而其他应用(即不属于该指定的一个或多个应用的应用)在运行过程中无需每次验证触摸区域检测到的输入是否是合法用户输入的。这样,任何人都可以使用该终端设备来运行该其他应用。上述技术方案既满足了终端设备使用的便捷性,又可以达到保护用户隐私和财产安全的目的。Optionally, in some embodiments, before determining the validity of the input obtained by the touch identification area of the terminal device, the method may further include: determining that the terminal device is running the specified application, wherein the specified application It is a pre-set application. The preset may be preset by the user or may be preset by the operating system of the terminal device. The above technical solution can specify one One or more applications, each time the input is detected in the touch recognition area, it is necessary to verify whether the user who generated the input is a legitimate user. Other applications (ie, applications that do not belong to the specified one or more applications) do not need to verify that the input detected by the touch area is entered by a legitimate user each time during the run. In this way, anyone can use the terminal device to run the other application. The above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
例如,指定的一个或多个应用可以是涉及到个人隐私的应用,例如,照片、短信、与金融财产相关的应用(例如银行客户端)等。该其他应用可以是不涉及个人隐私的应用,例如游戏、资讯类应用等。这样,在该终端设备处于解锁状态的情况下,任何人都可以使用该终端设备运行游戏、资讯类应用等非指定应用。但是只有合法用户才能够使用照片、短信等指定应用。For example, the specified one or more applications may be applications that involve personal privacy, such as photos, text messages, applications related to financial assets (eg, bank clients), and the like. The other application may be an application that does not involve personal privacy, such as games, information applications, and the like. In this way, in the case where the terminal device is in the unlocked state, anyone can use the terminal device to run a non-designated application such as a game or an information application. However, only legitimate users can use photos, text messages, etc. to specify applications.
可选的,在一些实施例中,在该判断在触摸识别区域获取到的输入的有效性之前,该方法还可以包括:确定该终端设备正在运行应用的指定功能模块,其中,该指定功能模块为用户预先设置的功能模块或者需要验证用户为合法用户才能访问的功能模块。基于上述技术方案,任何人都可以正常使用应用的非指定功能模块,但是只有合法用户才能使用该指定功能模块。上述技术方案既满足了终端设备使用的便捷性,又可以达到保护用户隐私和财产安全的目的。Optionally, in some embodiments, before determining the validity of the input acquired by the touch recognition area, the method may further include: determining that the terminal device is running a specified function module of the application, wherein the designated function module A function module preset for the user or a function module that needs to verify that the user is a legitimate user. Based on the above technical solution, anyone can use the non-designated function module of the application normally, but only the legal user can use the specified function module. The above technical solution not only satisfies the convenience of using the terminal device, but also achieves the purpose of protecting user privacy and property security.
一个应用可能包括不同的功能模块。例如,电话应用可以包括通话记录功能模块,联系人功能模块以及拨号键盘功能模块。基于本申请实施例提供的技术方案,该终端设备的用户可以预先设置该通话记录模块和该联系人功能模块为该指定功能模块。这样,任何人都可以使用该终端设备的电话应用的拨号键盘功能模块来拨打电话,但是并不能查看通话记录和该联系人信息。该用户在设置该指定功能模块时,需要验证该用户是合法用户。验证方式包括但不限于指纹验证、密码验证、声纹验证。An application may include different functional modules. For example, the phone application can include a call recording function module, a contact function module, and a dial keypad function module. Based on the technical solution provided by the embodiment of the present application, the user of the terminal device may preset the call record module and the contact function module as the designated function module. In this way, anyone can make a call using the dial pad function module of the phone application of the terminal device, but the call record and the contact information cannot be viewed. When the user sets the specified function module, the user needs to verify that the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
又如,相机应用可以包括照相功能模块、摄像功能模块、相册功能模块。该终端设备的用户可以预先设置该相册功能模块为该指定功能模块。这样,任何人都能使用该照相功能模块进行照相或者使用摄像功能模块进行摄像,但是并不能查看相册中保存的照片。类似的,该用户在设置该指定功能模块时,需要验证该用户是合法用户。验证方式包括但不限于指纹验证、密码验证、声纹验证。 As another example, the camera application can include a camera function module, a camera function module, and an album function module. The user of the terminal device can preset the album function module as the designated function module. In this way, anyone can take photos with the camera function module or use the camera function module to take pictures, but cannot view photos saved in the album. Similarly, when setting the specified function module, the user needs to verify that the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification.
再如,银行客户端应用通常包括一些与金融财产相关的功能模块,例如转账、交易记录查询、购买理财产品等。银行客户端应用通常还会包括一些资讯类功能模块,例如,理财产品推荐、财经资讯等。用户在使用与金融财产相关的功能模块时,需要进行身份验证。只有在该用户为合法用户的情况下才能够运行该与金融财产相关的功能模块。验证方式包括但不限于指纹验证、密码验证、声纹验证。该与金融财产相关的功能模块即为该指定功能模块。基于本申请实施例提供的技术方案,虽然该终端设备正在运行该指定功能模块,但是每次在触摸识别区域检测到输入时均需要验证产生该输入的用户是否是合法用户。这样,任何人都可以使用该银行客户端应用的资讯类功能模块,但是并不能进行转账、交易记录查询等涉及金融财产相关的操作。As another example, bank client applications typically include functional modules related to financial assets, such as transfers, transaction record inquiries, and purchase of wealth management products. Bank client applications usually include some information function modules, such as financial product recommendation, financial information, and so on. Users need to authenticate when using functional modules related to financial assets. The functional module related to the financial property can only be run if the user is a legitimate user. Authentication methods include, but are not limited to, fingerprint verification, password verification, and voiceprint verification. The functional module related to the financial property is the designated functional module. Based on the technical solution provided by the embodiment of the present application, although the terminal device is running the specified function module, it is required to verify whether the user who generated the input is a legitimate user each time the input is detected in the touch recognition area. In this way, anyone can use the information function module of the bank client application, but can not perform operations related to financial assets such as transfer, transaction record inquiry.
可选的,在一些实施例中,该确定所述输入的输入信息,包括:获取该输入的起始时刻和该输入的结束时刻;根据该输入的起始时刻和该输入的结束时刻,确定该输入的持续时间;获取该输入的起始位置和该输入的结束位置;根据该输入的起始位置和该输入的结束位置,确定该输入的位置变化信息。Optionally, in some embodiments, the determining the input information of the input comprises: acquiring a start time of the input and an end time of the input; determining, according to the start time of the input and the end time of the input, The duration of the input; the start position of the input and the end position of the input; and the position change information of the input is determined according to the start position of the input and the end position of the input.
具体地,只要该触控体(例如手指、触控笔)开始接触该触摸识别区域就表示依次输入开始,只要该触控体离开该触摸识别区域就表示一次输入结束。例如,双击操作是由两次输入产生的一个操作事件。这是因为当用户完成一次点击后需要抬起手指,然后再次点击同样的位置。再如,如果手指连续移动过程中从触摸识别区域移动到了非触摸识别区域(例如该终端设备的边框)后保持触摸状态继续移回触摸识别区域,则也是两次输入。Specifically, as long as the touch object (for example, a finger or a stylus) starts to contact the touch recognition area, the input is sequentially started, and the touch object is separated from the touch recognition area to indicate that the input ends. For example, a double-click operation is an operational event that results from two inputs. This is because when the user completes a click, they need to raise their finger and then click on the same location again. For another example, if the touch state is moved back to the touch recognition area after moving from the touch recognition area to the non-touch recognition area (for example, the border of the terminal device) during the continuous movement of the finger, the input is also two times.
可选的,在一些实施例中,该根据该输入的输入信息,确定操作事件,包括:根据该输入的持续时间和该输入的位置变化信息,确定该操作事件为单击操作或长按操作;或者根据该输入的位置变化信息,确定该操作事件为滑动操作。Optionally, in some embodiments, determining the operation event according to the input information of the input includes: determining, according to the duration of the input and the position change information of the input, the operation event as a click operation or a long press operation Or determining the operation event as a sliding operation according to the input position change information.
例如,在确定该输入的位置变化信息未发生变化且该输入的持续时间小于第一预设时间范围的情况下,确定该操作事件为单击操作。For example, in a case where it is determined that the position change information of the input does not change and the duration of the input is less than the first preset time range, it is determined that the operation event is a click operation.
再如,在确定该输入的位置变化信息未发生变化且该输入的持续时间大于该第一预设时间范围的情况下,确定该操作事件为长按操作。For another example, in a case where it is determined that the position change information of the input does not change and the duration of the input is greater than the first preset time range, it is determined that the operation event is a long press operation.
又如,在确定该输入的位置变化信息发生变化的情况下,确定该第一操作时间为滑动操作。进一步,还可以根据该输入的位置变化信息和该输入的 持续时间,确定滑动操作的滑动速度。For another example, in a case where it is determined that the position change information of the input changes, the first operation time is determined to be a slide operation. Further, according to the input position change information and the input The duration determines the sliding speed of the sliding operation.
图2是一个处于解锁状态的终端设备的示意图。如图2所示的终端设备200包括显示屏201和按键202。终端设备200的触摸识别区域包括显示屏201所在的区域和按键202所在的区域。终端设备200的指纹识别区域位于按键202所在的区域。图2是终端设备200处于解锁状态的示意图。如图2所示,终端设备200在处于解锁状态时,显示屏201的显示界面上呈现4行4列共16个图标。图2所示的终端设备200的显示界面201的第一行的第一个虚线表示的图标是默认的候选图标。2 is a schematic diagram of a terminal device in an unlocked state. The terminal device 200 shown in FIG. 2 includes a display screen 201 and a button 202. The touch recognition area of the terminal device 200 includes an area where the display screen 201 is located and an area where the button 202 is located. The fingerprint identification area of the terminal device 200 is located in the area where the button 202 is located. FIG. 2 is a schematic diagram of the terminal device 200 in an unlocked state. As shown in FIG. 2, when the terminal device 200 is in the unlocked state, the display interface of the display screen 201 presents a total of 16 icons in 4 rows and 4 columns. The icon indicated by the first dotted line of the first line of the display interface 201 of the terminal device 200 shown in FIG. 2 is the default candidate icon.
以下实施例所称的已注册的手指是指终端设备200保存有与该已注册的手指对应的指纹模版。换句话说,终端设备200可以确认该已注册的手指产生的输入是有效输入。以下实施例所称的未注册的手指是指终端设备200未保存有与该未注册的手指对应的指纹模版。换句话说,终端设备200可以确定该未注册的手指产生的输入是无效输入。The registered finger referred to in the following embodiment means that the terminal device 200 holds a fingerprint template corresponding to the registered finger. In other words, the terminal device 200 can confirm that the input generated by the registered finger is a valid input. The unregistered finger referred to in the following embodiment means that the terminal device 200 does not store a fingerprint template corresponding to the unregistered finger. In other words, the terminal device 200 can determine that the input generated by the unregistered finger is an invalid input.
在终端设备200处于解锁状态时,每次在触摸识别区域获取到输入的情况下,均需要判断获取到的输入的有效性。以图2为例,无论用户是否是合法用户,该用户使用手指直接在显示屏201上选择的图标的输入都是无效输入。这是因为显示屏201所在的区域并不能获取到该输入的指纹,因此无法检测到手指产生的输入的指纹信息。无法检测到指纹信息的输入均为无效输入。When the terminal device 200 is in the unlocked state, it is necessary to judge the validity of the acquired input each time the input is acquired in the touch recognition area. Taking FIG. 2 as an example, whether the user is a legitimate user or not, the input of the icon selected by the user directly on the display screen 201 using the finger is an invalid input. This is because the input fingerprint is not acquired in the area where the display 201 is located, and thus the input fingerprint information generated by the finger cannot be detected. Inputs that cannot detect fingerprint information are invalid inputs.
用户可以在指纹识别区域对终端200进行操作。例如,该用户可以使用已注册的手指单击指纹识别区域(即轻触该指纹识别区域(即按键202所在的区域)范围内的一个区域并迅速抬起,该输入并不在该指纹识别区域内移动且该输入的持续时间很短)。在此情况下,可以认为该输入是一个单击操作。由于该输入是用户使用已注册的手指进行的,因此可以确定该输入是一个有效输入。在此情况下,终端设备200可以执行一次单击操作。终端设备200执行单击操作的操作结果可以是启动该候选图标对应的应用。如果用户使用的是未注册手指单击该指纹识别区域,则可以确定该输入是一个无效输入。在此情况下,终端设备200并不会执行单击操作。The user can operate the terminal 200 in the fingerprint identification area. For example, the user can click on the fingerprint identification area using the registered finger (ie, touch an area within the range of the fingerprint identification area (ie, the area where the button 202 is located) and quickly lift up, the input is not in the fingerprint identification area. Move and the duration of this input is very short). In this case, the input can be considered a click operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a one-click operation. The result of the operation of the terminal device 200 performing the click operation may be to start an application corresponding to the candidate icon. If the user clicks on the fingerprint identification area using an unregistered finger, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a click operation.
再如,该用户使用已注册的手指在该指纹识别区域上进行向右滑动输入,则终端设备200可以确定该输入产生的操作事件为向右的滑动操作。由于该输入是用户使用已注册手指进行的,因此可以确定该输入是一个有效输 入。在此情况下,终端设备200可以执行一次向右的滑动操作。终端设备200执行向右的滑动操作的结果是可以将候选图标从如图2所示的第一行的第一个的图标更改为其他图标。类似的,如果用户使用的是未注册的手指在该指纹识别区域上进行向右滑动输入,则可以确定该输入是一个无效输入。在此情况下,终端设备200不会执行向右的滑动操作。For another example, the user performs a rightward sliding input on the fingerprint recognition area using the registered finger, and the terminal device 200 can determine that the operation event generated by the input is a rightward sliding operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In. In this case, the terminal device 200 can perform a rightward sliding operation. As a result of the terminal device 200 performing the rightward sliding operation, the candidate icon can be changed from the icon of the first line of the first line as shown in FIG. 2 to the other icon. Similarly, if the user is using an unregistered finger to make a right swipe input on the fingerprint recognition area, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a sliding operation to the right.
可选的,在一些实施例中,终端设备200可以根据该滑动操作的滑动距离确定更改后的候选图标。例如,若滑动距离小于第一距离阈值,则更改后的候选图标为第一行的第二个图标。再如,若滑动距离大于该第一距离阈值且小于第二距离阈值,则更改后的候选图标为第一行的第三个图标。Optionally, in some embodiments, the terminal device 200 may determine the changed candidate icon according to the sliding distance of the sliding operation. For example, if the sliding distance is less than the first distance threshold, the changed candidate icon is the second icon of the first line. For another example, if the sliding distance is greater than the first distance threshold and less than the second distance threshold, the changed candidate icon is the third icon of the first line.
可选的,在另一些实施例中,终端设备200可以根据该滑动操作的滑动速度确定更改后的候选图标。Optionally, in other embodiments, the terminal device 200 may determine the changed candidate icon according to the sliding speed of the sliding operation.
可选的,在另一些实施例中,终端设备200可以根据该滑动操作的滑动速度和滑动距离确定更好后的候选图标。Optionally, in other embodiments, the terminal device 200 may determine a better candidate icon according to the sliding speed and the sliding distance of the sliding operation.
类似的,除了通过向右滑动选择候选图标外,用户也可以使用已注册的手指向其他方向滑动选择候选图标,具体实现方式与通过向右滑动选择候选图标的方式类似,在此就不必赘述。Similarly, in addition to selecting a candidate icon by swiping to the right, the user can also use the registered finger to slide the selection candidate icon in other directions. The specific implementation is similar to the manner of sliding the selection candidate icon by swiping to the right, and need not be described here.
又如,该用户可以使用已注册手指长按该指纹识别区域(即清楚该指纹识别区域的一个区域并且停留一段时间,该输入并不在该指纹识别区域内移动)。在此情况下,可以认为该输入是一个长按操作。由于该输入是用户使用已注册手指进行的,因此可以确定该输入是一个有效输入。在此情况下,终端设备200可以执行一次长按操作。终端设备200执行长按操作的结果可以是在终端设备200的显示屏201上呈现预先设置的内容。类似的,如果用户使用的是未注册的手指长按该指纹识别区域,则可以确定该输入是一个无效输入。在此情况下,终端设备200不会执行长按操作。As another example, the user can use the registered finger to long press the fingerprint identification area (ie, an area of the fingerprint identification area is known and stays for a period of time, and the input does not move within the fingerprint identification area). In this case, the input can be considered to be a long press operation. Since the input is made by the user using the registered finger, it can be determined that the input is a valid input. In this case, the terminal device 200 can perform a long press operation. The result of the terminal device 200 performing the long press operation may be that the preset content is presented on the display screen 201 of the terminal device 200. Similarly, if the user uses an unregistered finger to press the fingerprint recognition area, it can be determined that the input is an invalid input. In this case, the terminal device 200 does not perform a long press operation.
进一步,终端设备200可以根据用户多次连续的有效输入的操作事件确定相应的操作。例如,终端设备200在一定时间范围内,连续两次检测到用户使用已注册手指单击该指纹识别区域,则终端设备200可以执行双击操作。但是如果在该时间范围内,用户分别使用已注册手指和未注册手指各单击该指纹识别区域一次,则终端设备200无法执行双击操作。Further, the terminal device 200 can determine a corresponding operation according to an operation event that the user continuously inputs a plurality of times. For example, the terminal device 200 detects that the user clicks the fingerprint recognition area using the registered finger for two consecutive times within a certain time range, and the terminal device 200 can perform a double-click operation. However, if the user clicks the fingerprint recognition area once each time using the registered finger and the unregistered finger in the time range, the terminal device 200 cannot perform the double-click operation.
上述实施例中,用户可以通过指纹识别区域选择希望在终端设备200中运行的应用。类似的,如果终端设备200正在运行指定应用或者应用的指定 功能模块,用户也可以通过指纹识别区域选择希望打开的应用中的内容。例如,用户可以利用已注册手指在指纹识别区域进行滑动输入选择期望打开的候选内容,然后使用已注册手指单击该指纹识别区域打开选择的候选内容。In the above embodiment, the user can select an application that is desired to run in the terminal device 200 through the fingerprint identification area. Similarly, if the terminal device 200 is running the specified application or the designation of the application Function module, the user can also select the content in the application that he wants to open through the fingerprint identification area. For example, the user can use the registered finger to perform a sliding input in the fingerprint recognition area to select a candidate content that is desired to be opened, and then use the registered finger to click the fingerprint identification area to open the selected candidate content.
图3是另一处于解锁状态的终端设备的示意图。如图3所示的终端设备300包括显示屏301。终端设备300的触摸识别区域包括显示屏301所在的区域。终端设备300的指纹识别区域也包括显示屏301所在的区域。也就是说,显示屏301所在的区域既能获取输入的输入信息,也能获取输入的指纹信息。3 is a schematic diagram of another terminal device in an unlocked state. The terminal device 300 shown in FIG. 3 includes a display screen 301. The touch recognition area of the terminal device 300 includes an area where the display screen 301 is located. The fingerprint identification area of the terminal device 300 also includes the area where the display screen 301 is located. That is to say, the area where the display screen 301 is located can acquire input input information as well as input fingerprint information.
在此情况下,终端设备300只执行用户使用已注册的手指在显示屏301所在的区域进行的输入产生的操作事件。如果是未注册手指在显示屏301进行的输入,则终端设备300不会执行该输入对应的操作事件。也就是说,用户可以使用已注册的手指正常对终端设备300进行操作,例如点击显示屏301上呈现的图标,对图标进行拖动操作,通过滑动方式切换显示的图标等操作。但是即使终端设备300已处于解锁状态,非注册的手指无法操作终端设备300,或者仅能操作由合法用户或终端设备预先设置好的有限的应用或者应用中的功能模块。In this case, the terminal device 300 performs only an operation event generated by the user using the input of the registered finger in the area where the display screen 301 is located. If the input is made by the unregistered finger on the display screen 301, the terminal device 300 does not perform the operation event corresponding to the input. That is, the user can normally operate the terminal device 300 using the registered finger, such as clicking an icon presented on the display screen 301, dragging the icon, and switching the displayed icon by sliding. However, even if the terminal device 300 is already in the unlocked state, the unregistered finger cannot operate the terminal device 300, or can only operate the limited application or the function module in the application set by the legitimate user or the terminal device.
图4是根据本申请实施例提供的终端设备的结构框图。如图4所示的终端设备400包括处理单元401、触摸识别单元402和指纹识别单元403。FIG. 4 is a structural block diagram of a terminal device according to an embodiment of the present application. The terminal device 400 shown in FIG. 4 includes a processing unit 401, a touch recognition unit 402, and a fingerprint recognition unit 403.
处理单元401,用于在终端设备400处于解锁状态下判断触摸识别单元402在触摸识别区域获取到的输入的有效性,其中,处理单元401在指纹识别单元403采集到该输入的指纹信息的情况下,确定指纹数据库中是否保存匹配指纹模板,并在该指纹数据库中保存该匹配指纹模板时确定该输入为有效输入,而在该指纹数据库中未保存该匹配指纹模板或指纹识别单元403未采集到该输入的指纹信息的情况下确定该输入为无效输入,其中该匹配指纹模板为与该输入的指纹信息匹配的指纹模板。The processing unit 401 is configured to determine, when the terminal device 400 is in the unlocked state, the validity of the input acquired by the touch recognition unit 402 in the touch recognition area, where the processing unit 401 collects the input fingerprint information in the fingerprint identification unit 403. And determining whether the matching fingerprint template is saved in the fingerprint database, and determining that the input is a valid input when the matching fingerprint template is saved in the fingerprint database, and the matching fingerprint template is not saved in the fingerprint database or the fingerprint identification unit 403 is not collected. The input is determined to be an invalid input in the case of the input fingerprint information, wherein the matching fingerprint template is a fingerprint template that matches the input fingerprint information.
触摸识别单元402,用于确定该输入的输入信息,其中,该输入的输入信息包括该输入的持续时间和该输入的位置变化信息。The touch recognition unit 402 is configured to determine input information of the input, wherein the input input information includes a duration of the input and position change information of the input.
处理单元401,还用于根据该输入的输入信息,确定操作事件,并在该输入为有效输入的情况下,执行该操作事件,其中处理单元401在每次触摸识别单元402在该触摸识别区域获取到输入的情况下,判断触摸识别单元402获取到的输入的有效性。 The processing unit 401 is further configured to determine an operation event according to the input input information, and execute the operation event if the input is a valid input, where the processing unit 401 is in the touch recognition area each time the touch recognition unit 402 is located In the case where the input is obtained, the validity of the input acquired by the touch recognition unit 402 is judged.
在终端设备400处于解锁状态的情况下,用户的每次在触摸识别区域的输入均需要判断执行该输入的用户是否是合法用户。这样,即使终端设备400处于解锁状态,非合法用户也无法通过触摸操作对该端设备进行操作。这样,可以大大提高终端设备400的安全性。In the case where the terminal device 400 is in the unlocked state, each time the user inputs the touch recognition area, it is necessary to determine whether the user who performed the input is a legitimate user. Thus, even if the terminal device 400 is in the unlocked state, the non-legitimate user cannot operate the end device by a touch operation. In this way, the security of the terminal device 400 can be greatly improved.
可选的,在一些实施例中,处理单元401,还用于确定该终端设备正在运行指定应用,其中该指定应用是预先设置的应用。Optionally, in some embodiments, the processing unit 401 is further configured to determine that the terminal device is running a specified application, where the specified application is a preset application.
可选的,在一些实施例中,处理单元401,还用于确定该终端设备正在运行应用的指定功能模块,其中,该指定功能模块为用户预先设置的功能模块或者需要验证用户为合法用户才能访问的功能模块。Optionally, in some embodiments, the processing unit 401 is further configured to determine that the terminal device is running a specified function module of the application, where the designated function module is a function module preset by the user or needs to verify that the user is a legitimate user. Access to the function module.
具体地,触摸识别单元402,具体用于获取该输入的起始时刻和该输入的结束时刻,根据该输入的起始时刻和该输入的结束时刻,确定该输入的持续时间;获取该输入的起始位置和该输入的结束位置,根据该输入的起始位置和该输入的结束位置,确定该输入的位置变化信息。Specifically, the touch recognition unit 402 is configured to acquire a start time of the input and an end time of the input, and determine a duration of the input according to the start time of the input and the end time of the input; and acquiring the input The start position and the end position of the input determine the position change information of the input based on the start position of the input and the end position of the input.
具体地,处理单元401,具体用于根据该输入的持续时间和该输入的位置变化信息,确定该操作事件为单击操作或长按操作;或者处理单元401,具体用于根据该输入的位置变化信息,确定该操作事件为滑动操作。Specifically, the processing unit 401 is specifically configured to determine, according to the duration of the input and the position change information of the input, that the operation event is a click operation or a long press operation; or the processing unit 401, specifically for the location according to the input The change information determines that the operation event is a sliding operation.
处理单元401、触摸识别单元402和指纹识别单元403操作和功能可以参考上述方法的描述,为了避免重复,在此不再赘述。For the operations and functions of the processing unit 401, the touch recognition unit 402, and the fingerprint recognition unit 403, reference may be made to the description of the foregoing method. To avoid repetition, details are not described herein again.
处理单元401可以由处理器实现。触摸识别单元402可以由触摸传感器实现,该触摸传感器包括但不限于电容式触摸传感器、电感式触摸传感器。指纹识别单元403可以由指纹识别装置实现,该指纹识别装置包括但不限于按压式指纹识别装置、光学式指纹识别装置。 Processing unit 401 can be implemented by a processor. Touch recognition unit 402 can be implemented by a touch sensor including, but not limited to, a capacitive touch sensor, an inductive touch sensor. The fingerprint identification unit 403 can be implemented by a fingerprint recognition device including, but not limited to, a push type fingerprint recognition device and an optical fingerprint recognition device.
本领域技术人员可以理解,尽管未示出,终端设备400还可以包括一些其他的单元,例如,电源、通信单元、摄像单元等。Those skilled in the art will appreciate that although not shown, the terminal device 400 may also include some other units, such as a power source, a communication unit, an imaging unit, and the like.
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. A person skilled in the art can use different methods to implement the described functions for each particular application, but such implementation should not be considered to be beyond the scope of the present application.
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应 过程,在此不再赘述。A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working processes of the above described systems, devices and units can refer to the corresponding solutions in the foregoing method embodiments. The process will not be repeated here.
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。In the several embodiments provided by the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the device embodiments described above are merely illustrative. For example, the division of the unit is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed. In addition, the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including The instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) or a processor to perform all or part of the steps of the methods described in the various embodiments of the present application. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本申请的保护范围之内,因此本申请的保护范围应以权利要求的保护范围为准。 The foregoing is only a specific embodiment of the present application, but the scope of protection of the present application is not limited thereto, and any change or replacement that can be easily conceived by those skilled in the art within the technical scope disclosed by the present application is The scope of protection of the present application is intended to be covered by the scope of the claims.

Claims (10)

  1. 一种输入方法,其特征在于,所述方法包括:An input method, characterized in that the method comprises:
    在终端设备处于解锁状态下判断在触摸识别区域获取到的输入的有效性,包括:在采集到所述输入的指纹信息的情况下,确定指纹数据库中是否保存匹配指纹模版,若所述指纹数据库中保存所述匹配指纹模版,则确定所述输入为有效输入,若所述指纹数据库中未保存所述匹配指纹模版或未采集到所述输入的指纹信息的情况下,则确定所述输入为无效输入,其中,所述匹配指纹模版为与所述输入的指纹信息匹配的指纹模版;Determining the validity of the input acquired in the touch recognition area when the terminal device is in the unlocked state, including: determining, in the case of collecting the input fingerprint information, whether a matching fingerprint template is saved in the fingerprint database, if the fingerprint database And saving the matching fingerprint template, determining that the input is a valid input, and if the matching fingerprint template is not saved in the fingerprint database or the input fingerprint information is not collected, determining that the input is Invalid input, wherein the matching fingerprint template is a fingerprint template matching the input fingerprint information;
    确定所述输入的输入信息,其中,所述输入的输入信息包括所述输入的持续时间和所述输入的位置变化信息;Determining the input information of the input, wherein the input input information includes a duration of the input and location change information of the input;
    根据所述输入的输入信息,确定操作事件;Determining an operation event according to the input input information;
    在所述输入为有效输入的情况下,执行所述操作事件,其中,在每次在所述触摸识别区域获取到输入的情况下,判断获取到的输入的有效性。In the case where the input is a valid input, the operational event is performed, wherein the validity of the acquired input is determined each time an input is acquired in the touch recognition region.
  2. 如权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 wherein the method further comprises:
    在所述判断在触摸识别区域获取到的输入的有效性之前,确定所述终端设备正在运行指定应用,其中所述指定应用是预先设置的应用。Before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the specified application, wherein the specified application is a preset application.
  3. 如权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 wherein the method further comprises:
    在所述判断在触摸识别区域获取到的输入的有效性之前,确定所述终端设备正在运行应用的指定功能模块,其中,所述指定功能模块为用户预先设置的功能模块或者需要验证用户为合法用户才能访问的功能模块。Before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running the specified function module of the application, wherein the designated function module is a function module preset by the user or needs to verify that the user is legal A functional module that a user can access.
  4. 如权利要求1至3中任一项所述的方法,其特征在于,所述确定所述输入的输入信息,包括:The method according to any one of claims 1 to 3, wherein the determining the input information of the input comprises:
    获取所述输入的起始时刻和所述输入的结束时刻;Obtaining a start time of the input and an end time of the input;
    根据所述输入的起始时刻和所述输入的结束时刻,确定所述输入的持续时间;Determining a duration of the input according to a start time of the input and an end time of the input;
    获取所述输入的起始位置和所述输入的结束位置;Obtaining a starting position of the input and an ending position of the input;
    根据所述输入的起始位置和所述输入的结束位置,确定所述输入的位置变化信息。The input position change information is determined based on the input start position and the input end position.
  5. 如权利要求1至4中任一项所述的方法,其特征在于,所述根据所述输入的输入信息,确定操作事件,包括:The method according to any one of claims 1 to 4, wherein the determining an operation event according to the input input information comprises:
    根据所述输入的持续时间和所述输入的位置变化信息,确定所述操作事 件为单击操作或长按操作;或者Determining the operation according to the duration of the input and the position change information of the input Piece is a click or long press; or
    根据所述输入的位置变化信息,确定所述操作事件为滑动操作。The operation event is determined to be a sliding operation based on the input position change information.
  6. 一种终端设备,其特征在于,所述终端设备包括触摸识别单元、指纹识别单元和处理单元:A terminal device, characterized in that the terminal device comprises a touch recognition unit, a fingerprint recognition unit and a processing unit:
    所述处理单元,用于在所述终端设备处于解锁状态下判断所述触摸识别单元在触摸识别区域获取到的输入的有效性,其中,所述处理单元在所述指纹识别单元采集到所述输入的指纹信息的情况下,确定指纹数据库中是否保存匹配指纹模板,并在所述指纹数据库中保存所述匹配指纹模板时确定所述输入为有效输入,而在所述指纹数据库中未保存所述匹配指纹模板或所述指纹识别单元未采集到所述输入的指纹信息的情况下确定所述输入为无效输入,其中所述匹配指纹模板为与所述输入的指纹信息匹配的指纹模板;The processing unit is configured to determine, according to the terminal device that the terminal device is in an unlocked state, the validity of the input acquired by the touch recognition unit in the touch recognition area, where the processing unit collects the In the case of the input fingerprint information, it is determined whether a matching fingerprint template is saved in the fingerprint database, and when the matching fingerprint template is saved in the fingerprint database, the input is determined to be a valid input, and the fingerprint database is not saved. Determining that the input is an invalid input if the matching fingerprint template or the fingerprint identification unit does not collect the input fingerprint information, wherein the matching fingerprint template is a fingerprint template that matches the input fingerprint information;
    所述触摸识别单元,用于确定所述输入的输入信息,其中,所述输入的输入信息包括所述输入的持续时间和所述输入的位置变化信息;The touch recognition unit is configured to determine the input information of the input, wherein the input input information includes a duration of the input and location change information of the input;
    所述处理单元,还用于根据所述输入的输入信息,确定操作事件,并在所述输入为有效输入的情况下,执行所述操作事件;The processing unit is further configured to determine an operation event according to the input input information, and execute the operation event if the input is a valid input;
    其中所述处理单元在每次所述触摸识别单元在所述触摸识别区域获取到输入的情况下,判断所述触摸识别单元获取到的输入的有效性。Wherein the processing unit determines the validity of the input acquired by the touch recognition unit each time the touch recognition unit acquires an input in the touch recognition area.
  7. 如权利要求6所述的终端设备,其特征在于,所述处理单元,还用于在所述判断在触摸识别区域获取到的输入的有效性之前,确定所述终端设备正在运行指定应用,其中所述指定应用是预先设置的应用。The terminal device according to claim 6, wherein the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running a specified application, wherein The specified application is a pre-set application.
  8. 如权利要求6所述的终端设备,其特征在于,所述处理单元,还用于在所述判断在触摸识别区域获取到的输入的有效性之前,确定所述终端设备正在运行应用的指定功能模块,其中,所述指定功能模块为用户预先设置的功能模块或者需要验证用户为合法用户才能访问的功能模块。The terminal device according to claim 6, wherein the processing unit is further configured to: before determining the validity of the input acquired in the touch recognition area, determining that the terminal device is running a specified function of the application The module, wherein the designated function module is a function module preset by a user or a function module that needs to be verified that the user is a legitimate user.
  9. 如权利要求6至8中任一项所述的终端设备,其特征在于,所述触摸识别单元,具体用于获取所述输入的起始时刻和所述输入的结束时刻,根据所述输入的起始时刻和所述输入的结束时刻,确定所述输入的持续时间;获取所述输入的起始位置和所述输入的结束位置,根据所述输入的起始位置和所述输入的结束位置,确定所述输入的位置变化信息。The terminal device according to any one of claims 6 to 8, wherein the touch recognition unit is configured to acquire a start time of the input and an end time of the input, according to the input a start time and an end time of the input, determining a duration of the input; acquiring a start position of the input and an end position of the input, according to the input start position and the input end position Determining the position change information of the input.
  10. 如权利要求6至9中任一项所述的终端设备,其特征在于,所述处理单元,具体用于根据所述输入的持续时间和所述输入的位置变化信息,确 定所述操作事件为单击操作或长按操作;或者The terminal device according to any one of claims 6 to 9, wherein the processing unit is configured to determine, according to the duration of the input and the position change information of the input, Determining the operation event as a click operation or a long press operation; or
    根据所述输入的位置变化信息,确定所述操作事件为滑动操作。 The operation event is determined to be a sliding operation based on the input position change information.
PCT/CN2016/106783 2016-11-22 2016-11-22 Input method and terminal device WO2018094567A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680001827.1A CN106687970A (en) 2016-11-22 2016-11-22 Input method and terminal device
PCT/CN2016/106783 WO2018094567A1 (en) 2016-11-22 2016-11-22 Input method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/106783 WO2018094567A1 (en) 2016-11-22 2016-11-22 Input method and terminal device

Publications (1)

Publication Number Publication Date
WO2018094567A1 true WO2018094567A1 (en) 2018-05-31

Family

ID=58850524

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/106783 WO2018094567A1 (en) 2016-11-22 2016-11-22 Input method and terminal device

Country Status (2)

Country Link
CN (1) CN106687970A (en)
WO (1) WO2018094567A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325334B (en) * 2018-09-26 2020-11-13 维沃移动通信有限公司 Touch terminal control method and touch terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090235068A1 (en) * 2008-03-13 2009-09-17 Fujitsu Limited Method and Apparatus for Identity Verification
CN102467462A (en) * 2010-11-17 2012-05-23 中国移动通信集团公司 Method for protecting data stored in device and corresponding device
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103886239A (en) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 User authentication method and device of mobile terminal application program
CN104008321A (en) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 Judging method and judging system for identifying user right based on fingerprint for mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105022570A (en) * 2015-06-30 2015-11-04 广东欧珀移动通信有限公司 Method for controlling applications through fingerprint identification and terminal device
CN105678147B (en) * 2016-01-05 2020-03-20 网易(杭州)网络有限公司 Touch operation method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090235068A1 (en) * 2008-03-13 2009-09-17 Fujitsu Limited Method and Apparatus for Identity Verification
CN102467462A (en) * 2010-11-17 2012-05-23 中国移动通信集团公司 Method for protecting data stored in device and corresponding device
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103886239A (en) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 User authentication method and device of mobile terminal application program
CN104008321A (en) * 2014-05-28 2014-08-27 惠州Tcl移动通信有限公司 Judging method and judging system for identifying user right based on fingerprint for mobile terminal

Also Published As

Publication number Publication date
CN106687970A (en) 2017-05-17

Similar Documents

Publication Publication Date Title
US10824707B2 (en) Method and device for providing security content
US10248776B2 (en) Background enrollment and authentication of a user
KR102223416B1 (en) User-authentication gestures
CN106055996B (en) Multimedia information sharing method and mobile terminal
US10002244B2 (en) Utilization of biometric data
EP3482331B1 (en) Obscuring data when gathering behavioral data
CN107223254B (en) Method, user device, and storage medium for hidden setting processing
WO2017020427A1 (en) Application program access method and terminal
JP2014502763A (en) User identification using biokinematic input
CN106355141B (en) Portable electronic device and operation method thereof
CN105678147B (en) Touch operation method and device
EP2491515A2 (en) Resource access based on multiple credentials
WO2018107727A1 (en) Method and device for information processing, and terminal
CN104598792A (en) Terminal
WO2017016115A1 (en) Method and device for access control
CN105335088A (en) File sharing method and device
WO2018094567A1 (en) Input method and terminal device
Schaffer Expanding continuous authentication with mobile devices
JPWO2021131060A1 (en) Authentication system, authentication device, authentication method, and program
US20180239884A1 (en) Detection System, Fingerprint Sensor, and Method of Finger Touch Authentication Thereof
TWM556877U (en) Login verification device and login verification system
KR20150029251A (en) Method for securing object of electronic device and the electronic device therefor
Yıldırım et al. Mobile biometric security systems for today and future
JP2023012582A (en) Output control program, output control method, and terminal device
WO2018132970A1 (en) Private information handling method and terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16922118

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16922118

Country of ref document: EP

Kind code of ref document: A1