WO2019100368A1 - 应用程序的启动方法及显示方法、终端 - Google Patents

应用程序的启动方法及显示方法、终端 Download PDF

Info

Publication number
WO2019100368A1
WO2019100368A1 PCT/CN2017/113054 CN2017113054W WO2019100368A1 WO 2019100368 A1 WO2019100368 A1 WO 2019100368A1 CN 2017113054 W CN2017113054 W CN 2017113054W WO 2019100368 A1 WO2019100368 A1 WO 2019100368A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
area
fingerprint
fingerprint identification
terminal
Prior art date
Application number
PCT/CN2017/113054
Other languages
English (en)
French (fr)
Inventor
银国超
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to CN201780001810.0A priority Critical patent/CN108064370A/zh
Priority to PCT/CN2017/113054 priority patent/WO2019100368A1/zh
Publication of WO2019100368A1 publication Critical patent/WO2019100368A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/13Sensors therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4403Processor initialisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44568Immediately runnable code
    • G06F9/44578Preparing or optimising for loading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification

Definitions

  • the present application relates to the field of computer technology, and in particular, to an application startup method, display method, and terminal.
  • terminals such as smart phones, tablet computers, notebook computers, and smart watches have been greatly improved in hardware performance and software experience.
  • the use of rich applications on the terminal has penetrated into all aspects of daily life and brought great convenience to people's daily lives.
  • the existing application security startup process is: when the user clicks the application icon to open the application, an authentication interface pops up, prompting the user to perform password input, fingerprint input and the like, and if the authentication is passed, the application is started.
  • the inventor has found that at least the following problems exist in the prior art: in the existing application security startup process, after the user clicks on the icon, the user must wait for the authentication interface to pop up before the verification operation can be performed, and the startup process is relatively cumbersome and the verification efficiency is low.
  • the purpose of some embodiments of the present application is to provide an application startup method, a display method, and a terminal, which perform authentication when a user clicks an application icon, which simplifies the application security opening process and improves verification efficiency.
  • An embodiment of the present application provides a method for starting an application, where the fingerprint identification area of the terminal is located in at least part of the display area.
  • the method includes: when detecting that the application icon displayed in the display area is touched by the finger, the fingerprint collection is started. Function, and collect fingerprint information of the finger in the fingerprint identification area; use the fingerprint information for authentication, and when the authentication passes, start the application corresponding to the application icon.
  • the embodiment of the present application further provides a display method of an application, which is applied to a terminal, where a fingerprint identification area of the terminal is located in at least part of the display area.
  • the method includes: determining whether the terminal needs to be authenticated when starting in the terminal during the booting process of the terminal.
  • the application if it is determined that there is an application that needs to be authenticated at startup, the application icon corresponding to all the applications in the terminal is laid out according to the preset first policy, and the current display interface is generated; wherein, in the first policy, the application is started
  • the application icon corresponding to the application that needs to be authenticated is disposed in the fingerprint identification area; if it is determined that there is no application that needs to be authenticated at startup, the application icons corresponding to all the applications in the terminal are arranged according to the preset second policy, And generate the current display interface; display the current display interface in the display area.
  • the embodiment of the present application further provides a terminal, including at least one processor and a memory communicatively coupled to the at least one processor and a touch display screen communicatively coupled to the at least one processor;
  • the touch display screen includes a fingerprint identification area and a display An area, and the fingerprint identification area is located in at least a portion of the display area;
  • the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to execute the one of the application startup methods described above .
  • the embodiment of the present application further provides a terminal, including at least one processor and a memory communicatively coupled to the at least one processor and a touch display screen communicatively coupled to the at least one processor;
  • the touch display screen includes a fingerprint identification area and a display An area, and the fingerprint identification area is located in at least a portion of the display area;
  • the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to execute the display method of the application described above.
  • the fingerprint identification area of the terminal is located in the partial display area, and the method further includes: determining whether the touch position of the finger is located in the fingerprint identification area before starting the fingerprint collection function; wherein the fingerprint collection function is It is activated when it is determined that the touch position is within the fingerprint recognition area.
  • the touch position of the finger is determined, and the fingerprint collection function is started only when the touch position of the finger is located in the fingerprint recognition area.
  • the method before determining whether the touch position of the finger is located in the fingerprint identification area, the method further includes: determining whether the application corresponding to the application icon needs to be authenticated; and if determining that the application needs authentication, entering the determining finger The step of whether the touch location is within the fingerprint recognition area.
  • the method further includes: acquiring a contact area of the finger with the fingerprint recognition area when the application icon is touched; and determining whether the contact area is It is larger than the preset area; if it is determined that the contact area is larger than the preset area, the step of starting the fingerprint collection function is entered.
  • the method of the embodiment it is possible to avoid contact When the area is smaller than the preset area, the collected fingerprint information is less reliable and may not be able to pass the authentication, and the fingerprint collection is still performed (in this case, the unnecessary burden of the processor is increased and the authentication efficiency is lowered) At the same time, it is also possible to avoid the situation where the user accidentally touches (may accidentally touch the finger) while still performing fingerprint collection.
  • the fingerprint identification area of the terminal is located in the entire display area, and the fingerprint collection function is directly activated when detecting that the finger touches the application icon displayed in the display area.
  • the fingerprint collection function is directly activated when the fingerprint identification area of the terminal is located in the entire display area, if a finger touch is detected.
  • another preset authentication process is started.
  • another preset authentication process is provided for the user to perform authentication.
  • the application icon corresponding to the application is laid out to the fingerprint identification area. In and show it out.
  • the application icon corresponding to the application is laid out in the fingerprint identification area, so that the user can quickly perform the application icon of the application after clicking the application icon. Authentication.
  • the application icons corresponding to all the applications in the terminal are arranged in an area other than the fingerprint identification area in the display area. In this embodiment, it is determined that there is no application that needs to be authenticated at startup. When the application icon is not laid out in the fingerprint identification area, the application that does not need to be authenticated at startup is not authenticated.
  • the method before determining whether there is an application that needs to be authenticated at the startup, the method further includes: determining whether the fingerprint identification area is at least partially valid; and determining whether the fingerprint identification area is at least partially valid, entering whether to determine whether There is a step of an application that needs to be authenticated at startup; wherein, in the first policy, an application icon corresponding to an application that needs to be authenticated at startup is placed in an effective part of the fingerprint identification area.
  • determining whether the fingerprint identification area is available or not may prevent the application icon corresponding to the application that needs to be authenticated at the time of startup from being laid out in the fingerprint identification area that is invalid (may be invalid due to damage), thereby causing subsequent The fingerprint is not recognized or the recognition is inaccurate.
  • the application icons corresponding to all the applications in the terminal are laid out according to the second policy.
  • This embodiment provides a layout manner of an application icon corresponding to an application in the terminal when the fingerprint identification areas are invalid.
  • FIG. 1 is a schematic view of a display area in a first embodiment according to the present application.
  • FIG. 2 is a specific flowchart of a method for starting an application according to a first embodiment of the present application
  • FIG. 3 is a specific flowchart of a method for starting an application according to a second embodiment of the present application
  • FIG. 4 is a specific flowchart of a method for starting an application according to a third embodiment of the present application.
  • FIG. 5 is a specific flowchart of a method for starting an application according to a fourth embodiment of the present application.
  • FIG. 6 is a specific flowchart of a method for starting an application according to a fifth embodiment of the present application.
  • FIG. 7 is a specific flowchart of a method for starting an application according to a sixth embodiment of the present application.
  • FIG. 8 is a specific flowchart of a display method of an application program according to a seventh embodiment of the present application.
  • FIG. 9 is a schematic diagram of a display area in a seventh embodiment of the present application.
  • FIG. 10 is a specific flowchart of a display method of an application program according to an eighth embodiment of the present application.
  • FIG. 11 is a specific flowchart of a display method of an application program according to a ninth embodiment of the present application.
  • the first embodiment of the present application relates to an application startup method, which is applied to a terminal, such as a mobile phone or a tablet computer.
  • the terminal has a touch display screen, and the touch display screen has a display area, and the touch display screen has a fingerprint under the touch display screen.
  • the sensor that is, the touch display screen includes a fingerprint recognition area, and the fingerprint recognition area is located in at least part of the display area.
  • the fingerprint sensor can collect a fingerprint when the user's finger touches the fingerprint recognition area.
  • the number of the fingerprint identification areas may be one or more. As shown in FIG. 1 , the plurality of fingerprint identification areas 1 are evenly distributed in the display area 2, below each of the fingerprint identification areas 1.
  • a fingerprint sensor is provided uniformly, and each fingerprint sensor is connected to the fingerprint recognition processor.
  • the plurality of fingerprint identification areas 1 may respectively correspond to at least part of the application diagrams of the terminal.
  • the display area, that is, each fingerprint identification area 1 may correspond to an application icon displayed in the display area of the terminal.
  • the number of application icons may be more than the number of fingerprint recognition areas, that is, only a part of the display icon is configured with a fingerprint sensor, so when the above display icon is touched, the corresponding fingerprint is triggered. The sensor activates the fingerprint recognition function in the screen.
  • the specific number and shape of the fingerprint identification area 1 and the arrangement manner in the display area 2 are not limited.
  • the fingerprint sensor is, for example, an optical fingerprint sensor or an ultrasonic fingerprint sensor. Capacitive fingerprint sensor, however, this embodiment does not impose any limitation on the type of fingerprint sensor.
  • step 101 it is determined whether the finger touches the application icon displayed in the display area. If yes, go to step 102; if no, it will end directly.
  • the touch display screen detects that the user touches the touch display screen with a finger
  • the touch position of the finger is acquired, and according to the touch position of the finger, whether the finger touches the application icon displayed in the display area can be determined.
  • the touch position is a contact position between the finger and the touch display screen.
  • the finger and the touch display screen generally have multiple contact points. Therefore, the touch position can be represented as a set of coordinates of the plurality of contact points, and the touch position can be represented as a touch display. A range of coordinates in the screen coordinate system.
  • the position of each application icon in the display area may also be represented as a coordinate range in the display coordinate system (the application icon has a certain size, which includes the coordinates of all points within the application icon range), and thus, according to the touch
  • the position is to determine whether the finger touches the application icon.
  • a specific determination manner is provided (which is not limited thereto): when it is determined that the coordinates of at least part of the contact points touched by the finger are within the coordinate range of the application icon, determining that the finger touches the application icon in the display area .
  • the unit of the coordinates is a pixel; when it is determined that the application icon displayed in the finger touch display area is detected, the process proceeds to step 102; When it is determined that the coordinates of all the contact points touched by the finger are located outside the coordinate range of the application icon, it is determined that the user does not detect that the application icon displayed in the display area is touched with the finger, and then directly ends.
  • step 102 is further included:
  • Step 102 Determine whether the touch position of the finger is located in the fingerprint recognition area; if yes, proceed to step 103; if not, end directly.
  • the position of the fingerprint recognition area in the display area can also be represented as a coordinate range, so that it can be determined according to the coordinates of the contact point and the coordinate range of the fingerprint identification area whether or not the coordinates of at least one contact point are included in the fingerprint identification area. Within the coordinate range.
  • Step 103 Start a fingerprint collection function, and collect fingerprint information of the finger in the fingerprint identification area.
  • the fingerprint collection function is started, and the fingerprint information of the finger in the fingerprint identification area is collected by the fingerprint sensor below the fingerprint identification area, and the fingerprint information may be a fingerprint image of the user's finger.
  • step 104 the fingerprint information is used for authentication. If the authentication is passed, the process proceeds to step 105; if the authentication fails, the process proceeds to step 106.
  • the fingerprint image (fingerprint information) of the collected finger is matched with the preset fingerprint image in the terminal, and when a preset fingerprint image matches the fingerprint image of the collected finger, the authentication is determined. Go to step 105; otherwise, it indicates that the fingerprint image of the owner of the non-terminal or the collected finger cannot be authenticated. In this case, proceed to step 106 to start another authentication process. For the user to re-authenticate. It should be noted that all applications that need to be authenticated at startup can preset the same fingerprint information (ie, fingerprint images of different fingers), and can also preset different fingerprint information.
  • Step 105 Launch an application corresponding to the application icon.
  • each application has a corresponding application icon, so that when the application icon touched by the finger is determined, the application corresponding to the application icon can be determined, and when the authentication is passed, the application icon is activated.
  • the corresponding application is for the user to use.
  • step 106 another authentication process is initiated.
  • another authentication process is initiated, and another authentication process is specifically: providing a preset prompt interface, prompting the user to perform authentication according to a preset manner, for example, prompting The user enters a password for authentication, prompts the user to draw a preset pattern for authentication, or authenticates through other non-screen fingerprint sensors (eg, a capacitive fingerprint sensor mounted on the back of the terminal, but not limited thereto).
  • a preset prompt interface prompting the user to perform authentication according to a preset manner, for example, prompting
  • prompting the user enters a password for authentication, prompts the user to draw a preset pattern for authentication, or authenticates through other non-screen fingerprint sensors (eg, a capacitive fingerprint sensor mounted on the back of the terminal, but not limited thereto).
  • the terminal satisfies the following conditions when the application icon is laid out: the application layout that needs to be authenticated at startup is displayed in the fingerprint identification area, and is not required to be activated.
  • the application layout of the authentication is displayed in the area outside the fingerprint identification area in the display area; however, this embodiment does not impose any limitation on this, and can also be understood as: for the authentication, the authentication is required, but the fingerprint identification area is not required for fingerprinting.
  • the application icon corresponding to the application may be displayed in an area outside the fingerprint identification area in the display area.
  • step 102 if the touch position of the finger is determined to be located in the fingerprint When the area is identified, step 106 can also be entered to initiate another authentication process.
  • this embodiment is a finger when the user touches the application icon with a finger.
  • the touch position is judged.
  • the touch position is in the fingerprint recognition area, the fingerprint information of the finger is collected and authenticated, and when the authentication is passed, the corresponding application is opened; that is, when the user touches the application icon with the finger.
  • the second embodiment of the present application relates to a method for starting an application.
  • the embodiment is an improvement based on the first embodiment.
  • the main improvement is that the application corresponding to the application icon needs to be authenticated.
  • the step 201 is substantially the same as the step 101.
  • the step 203 to the step 207 are substantially the same as the step 102 to the step 106, and are not described here.
  • the main difference is that step 202 is added, as follows:
  • Step 202 Determine whether an application corresponding to the application icon needs to be authenticated. If yes, go to step 203; if no, it will end directly.
  • the system when the terminal is powered on, the system performs an initialization operation to obtain an authentication list of the application that needs to be authenticated at startup (ie, the authentication list includes all applications that need authentication at startup); the authentication list Set for the terminal to run, the user sets an application to require authentication when starting, then add the application to the authentication list.
  • the authentication list it can be determined whether the application corresponding to the application icon touched by the user's finger needs authentication. If it is determined that the application corresponding to the application icon touched by the user's finger needs to be authenticated, the process proceeds to step 203 (same as step 102 in the first embodiment) to determine whether the touch position of the finger is located in the fingerprint recognition area; otherwise, it ends directly.
  • the authentication list of the application that needs to be authenticated at the time of initialization is taken as an example, but is not limited thereto; for example, when the system is initialized, each application in the terminal may also be sequentially used.
  • This embodiment can be applied to two layout modes of application icons.
  • the first mode when the terminal is powered on, the application list obtained by the system needs an application that needs to be authenticated at startup, and an application that needs authentication when starting up.
  • the layout is displayed in the fingerprint identification area, and the application layout that does not require authentication when starting is displayed in the area outside the fingerprint identification area in the display area; the second way, when the terminal is powered on, if the system does not have the authentication list obtained
  • the system will evenly arrange all the application icons in the display area (including the fingerprint identification area) according to the common icon layout manner; in the second mode, the method of the embodiment is adopted. It can prevent the user from using the finger to touch the application icon located in the fingerprint identification area (without authentication at startup), and still perform authentication operation.
  • the third embodiment of the present application relates to a method for starting an application, and the embodiment is an improvement based on the first embodiment, and the main improvement is that the contact area is judged.
  • Step 301 and step 302 are substantially the same as steps 101 and 102.
  • Steps 305 to 308 are substantially the same as steps 103 to 106, and are not described here.
  • the main difference is that step 303 and step 304 are added. details as follows:
  • Step 303 Acquire a contact area of the finger with the fingerprint recognition area when the application icon is touched.
  • step 302 it is determined that the touch location is located in the fingerprint recognition area, that is, at least one contact point of the finger and the touch display screen is located at the fingerprint.
  • the area of the graphic formed by the contact points located in the fingerprint recognition area is the contact area of the finger with the fingerprint recognition area when the application icon is touched.
  • step 304 it is determined whether the contact area is greater than a preset area. If yes, go to step 305; if no, go to step 308.
  • the fingerprint information of the finger is relatively reliable (that is, the fingerprint image is relatively complete)
  • the pass rate of the authentication is high, and the process proceeds to step 305 (the same as step 103 in the first embodiment) to start the fingerprint collection function, and
  • the fingerprint information of the finger is collected in the fingerprint identification area; when the contact area is less than or equal to the preset area, the process proceeds to step 308 (same as step 106 in the first embodiment) to start another authentication process for the user to re-examine. right.
  • determining that the contact area is less than or equal to the preset area may be caused by one of the following two situations: one is that the user accidentally touches the application icon, and the other is that the user really wants to open the application, but the touch application icon is too light.
  • a user's accidental touch there is no need to perform fingerprint collection for authentication.
  • the fingerprint information collected by the finger is unreliable due to the small contact area, and the pass rate of the authentication is low; that is, even if the user is the owner of the electronic device, it is likely that the authentication cannot be passed. .
  • the present embodiment can avoid the case where the fingerprint information collected is less reliable when the contact area is smaller than the preset area, and the fingerprint collection is still possible when the authentication is not possible. In this case, the unnecessary burden of the processor is increased and the authentication efficiency is lowered. At the same time, it is also possible to prevent the user from accidentally touching (possibly touching the finger accidentally) while still performing fingerprint collection. It should be noted that the present embodiment can also be used as an improvement on the basis of the second embodiment, and the same technical effects can be achieved.
  • the fourth embodiment of the present application relates to a method for starting an application.
  • the embodiment is substantially the same as the first embodiment.
  • the main difference is that in the first embodiment, the fingerprint identification area of the touch display screen is partially displayed.
  • the fingerprint recognition area of the touch display screen is located in the entire display area, that is, the fingerprint sensor is uniformly disposed under the entire display area, and the fingerprint sensor can be A fingerprint is acquired when the user's finger touches the fingerprint recognition area (display area).
  • a large-sized fingerprint recognition sensor may be disposed under the display area of the terminal such that the fingerprint recognition area of the fingerprint recognition sensor covers the entire display area. Therefore, when the application icon inside the display area is touched, the fingerprint recognition sensor is triggered. Start the on-screen fingerprint recognition function.
  • the fingerprint sensor is, for example, an optical fingerprint sensor, an ultrasonic fingerprint sensor, or a capacitive fingerprint sensor.
  • the present embodiment does not impose any limitation on the type of the fingerprint sensor.
  • step 401 it is determined whether the finger touches the application icon displayed in the display area. If yes, go to step 402; if no, it will end directly.
  • the touch display screen detects that the user touches the touch display screen with a finger
  • the touch position of the finger is acquired, and according to the touch position of the finger, whether the finger touches the application icon displayed in the display area can be determined.
  • the touch position is a contact position between the finger and the touch display screen.
  • the finger and the touch display screen generally have multiple contact points. Therefore, the touch position can be represented as a set of coordinates of the plurality of contact points, and the touch position can be represented as display screen coordinates. A range of coordinates in the system.
  • the position of each application icon in the display area may also be represented as a coordinate range in the display coordinate system (the application icon has a certain size, which includes the coordinates of all points within the application icon range), and thus, according to the touch
  • the position is to determine whether the finger touches the application icon.
  • a specific determination manner is provided (which is not limited thereto): when it is determined that the coordinates of at least part of the contact points touched by the finger are within the coordinate range of the application icon, determining that the finger touches the application icon in the display area .
  • the unit of the coordinate is a pixel; when it is determined that the application icon displayed in the finger touch display area is detected, the process proceeds to step 102; when it is determined that the coordinates of all the touch points touched by the finger are located outside the coordinate range of the application icon If it is determined that the user does not touch the application icon displayed in the display area with the finger, the process ends directly.
  • Step 402 Start a fingerprint collection function, and collect fingerprint information of the finger in the fingerprint identification area.
  • the fingerprint identification area is located in the entire display area, it is not necessary to determine whether the touch position of the finger is located in the fingerprint identification area, and the fingerprint collection function can be directly activated, and the fingerprint identification area is collected in the fingerprint identification area by the fingerprint sensor below the fingerprint identification area.
  • Fingerprint information of the finger inside the fingerprint information may be a fingerprint image of the user's finger.
  • step 403 the fingerprint information is used for authentication. If the authentication is passed, the process proceeds to step 404; if the authentication fails, the process proceeds to step 405.
  • the fingerprint image (fingerprint information) of the collected finger is matched with the preset fingerprint image in the terminal, and when a preset fingerprint image matches the fingerprint image of the collected finger, the authentication is determined. If yes, the fingerprint image of the owner of the non-terminal or the collected finger is unclear and cannot be authenticated. In this case, the process proceeds to step 405 to start another authentication process for the user to re-authenticate. It should be noted that all applications that need to be authenticated at startup can preset the same fingerprint information (ie, fingerprint images of different fingers), and can also preset different fingerprint information. .
  • Step 404 launch an application corresponding to the application icon.
  • each application has a corresponding application icon, so that when the application icon touched by the finger is determined, the application corresponding to the application icon can be determined, and when the authentication is passed, the application icon is activated.
  • the app is for users to use.
  • step 405 another authentication process is initiated.
  • another authentication process is initiated, and another authentication process specifically provides a preset prompt interface, prompting the user to perform authentication according to a preset manner. For example, prompting the user to enter a password for authentication, prompting the user to draw a preset pattern for authentication, or performing other non-screen fingerprint sensors (such as a capacitive fingerprint sensor mounted on the back of the terminal, but not limited thereto) right.
  • a preset prompt interface prompting the user to perform authentication according to a preset manner. For example, prompting the user to enter a password for authentication, prompting the user to draw a preset pattern for authentication, or performing other non-screen fingerprint sensors (such as a capacitive fingerprint sensor mounted on the back of the terminal, but not limited thereto) right.
  • the present embodiment provides a method for starting an application in which the fingerprint recognition area of the touch display screen is located in the entire display area.
  • the fifth embodiment of the present application relates to a method for starting an application.
  • the embodiment is an improvement based on the fourth embodiment.
  • the main improvement is that the application corresponding to the application icon needs to be authenticated.
  • Step 501 is substantially the same as step 401.
  • Steps 503 to 506 are substantially the same as steps 402 to 405, and are not described here. The main difference is that step 502 is added, as follows:
  • Step 502 Determine whether an application corresponding to the application icon needs to be authenticated. If yes, go to step 503; if no, it will end directly.
  • the system when the terminal is powered on, the system performs an initialization operation to obtain an authentication list of the application that needs to be authenticated at startup (ie, the authentication list includes all applications that need authentication at startup); the authentication list Set for the terminal to run, the user sets an application to require authentication when starting, then add the application to the authentication list.
  • the authentication list it can be determined whether the application corresponding to the application icon touched by the user's finger needs authentication. If it is determined that the application corresponding to the application icon touched by the user's finger needs to be authenticated, the process proceeds to step 203 (same as step 102 in the first embodiment) to determine whether the touch position of the finger is located in the fingerprint recognition area; otherwise, it ends directly.
  • the system is It is not necessary to adjust the application icons displayed in the display area, or to place the application icons corresponding to the frequently used applications in an easy-to-touch position according to the frequency of use of the user (for example, in the middle and lower areas of the touch screen, limit).
  • the system obtains an authentication list of an application that needs to be authenticated at the time of initialization, but is not limited thereto; for example, when the system is initialized, each application in the terminal may be sequentially The state (initial authentication or authentication is not required at startup) is queried to obtain all applications that require authentication at startup, but this embodiment does not impose any restrictions.
  • the system since the fingerprint recognition area of the touch display screen is located in the entire display area, the system will display all the application icons according to the common icon layout mode (the application that needs to be authenticated at startup does not need to be authenticated at startup).
  • the application is evenly laid out in the display area (including the fingerprint recognition area).
  • the sixth embodiment of the present application relates to a method for starting an application, and the embodiment is an improvement based on the fourth embodiment, and the main improvement is that the contact area is judged.
  • Step 601 and step 401 are substantially the same, and steps 604 to 607 are substantially the same as steps 402 to 405, and are not described here again.
  • steps 602 and 603 are added, as follows:
  • Step 602 Acquire a contact area of the finger with the fingerprint recognition area when the application icon is touched.
  • step 601 when the finger touches the application icon displayed in the display area, that is, at least one of the plurality of contact points of the finger and the touch display screen is contacted.
  • the point is located in the coordinate range of the fingerprint identification area and is located in the fingerprint identification area.
  • the area of the graphic composed of the contacts is the contact area of the finger between the touch application icon and the fingerprint recognition area.
  • step 603 it is determined whether the contact area is greater than a preset area. If yes, go to step 604; if no, go to step 605.
  • the fingerprint information of the finger is relatively reliable (that is, the fingerprint image is relatively complete)
  • the pass rate of the authentication is high, and the process proceeds to step 305 (the same as step 103 in the first embodiment) to start the fingerprint collection function, and
  • the fingerprint information of the finger is collected in the fingerprint identification area; when the contact area is less than or equal to the preset area, the process proceeds to step 308 (same as step 106 in the first embodiment) to start another authentication process for the user to re-examine. right.
  • determining that the contact area is less than or equal to the preset area may be caused by one of the following two situations: one is that the user accidentally touches the application icon, and the other is that the user really wants to open the application, but the touch application icon is too light.
  • a user's accidental touch there is no need to perform fingerprint collection for authentication.
  • the fingerprint information collected by the finger is unreliable due to the small contact area, and the pass rate of the authentication is low; that is, even if the user is the owner of the electronic device, it is likely that the authentication cannot be passed. .
  • the present embodiment can avoid the case where the fingerprint information collected is less reliable when the contact area is smaller than the preset area, and the fingerprint collection is still possible when the authentication is not possible. In this case, the unnecessary burden of the processor is increased and the authentication efficiency is lowered. At the same time, it is also possible to prevent the user from accidentally touching (possibly touching the finger accidentally) while still performing fingerprint collection. It should be noted that the present embodiment can also be used as an improvement on the basis of the fifth embodiment, and the same technical effects can be achieved.
  • the seventh embodiment of the present application relates to a display method of an application, which is applied to a terminal, such as a hand.
  • the device has a touch display screen, the touch display has a display area, the fingerprint recognition area of the touch display screen is located in at least part of the display area, and the fingerprint recognition area is a display area with a fingerprint sensor disposed below, the fingerprint
  • the sensor can acquire a fingerprint when the user's finger touches the fingerprint recognition area.
  • the fingerprint identification area is located in the partial display area, the number of the fingerprint identification areas may be one or more. As shown in FIG. 1 , multiple fingerprint identification areas are evenly distributed in the display area, and each fingerprint identification area is uniformly disposed below.
  • the fingerprint sensor is not limited in any way, and the fingerprint sensor is, for example, an optical fingerprint sensor. There is no restriction on the type of fingerprint sensor.
  • Step 701 During the startup process of the terminal, determine whether there is an application in the terminal that needs to be authenticated when starting. If yes, go to step 702; if no, go to step 703.
  • the system performs an initialization operation to obtain an authentication list of the application that needs to be authenticated at startup (that is, the authentication list includes all applications that need authentication at startup); authentication The list is set during the operation of the terminal. If the user sets an application to require authentication when starting, the application is added to the authentication list. According to the authentication list, it is possible to determine whether there is an application that needs authentication at startup; if it is determined that there is an application that needs authentication at startup, the process proceeds to step 702. Otherwise, it proceeds to step 703.
  • the authentication list of the application that needs to be authenticated at the time of initialization is taken as an example, but the system does not need to be limited to this, and the system may sequentially perform the application to each application in the terminal.
  • the state authentication at startup or authentication is not required at startup
  • the state is queried to obtain all applications that require authentication at startup, but this embodiment does not impose any restrictions.
  • Step 702 Deploy an application icon corresponding to all applications in the terminal according to the preset first policy, and generate a current display interface.
  • the authentication list of the application that needs to be authenticated at the time of startup is obtained, and the application icon corresponding to the application that needs to be authenticated at the time of startup is disposed in the fingerprint identification area, and the application icon corresponding to the application that does not need to be authenticated at startup is applied. Then, the area is outside the fingerprint identification area, and the current display interface is generated.
  • the display area 2 includes a fingerprint identification area 1.
  • the number of applications that need to be authenticated at startup is six, and the application icons 3 corresponding to the six applications are evenly placed in the fingerprint identification area 1; Illustratively, the present embodiment does not impose any restrictions on the shape, number, and location of the fingerprint identification area 1, and the number and layout of applications that need to be authenticated at startup.
  • the fingerprint recognition area cannot drop all the application icons
  • the application icons corresponding to the application icon touched when the finger leaves the fingerprint recognition area is used as an application to be opened by the user.
  • the fingerprint identification area of the terminal is located in the entire display area, the application icons corresponding to all applications in the terminal can be arbitrarily arranged in the display area according to user requirements.
  • Step 703 Layout the application icons corresponding to all the applications in the terminal according to the preset second policy, and generate a current display interface.
  • the system will uniformly arrange all the application icons in the display area (including the fingerprint identification area) according to the common icon layout manner; If the fingerprint identification area of the terminal is located in the partial display area (that is, the terminal fingerprint identification area is not located in the entire display area), the application icons corresponding to all applications in the terminal may be disposed outside the fingerprint identification area in the display area. Area.
  • Step 704 displaying a current display interface in the display area.
  • the eighth embodiment of the present application relates to a display method of an application program.
  • the present embodiment is improved on the basis of the seventh embodiment.
  • the main improvement is that the layout of the application icons in the fingerprint identification area is performed during the operation of the terminal. Update.
  • steps 801 to 804 are substantially the same as the steps 701 to 704, and are not described here again.
  • steps 805 and 806 are added, as follows:
  • step 805 during the operation of the terminal, it is determined whether the state of the application is detected to require authentication from the time when the activation is not required to be changed to the startup; if yes, the process proceeds to step 806; if not, the process ends.
  • the state of an application is changed from the time when the authentication is not required to the activation to the activation, for example, the user just downloads an application, and the application is considered to be related to the individual.
  • Property or privacy when the status of the application is changed to require authentication at startup, proceed to step 806; otherwise, it ends directly.
  • Step 806 Layout the application icon corresponding to the application into the fingerprint recognition area, and display it.
  • the application icon corresponding to the application is laid out in the fingerprint identification area, and the display is regenerated.
  • the interface is displayed in the display area; that is, the application icon can be laid out into the fingerprint recognition area without being restarted by the restart system, so that the user can quickly perform authentication when the user touches the application icon next time (using the first The startup method of the application of any of the embodiments to the sixth embodiment).
  • the application icon corresponding to the application is laid out in the fingerprint identification area, so that the user clicks on the application afterwards.
  • authentication can be performed quickly.
  • the ninth embodiment of the present application relates to a display method of an application program.
  • the present embodiment is improved on the basis of the eighth embodiment, and the main improvement is to determine whether the display area is valid.
  • Step 902 to step 905 are substantially the same as steps 701 to 704, and are not described here again.
  • the main difference is that step 901 is added, as follows:
  • step 901 during the booting process of the terminal, it is determined whether the fingerprint identification area is at least partially valid. If yes, go to step 902; if no, go to step 904.
  • the fingerprint identification area is at least partially effective, that is, whether the fingerprint sensor disposed under the pattern recognition area can work normally; the fingerprint identification area is valid, the fingerprint sensor disposed under the pattern can work normally, and the fingerprint identification area is invalid.
  • the fingerprint sensor placed underneath does not work properly.
  • the fingerprint identification area may be one or more, and each fingerprint identification area is uniformly provided with a fingerprint sensor.
  • each hardware (including the fingerprint sensor) in the terminal is detected, and when detected, When at least one fingerprint sensor is working normally, the fingerprint identification area corresponding to the at least one fingerprint sensor is considered to be valid, that is, the fingerprint identification area is determined to be at least partially valid, and the process proceeds to step 902 (step 701 in the seventh embodiment) to determine the terminal.
  • step 902 step 701 in the seventh embodiment
  • step 904 step 703 in the seventh embodiment
  • the application icon corresponding to all applications in the terminal, and generates the current display interface.
  • the present embodiment determines whether the fingerprint identification area is available, and can prevent the application icon corresponding to the application that needs to be authenticated from being deployed in the invalid fingerprint identification area. It should be noted that the present embodiment can also be used as an improvement on the basis of the eighth embodiment, and the same technical effects can be achieved.
  • the tenth embodiment of the present invention relates to a terminal, such as a mobile phone, a tablet computer, etc.
  • the terminal has a touch display screen
  • the touch display screen has a display area
  • the fingerprint recognition area of the touch display screen is located in at least part of the display area
  • the fingerprint recognition The area is a display area with a fingerprint sensor disposed below, and the fingerprint sensor can collect a fingerprint when the user touches the fingerprint identification area.
  • the fingerprint identification area may include a plurality of fingerprint identification areas, and the plurality of fingerprint identification areas are randomly distributed in the display area, and each of the fingerprint identification areas is provided with a fingerprint sensor.
  • the fingerprint sensor is, for example, an optical fingerprint sensor, but is not limited thereto.
  • the terminal in this embodiment includes at least one processor and a memory communicatively coupled to the at least one processor and a touch display screen communicatively coupled to the at least one processor.
  • the touch display screen includes a fingerprint identification area and a display area, and the fingerprint identification area is located in at least part of the display area; the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to enable the at least one processor
  • the startup method of the application of any of the first to sixth embodiments is performed.
  • the fingerprint information of the finger is collected and authenticated, and when the authentication is passed, the corresponding application is opened; that is, the user touches the application with the finger.
  • the authentication of the icon at the same time simplifies the authentication process of the application and improves the authentication efficiency.
  • the eleventh embodiment of the present invention relates to a terminal, such as a mobile phone, a tablet computer, etc.
  • the terminal has a touch display screen
  • the touch display screen has a display area
  • the fingerprint recognition area of the touch display screen is located in at least part of the display area
  • the identification area is a display area on which a fingerprint sensor is disposed, and the fingerprint sensor can collect a fingerprint when the user touches the fingerprint identification area.
  • the fingerprint identification area may include a plurality of fingerprint identification areas, and the plurality of fingerprint identification areas are randomly distributed in the display area, and each of the fingerprint identification areas is provided with a fingerprint sensor.
  • the fingerprint sensor is, for example, an optical fingerprint sensor, but is not limited thereto.
  • the terminal in this embodiment includes at least one processor and a memory communicatively coupled to the at least one processor and a touch display screen communicatively coupled to the at least one processor.
  • the touch display screen includes a fingerprint identification area and a display area, and the fingerprint identification area is located in at least part of the display area; the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to enable the at least one processor
  • a display method of an application of any of the seventh to ninth embodiments is performed.
  • the processor in this embodiment may be an application manager for arranging application icons corresponding to all applications in the display area.
  • the embodiment does not impose any limitation on the type of the processor.
  • the terminal in the tenth embodiment may be merged with the terminal in the eleventh embodiment, that is, the application of any one of the first embodiment to the sixth embodiment is implemented by using one terminal.
  • the method of starting the program and the method of displaying the application of any of the seventh embodiment to the ninth embodiment are not limited in this embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种应用程序的启动方法及显示方法、终端,涉及计算机技术领域。应用程序的启动方法包括:判断是否检测到手指触摸显示区域内显示的应用图标(101),判断手指的触摸位置是否位于指纹识别区域内(102),若是则启动指纹采集功能,并在指纹识别区域内采集手指的指纹信息(103);利用指纹信息进行鉴权(104),并在鉴权通过时,启动应用图标对应的应用程序(105)。该方法和终端,在用户点击应用图标的同时进行鉴权,简化了应用安全打开流程,提高了验证效率。

Description

应用程序的启动方法及显示方法、终端 技术领域
本申请涉及计算机技术领域,特别涉及一种应用程序的启动方法及显示方法、终端。
背景技术
随着无线通信技术与计算机编程技术的不断发展成熟,使得智能手机、平板电脑、笔记本电脑、智能手表等终端在硬件性能及软件体验上均得到了较大的提升。终端上丰富的应用的使用已经深入到日常生活的各个方面,并给人们的日常生活带来了极大的便捷。
对于一些涉及个人隐私或个人财产的应用,例如微信、支付宝等,则需要保证其安全性,用户可以设置安全启动方式来启动这些应用。现有的应用安全启动流程为:在用户点击应用图标打开应用时,弹出一个鉴权界面,提示用户进行密码输入、指纹输入等操作,若鉴权通过则启动应用。
发明人发现现有技术至少存在以下问题:在现有的应用安全启动流程中,用户在点击图标后,必须等待弹出鉴权界面后,才能进行验证操作,启动流程相对比较繁琐,验证效率低。
发明内容
本申请部分实施例的目的在于提供一种应用程序的启动方法及显示方法、终端,在用户点击应用图标的同时进行鉴权,简化了应用安全打开流程,提高了验证效率。
本申请实施例提供了一种应用程序的启动方法,应用于终端,终端的指纹识别区域位于至少部分显示区域内;方法包括:当检测到手指触摸显示区域内显示的应用图标时,启动指纹采集功能,并在指纹识别区域内采集手指的指纹信息;利用指纹信息进行鉴权,并在鉴权通过时,启动应用图标对应的应用程序。
本申请实施例还提供了一种应用程序的显示方法,应用于终端,终端的指纹识别区域位于至少部分显示区域内;方法包括:在终端开机过程中,判断终端中是否存在启动时需要鉴权的应用程序;若判定存在启动时需要鉴权的应用程序,按照预设的第一策略布局终端中的所有应用程序对应的应用图标,并生成当前显示界面;其中,第一策略中,将启动时需要鉴权的应用程序对应的应用图标布局在指纹识别区域内;若判定不存在启动时需要鉴权的应用程序,按照预设的第二策略布局终端中的所有应用程序对应的应用图标,并生成当前显示界面;在显示区域显示当前显示界面。
本申请实施例还提供了一种终端,包括至少一处理器以及与至少一个处理器通信连接的存储器以及与至少一个处理器通信连接的触控显示屏;触控显示屏包括指纹识别区域与显示区域,且指纹识别区域位于至少部分显示区域内;存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器执行上述的一种应用程序的启动方法。
本申请实施例还提供了一种终端,包括至少一处理器以及与至少一个处理器通信连接的存储器以及与至少一个处理器通信连接的触控显示屏;触控显示屏包括指纹识别区域与显示区域,且指纹识别区域位于至少部分显示区域内;存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器执行上述的应用程序的显示方法。
本申请实施例相对于现有技术而言,在用户用手指触摸应用图标时,采集手指的指纹信息并进行鉴权,在鉴权通过时,打开相应的应用程序;即,在用户用手指触摸应用图标的同时进行鉴权,简化了应用程序的鉴权流程,提高了鉴权效率。
另外,在应用程序的启动方法中,终端的指纹识别区域位于部分显示区域,且方法还包括:在启动指纹采集功能之前,判断手指的触摸位置是否位于指纹识别区域内;其中,指纹采集功能在判定触摸位置位于指纹识别区域内时启动。本实施例中对手指的触摸位置进行判断,仅在手指的触摸位置位于指纹识别区域内时,才启动指纹采集功能。
另外,在应用程序的启动方法中,在判断手指的触摸位置是否位于指纹识别区域内之前,还包括:判断应用图标对应的应用程序是否需要鉴权;若判定应用程序需要鉴权,进入判断手指的触摸位置是否位于指纹识别区域内的步骤。采用本实施例的方法,能够避免对无需鉴权的应用程序进行鉴权。
另外,在应用程序的启动方法中,若判定触摸位置位于指纹识别区域内,且在启动指纹采集功能之前,还包括:获取手指在触摸应用图标时与指纹识别区域的接触面积;判断接触面积是否大于预设面积;若判定接触面积大于预设面积,进入启动指纹采集功能的步骤。采用本实施例的方法,能够避免在接触 面积小于预设面积时,采集到的指纹信息可靠性较低且很大可能无法通过鉴权时,仍进行指纹采集的情况(此种情况下会增加处理器不必要的负担且降低鉴权效率);同时,也可以避免用户误触(可能手指不小心碰到)而仍进行指纹采集的情况。
另外,终端的指纹识别区域位于整个显示区域内,并且在检测到手指触摸显示区域内显示的应用图标时直接启动指纹采集功能。本实施例中,当终端的指纹识别区域位于整个显示区域内时,若检测到手指触摸,便直接启动指纹采集功能。
另外,在应用程序的启动方法中,若判定接触面积未大于预设面积,启动预设的另一鉴权流程。本实施例中,在判定采集到的指纹信息很大可能无法通过鉴权时,提供预设的另一鉴权流程供用户进行鉴权。
另外,在应用程序的启动方法中,在利用指纹信息进行鉴权且鉴权不通过时,启动另一鉴权流程。本实施例中,在利用指纹信息进行鉴权且鉴权不通过时,提供预设的另一鉴权流程供用户进行鉴权。
另外,在应用程序的显示方法中,在终端运行过程中,当检测到应用程序的状态从启动时不需要鉴权更改为启动时需要鉴权时,将应用程序对应的应用图标布局到指纹识别区域中,并显示出来。本实施例中,在用户设定应用程序在启动时需要鉴权时,将该应用程序对应的应用图标布局到指纹识别区域中,以便于用户在之后点击该应用程序的应用图标时,能够快速进行鉴权。
另外,在应用程序的显示方法中,当指纹识别区位于部分显示区域时,第二策略中,将终端中的所有应用程序对应的应用图标布局在显示区域中指纹识别区域以外的区域。本实施例中,在判定不存在启动时需要鉴权的应用程序 时,不在指纹识别区域中布局应用图标,避免对启动时无需鉴权的应用程序进行鉴权。
另外,在应用程序的显示方法中,在判断终端中是否存在启动时需要鉴权的应用程序之前,还包括:判断指纹识别区域是否至少部分有效;若判定指纹识别区域至少部分有效,进入判断是否存在启动时需要鉴权的应用程序的步骤;其中,第一策略中,将启动时需要鉴权的应用程序对应的应用图标布局在指纹识别区域的有效部分内。本实施例中,对指纹识别区域是否可用进行判断,可以避免将启动时需要进行鉴权的应用程序对应的应用图标布局到无效(可能出现损坏导致的无效)的指纹识别区域内,而造成后续指纹无法识别或识别不准确。
另外,在应用程序的显示方法中,若判定指纹识别区域均为无效,则按照第二策略布局终端中的所有应用程序对应的应用图标。本实施例提供了在指纹识别区域均无效时,对终端中应用程序对应的应用图标的布局方式。
附图说明
一个或多个实施例通过与之对应的附图中的图片进行示例性说明,这些示例性说明并不构成对实施例的限定,附图中具有相同参考数字标号的元件表示为类似的元件,除非有特别申明,附图中的图不构成比例限制。
图1是根据本申请第一实施例中的显示区域的示意图;
图2是根据本申请第一实施例中的应用程序的启动方法的具体流程图;
图3是根据本申请第二实施例中的应用程序的启动方法的具体流程图;
图4是根据本申请第三实施例中的应用程序的启动方法的具体流程图;
图5是根据本申请第四实施例中的应用程序的启动方法的具体流程图;
图6是根据本申请第五实施例中的应用程序的启动方法的具体流程图;
图7是根据本申请第六实施例中的应用程序的启动方法的具体流程图;
图8是根据本申请第七实施例中的应用程序的显示方法的具体流程图;
图9是根据本申请第七实施例中的显示区域的示意图;
图10是根据本申请第八实施例中的应用程序的显示方法的具体流程图;
图11是根据本申请第九实施例中的应用程序的显示方法的具体流程图。
具体实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请部分实施例进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请第一实施例涉及一种应用程序的启动方法,应用于终端,例如手机、平板电脑等,终端具有触控显示屏,触控显示屏具有显示区域,触控显示屏的下方设有指纹传感器,即触控显示屏包括指纹识别区域,且指纹识别区域位于至少部分显示区域内。指纹传感器可以在用户手指触摸指纹识别区域时采集指纹。当指纹识别区域位于部分显示区域内时,指纹识别区域的数目可以为一个或多个,如图1所示,多个指纹识别区域1均匀分布在显示区域2中,每个指纹识别区域1下方均布设有一个指纹传感器,每个指纹传感器均连接至指纹识别处理器。
比如,多个指纹识别区域1可以分别对应设置在终端的至少部分应用图 标显示区域,即每一个指纹识别区域1可以对应于在终端的显示区域显示的应用图标。在具体实施例中,应用图标的数量可能会多于指纹识别区域的数量,也即是说,只有部分显示图标下方会配置有指纹传感器,因此当上述显示图标被触摸时会触发其相应的指纹传感器启动屏内指纹识别功能。
其中,图1中仅为示例性说明,本实施例对指纹识别区域1的具体数目、形状以及在显示区域2中的排列方式均不作任何限制;指纹传感器例如为光学指纹传感器、超声波指纹传感器或者电容式指纹传感器,然本实施例对指纹传感器的类型亦不作任何限制。
本实施例的应用程序的启动方法的具体流程如图2所示。
步骤101,判断是否检测到手指触摸显示区域内显示的应用图标。若是,则进入步骤102;若否,则直接结束。
具体而言,当触控显示屏检测到用户用手指触摸触控显示屏时,会获取手指的触摸位置,根据手指的触摸位置便能够判断手指是否触摸到显示区域内显示的应用图标。触摸位置为手指与触控显示屏的接触位置,手指与触控显示屏一般有多个接触点,因此,触摸位置可以表示为多个接触点的坐标的集合,触摸位置可以表示为触控显示屏坐标系中的一个坐标范围。各个应用图标在显示区域中的位置也可以表示为该显示屏坐标系中的一个坐标范围(应用图标有一定的大小,其包括该应用图标范围内的所有点的坐标),从而,可以根据触摸位置来判定手指是否触摸到应用图标。本实施例中提供了一种具体判断方式(然不限于此):当判断出手指触摸到的至少部分接触点的坐标位于应用图标的坐标范围内时,判定手指触摸到显示区域内的应用图标。其中,坐标的单位为像素;在当判定检测到手指触摸显示区域内显示的应用图标时,进入步骤102; 当判断出手指触摸到的所有接触点的坐标均位于应用图标的坐标范围外内时,判定未检测到用户用手指触摸显示区域内显示的应用图标时,则直接结束。
较佳的,在步骤101之后,还包括步骤102:
步骤102,判断手指的触摸位置是否位于指纹识别区域内;若是,则进入步骤103;若否,则直接结束。
具体而言,判断触摸位置是否位于指纹识别区域内,即,判断手指与触控显示屏的多个接触点中,是否存在至少一个接触点位于指纹识别区域内。与应用图标类似,指纹识别区域在显示区域的位置同样可以表示为一个坐标范围,从而可以根据接触点的坐标以及指纹识别区域的坐标范围判断是否存在至少一个接触点的坐标在指纹识别区域包含的坐标范围内。当判定存在至少一个接触点的坐标在指纹识别区域包含的坐标范围内时,进入步骤103;否则,则直接结束。
步骤103,启动指纹采集功能,并在指纹识别区域内采集手指的指纹信息。
具体而言,启动指纹采集功能,通过指纹识别区域下方的指纹传感器采集在指纹识别区域内的手指的指纹信息,指纹信息可以为用户手指的指纹图像。
步骤104,利用指纹信息进行鉴权。若鉴权通过,进入步骤105;若鉴权不通过,进入步骤106。
具体而言,将采集的手指的指纹图像(指纹信息)与终端中预设的指纹图像进行匹配,当存在一张预设的指纹图像与采集的手指的指纹图像相匹配时,判定鉴权通过,进入步骤105;否则,则说明用户非终端的主人或者采集的手指的指纹图像不清晰无法通过鉴权,此时进入步骤106,启动另一鉴权流程, 以供用户重新进行鉴权。需要说明的是,所有启动时需要鉴权的应用程序可以预设相同的指纹信息(即,不同的手指的指纹图像),也可以预设不同的指纹信息。
步骤105,启动应用图标对应的应用程序。
具体而言,在终端中,各个应用程序均具有对应的应用图标,从而当判定出手指触摸的应用图标时,即可确定该应用图标对应的应用程序,且当鉴权通过时,启动应用图标对应的应用程序,供用户使用。
步骤106,启动另一鉴权流程。
具体而言,当判定触摸位置位于指纹识别区域外时,启动另一鉴权流程,另一鉴权流程具体为,提供预设的提示界面,提示用户按预设方式进行鉴权,例如,提示用户输入密码进行鉴权、提示用户画出预设的图案进行鉴权或通过其他非屏下指纹传感器(例如安装在终端背面的电容式指纹传感器,然不以此为限)进行鉴权。
需要说明的是,在本实施例的上述描述中,可以理解为:终端在布局应用图标时满足以下条件:将启动时需要鉴权的应用程序布局在指纹识别区域内显示,将启动时不需要鉴权的应用程序布局在显示区域中指纹识别区域外的区域显示;然本实施例对此不做任何限制,也可以理解为:对于启动时需要鉴权但不需要采用指纹识别区域进行指纹鉴权的应用程序,终端中也可以将该种在应用程序对应的应用图标放置在显示区域中指纹识别区域外的区域显示,此种情况下,在步骤102中,若判定手指的触摸位置位于指纹识别区域外时,也可进入步骤106,以启动另一鉴权流程。
本实施例相对于现有技术而言,在用户用手指触摸应用图标时,对手指 的触摸位置进行判断,当触摸位置在指纹识别区域时,采集手指的指纹信息并进行鉴权,在鉴权通过时,打开相应的应用程序;即,在用户用手指触摸应用图标的同时进行鉴权,简化了应用程序的鉴权流程,提高了鉴权效率。
本申请第二实施例涉及一种应用程序的启动方法,本实施例是在第一实施例基础上的改进,主要改进之处在于:对应用图标对应的应用程序是否需要鉴权进行判断。
本实施例的应用程序的启动方法的具体流程如图3所示。
其中,步骤201与步骤101大致相同,步骤203至步骤207与步骤102至步骤106大致相同,在此不再赘述,主要不同之处在于,增加了步骤202,具体如下:
步骤202,判断应用图标对应的应用程序是否需要鉴权。若是,则进入步骤203;若否,则直接结束。
具体而言,在终端开机时,系统会进行初始化操作,获取启动时需要鉴权的应用程序的鉴权列表(即,鉴权列表中包括所有启动时需要鉴权的应用程序);鉴权列表为终端运行过程中设定的,用户将某一应用程序设置为启动时需要鉴权,则将该应用程序加入该鉴权列表。根据该鉴权列表,便能够判断用户手指触摸的应用图标对应的应用程序是否需要鉴权。若判定用户手指触摸的应用图标对应的应用程序需要鉴权,则进入步骤203(与第一实施例中的步骤102相同)判断手指的触摸位置是否位于指纹识别区域内;否则,则直接结束。
需要说明的是,本实施例是以系统在初始化时获取启动时需要鉴权的应用程序的鉴权列表为例,然不限于此;例如,系统在初始化时,也可以依次对终端中各个应用程序的状态(启动时需要鉴权或启动时不需要鉴权)进行查询, 从而获取所有启动时需要鉴权的应用程序。
本实施例可以应用于应用图标的两种布局方式:第一种方式,在终端开机时,系统获取的鉴权列表中存在启动时需要鉴权的应用程序,将启动时需要鉴权的应用程序布局在指纹识别区域内显示,将启动时不需要鉴权的应用程序布局在显示区域中指纹识别区域外的区域显示;第二种方式,在终端开机时,若系统获取的鉴权列表中没有启动时需要鉴权的应用程序时,系统则会按照普通的图标布局方式,将所有应用图标均匀布局在显示区域中(包括指纹识别区域);在第二种方式中,采用本实施例的方法,可以避免用户用手指触摸位于指纹识别区域的应用图标(无需启动时鉴权)时,仍然对其进行鉴权操作。
本申请第三实施例涉及一种应用程序的启动方法,本实施例是在第一实施例基础上的改进,主要改进之处在于:对接触面积进行判断。
本实施例的应用程序的启动方法的具体流程如图4所示。
其中,步骤301、步骤302与步骤101、步骤102大致相同,步骤305至步骤308与步骤103至步骤106大致相同,在此不再赘述,主要不同之处在于,增加了步骤303与步骤304,具体如下:
步骤303,获取手指在触摸应用图标时与指纹识别区域的接触面积。
具体而言,在步骤302(与第一实施例中的步骤102相同)判定触摸位置位于指纹识别区域内时,即,手指与触控显示屏的多个接触点中存在至少一个接触点位于指纹识别区域的坐标范围内,位于指纹识别区域内的接触点组成的图形的面积即为手指在触摸应用图标时与指纹识别区域的接触面积。
步骤304,判断接触面积是否大于预设面积。若是,则进入步骤305;若否,则进入步骤308。
具体而言,手指在触摸应用图标时与指纹识别区域的接触面积越大,采集到的手指的指纹信息越可靠(指纹图像的清晰度越高);当判定接触面积大于预设面积时,此时采集得手指的指纹信息较为可靠(即指纹图像较为完整),可以使得鉴权的通过率较高,此时进入步骤305(与第一实施例中步骤103相同)启动指纹采集功能,并在指纹识别区域内采集手指的指纹信息;当接触面积小于或等于预设面积时,此时进入步骤308(与第一实施例中步骤106相同)启动另一鉴权流程,以供用户重新进行鉴权。其中,判断出接触面积小于或等于预设面积,可能是由以下两种情况中的一种引起的:一是用户误触到应用图标,二是用户确实想打开应用程序,但是触摸应用图标太轻。对于用户误触的情况,根本无需进行指纹采集来进行鉴权。对于用户触摸太轻的情况,由于接触面积较小会使得采集到手指的指纹信息不可靠,鉴权的通过率较低;即,即使用户为电子设备的主人,也很有可能无法通过鉴权。
本实施例相对于第一实施例而言,能够避免在接触面积小于预设面积时,采集到的指纹信息可靠性较低且很大可能无法通过鉴权时,仍进行指纹采集的情况(此种情况下会增加处理器不必要的负担且降低鉴权效率);同时,也可以避免用户误触(可能手指不小心碰到)而仍进行指纹采集的情况。需要说明的是,本实施例也可以作为在第二实施例基础上的改进,可以达到相同的技术效果。
本申请第四实施例涉及一种应用程序的启动方法,本实施例与第一实施例大致相同,主要不同之处在于:在第一实施例中,触控显示屏的指纹识别区域位于部分显示区域内;在本实施例中,触控显示屏的指纹识别区域位于整个显示区域内,即,整个显示区域下方均布设有指纹传感器,指纹传感器可以在 用户手指触摸指纹识别区域(显示区域)时采集指纹。比如,终端的显示区域下方可以设置有一个大尺寸的指纹识别传感器,以使得指纹识别传感器的指纹识别区域覆盖整个显示区域,因此,当显示区域内部的应用图标被触摸时,会触发指纹识别传感器启动屏内指纹识别功能。其中,指纹传感器例如为光学指纹传感器、超声波指纹传感器或电容式指纹传感器,然本实施例对指纹传感器的类型亦不作任何限制。
本实施例的应用程序的启动方法的具体流程如图5所示。
步骤401,判断是否检测到手指触摸显示区域内显示的应用图标。若是,则进入步骤402;若否,则直接结束。
具体而言,当触控显示屏检测到用户用手指触摸触控显示屏时,会获取手指的触摸位置,根据手指的触摸位置便能够判断手指是否触摸到显示区域内显示的应用图标。触摸位置为手指与触控显示屏的接触位置,手指与触控显示屏一般有多个接触点,因此,触摸位置可以表示为多个接触点的坐标的集合,触摸位置可以表示为显示屏坐标系中的一个坐标范围。各个应用图标在显示区域中的位置也可以表示为该显示屏坐标系中的一个坐标范围(应用图标有一定的大小,其包括该应用图标范围内的所有点的坐标),从而,可以根据触摸位置来判定手指是否触摸到应用图标。本实施例中提供了一种具体判断方式(然不限于此):当判断出手指触摸到的至少部分接触点的坐标位于应用图标的坐标范围内时,判定手指触摸到显示区域内的应用图标。其中,坐标的单位为像素;在当判定检测到手指触摸显示区域内显示的应用图标时,进入步骤102;当判断出手指触摸到的所有接触点的坐标均位于应用图标的坐标范围外内时,判定未检测到用户用手指触摸显示区域内显示的应用图标时,则直接结束。
步骤402,启动指纹采集功能,并在指纹识别区域内采集手指的指纹信息。
具体而言,由于指纹识别区域位于整个显示区域内,因此,无需对手指的触摸位置是否位于指纹识别区域进行判断,可以直接启动指纹采集功能,通过指纹识别区域下方的指纹传感器采集在指纹识别区域内的手指的指纹信息,指纹信息可以为用户手指的指纹图像。
步骤403,利用指纹信息进行鉴权。若鉴权通过,进入步骤404;若鉴权不通过,进入步骤405。
具体而言,将采集的手指的指纹图像(指纹信息)与终端中预设的指纹图像进行匹配,当存在一张预设的指纹图像与采集的手指的指纹图像相匹配时,判定鉴权通过,进入步骤404;否则,则说明用户非终端的主人或者采集的手指的指纹图像不清晰无法通过鉴权,此时进入步骤405,启动另一鉴权流程,以供用户重新进行鉴权。需要说明的是,所有启动时需要鉴权的应用程序可以预设相同的指纹信息(即,不同的手指的指纹图像),也可以预设不同的指纹信息。。
步骤404,启动应用图标对应的应用程序。
具体而言,在终端中,各个应用程序均具有对应的应用图标,从而当判定出手指触摸的应用图标时,即可确定该应用图标对应的应用程序,且鉴权通过时,启动应用图标对应的应用程序,供用户使用。
步骤405,启动另一鉴权流程。
具体而言,当判定触摸位置位于指纹识别区域外时,启动另一鉴权流程,另一鉴权流程具体为,提供预设的提示界面,提示用户按预设方式进行鉴权, 例如,提示用户输入密码进行鉴权、提示用户画出预设的图案进行鉴权或通过其他非屏下指纹传感器(例如安装在终端背面的电容式指纹传感器,然不以此为限)进行鉴权。
本实施例相对于第一实施例而言,提供了触控显示屏的指纹识别区域位于整个显示区域内的应用程序的启动方法。
本申请第五实施例涉及一种应用程序的启动方法,本实施例是在第四实施例基础上的改进,主要改进之处在于:对应用图标对应的应用程序是否需要鉴权进行判断。
本实施例的应用程序的启动方法的具体流程如图6所示。
其中,步骤501与步骤401大致相同,步骤503至步骤506与步骤402至步骤405大致相同,在此不再赘述,主要不同之处在于,增加了步骤502,具体如下:
步骤502,判断应用图标对应的应用程序是否需要鉴权。若是,则进入步骤503;若否,则直接结束。
具体而言,在终端开机时,系统会进行初始化操作,获取启动时需要鉴权的应用程序的鉴权列表(即,鉴权列表中包括所有启动时需要鉴权的应用程序);鉴权列表为终端运行过程中设定的,用户将某一应用程序设置为启动时需要鉴权,则将该应用程序加入该鉴权列表。根据该鉴权列表,便能够判断用户手指触摸的应用图标对应的应用程序是否需要鉴权。若判定用户手指触摸的应用图标对应的应用程序需要鉴权,则进入步骤203(与第一实施例中的步骤102相同)判断手指的触摸位置是否位于指纹识别区域内;否则,则直接结束。较佳的,当系统获取的鉴权列表中没有启动时需要鉴权的应用程序时,系统则 无需对显示区域内显示的应用图标进行调整,或按照用户的使用频率将使用频率较高的应用程序对应的应用图标放置在易于触摸到的位置(例如触摸屏的中下方区域,然不以此为限)。
需要说明的是,本实施例以系统在初始化时获取启动时需要鉴权的应用程序的鉴权列表为例,然不限于此;例如,系统在初始化时,也可以依次对终端中各个应用程序的状态(启动时需要鉴权或启动时不需要鉴权)进行查询,从而获取所有启动时需要鉴权的应用程序,然本实施例对此不作任何限制。
本实施例中,由于触控显示屏的指纹识别区域位于整个显示区域内,系统会按照常普通的图标布局方式,将所有应用图标(启动时需要鉴权的应用程序与启动时不需要鉴权的应用程序)均匀布局在显示区域中(包括指纹识别区域)。采用本实施例的方法,可以避免当用户用手指触摸位于指纹识别区域的应用图标(无需启动时鉴权)时,仍然对其进行鉴权操作。
本申请第六实施例涉及一种应用程序的启动方法,本实施例是在第四实施例基础上的改进,主要改进之处在于:对接触面积进行判断。
本实施例的应用程序的启动方法的具体流程如图7所示。
其中,步骤601与步骤101大致相同,步骤604至步骤607与步骤402至步骤405大致相同,在此不再赘述,主要不同之处在于,增加了步骤602与步骤603,具体如下:
步骤602,获取手指在触摸应用图标时与指纹识别区域的接触面积。
具体而言,在步骤601(与第四实施例中的步骤401相同)检测到手指触摸显示区域内显示的应用图标时,即,手指与触控显示屏的多个接触点中存在至少一个接触点位于指纹识别区域的坐标范围内,位于指纹识别区域内的接 触点组成的图形的面积即为手指在触摸应用图标与指纹识别区域的接触面积。
步骤603,判断接触面积是否大于预设面积。若是,则进入步骤604;若否,则进入步骤605。
具体而言,手指在触摸应用图标时与指纹识别区域的接触面积越大,采集到的手指的指纹信息越可靠(指纹图像的清晰度越高);当判定接触面积大于预设面积时,此时采集得手指的指纹信息较为可靠(即指纹图像较为完整),可以使得鉴权的通过率较高,此时进入步骤305(与第一实施例中步骤103相同)启动指纹采集功能,并在指纹识别区域内采集手指的指纹信息;当接触面积小于或等于预设面积时,此时进入步骤308(与第一实施例中步骤106相同)启动另一鉴权流程,以供用户重新进行鉴权。其中,判断出接触面积小于或等于预设面积,可能是由以下两种情况中的一种引起的:一是用户误触到应用图标,二是用户确实想打开应用程序,但是触摸应用图标太轻。对于用户误触的情况,根本无需进行指纹采集来进行鉴权。对于用户触摸太轻的情况,由于接触面积较小会使得采集到手指的指纹信息不可靠,鉴权的通过率较低;即,即使用户为电子设备的主人,也很有可能无法通过鉴权。
本实施例相对于第四实施例而言,能够避免在接触面积小于预设面积时,采集到的指纹信息可靠性较低且很大可能无法通过鉴权时,仍进行指纹采集的情况(此种情况下会增加处理器不必要的负担且降低鉴权效率);同时,也可以避免用户误触(可能手指不小心碰到)而仍进行指纹采集的情况。需要说明的是,本实施例也可以作为在第五实施例基础上的改进,可以达到相同的技术效果。
本申请第七实施例涉及一种应用程序的显示方法,应用于终端,例如手 机、平板电脑等,终端具有触控显示屏,触控显示屏具有显示区域,触控显示屏的指纹识别区域位于至少部分显示区域内,指纹识别区域为下方布设有指纹传感器的显示区域,指纹传感器可以在用户手指触摸指纹识别区域时采集指纹。当指纹识别区域位于部分显示区域内时,指纹识别区域的数目可以为一个或多个,如图1所示,多个指纹识别区域均匀分布在显示区域中,每个指纹识别区域下方均布设有一个指纹传感器,每个指纹传感器均连接至指纹识别处理器。其中,图1中仅为示例性说明,本实施例对指纹识别区域具体数目、形状以及在显示区域中的排列方式均不作任何限制;其中,指纹传感器例如为光学指纹传感器,然本实施例对指纹传感器的类型亦不作任何限制。
本实施例的应用程序的显示方法的具体流程如图8所示。
步骤701,在终端开机过程中,判断终端中是否存在启动时需要鉴权的应用程序。若是,则进入步骤702;若否,则进入步骤703。
具体而言,在终端开机过程中,系统会进行初始化操作,获取启动时需要鉴权的应用程序的鉴权列表(即,鉴权列表中包括所有启动时需要鉴权的应用程序);鉴权列表为终端运行过程中设定的,用户将某一应用程序设置为启动时需要鉴权,则将该应用程序加入该鉴权列表。根据该鉴权列表,便能够判断是否存在启动时需要鉴权的应用程序;若判定存在启动时需要鉴权的应用程序,进入步骤702。否则,则进入步骤703。
需要说明的是,本实施例以系统在初始化时获取启动时需要鉴权的应用程序的鉴权列表为例,然不限于此,也可以是系统在初始化时,依次对终端中各个应用程序的状态(启动时需要鉴权或启动时不需要鉴权)进行查询,从而获取所有启动时需要鉴权的应用程序,然本实施例对此不作任何限制。
步骤702,按照预设的第一策略布局终端中的所有应用程序对应的应用图标,并生成当前显示界面。
具体而言,获取启动时需要鉴权的应用程序的鉴权列表,将启动时需要鉴权的应用程序对应的应用图标布局在指纹识别区域内,启动时无需鉴权的应用程序对应的应用图标则布局在指纹识别区域以外的区域,生成当前的显示界面。请参考图9,显示区域2中包含一个指纹识别区域1,启动时需要鉴权的应用程序为6个,6个应用程序对应的应用图标3均匀放置于指纹识别区域1;图9中仅为示例性说明,本实施例对指纹识别区域1的形状、数量和位置,以及启动时需要鉴权的应用程序的数量和布局方式均不作任何限制。
若启动时需要鉴权的应用程序较多,指纹识别区域无法放下全部的应用图标时,可以在用户用手指触摸指纹识别区域时,多个应用图标滚动显示,当用户手指离开指纹识别区域时,则将手指离开指纹识别区域时触摸到的应用图标对应的应用程序作为用户要打开的应用程序。另外,若终端的指纹识别区域位于整个显示区域内,则终端中所有的应用程序对应的应用图标可以根据用户需求在显示区域中任意进行布局。
步骤703,按照预设的第二策略布局终端中的所有应用程序对应的应用图标,并生成当前显示界面。
具体而言,若系统获取的鉴权列表中没有启动时需要鉴权的应用程序时,系统则会按照普通的图标布局方式,将所有应用图标均匀布局在显示区域中(包括指纹识别区域);其中,若终端的指纹识别区域位于部分显示区域内时(即终端指纹识别区域非位于整个显示区域内),也可以将终端中的所有应用程序对应的应用图标布局在显示区域中指纹识别区域以外的区域。
步骤704,在显示区域显示当前显示界面。
本申请实施例相对于现有技术而言,在用户用手指触摸应用图标时,采集手指的指纹信息并进行鉴权,在鉴权通过时,打开相应的应用程序;即,在用户用手指触摸应用图标的同时进行鉴权,简化了应用程序的鉴权流程,提高了鉴权效率。
本申请第八实施例涉及一种应用程序的显示方法,本实施例是在第七实施例基础上改进,主要改进之处在于:在终端运行过程中,对指纹识别区域中的应用图标的布局进行更新。
本实施例的应用程序的显示方法的具体流程如图10所示。
其中,步骤801至步骤804与步骤701至步骤704大致相同,在此不再赘述,主要不同之处在于,增加了步骤805与步骤806,具体如下:
步骤805,在终端运行过程中,判断是否检测到应用程序的状态从启动时不需要鉴权更改为启动时需要鉴权;若是,则进入步骤806;若否,则直接结束。
具体而言,当用户在使用终端的过程中,将某一应用程序的状态从启动时不需要鉴权更改为启动时需要鉴权时,例如,用户刚刚下载一应用程序,认为该应用程序涉及个人财产或隐私,将该应用程序的状态更改为启动时需要鉴权时,进入步骤806;否则,则直接结束。
步骤806,将应用程序对应的应用图标布局到指纹识别区域中,并显示出来。
具体而言,当系统接收到用户将某应用程序的状态更改为启动时需要鉴权时,会将该应用程序对应的应用图标布局到指纹识别区域中,重新生成显示 界面并在显示区域中显示;即,无需经过重启系统初始化,便可以将该应用图标布局到指纹识别区域中,便于在用户下次触摸该应用图标时,能够快速的进行鉴权(采用第一实施例至第六实施例中任一项的应用程序的启动方法)。
本实施例相对于第七实施例而言,在用户设定应用程序在启动时需要鉴权时,将该应用程序对应的应用图标布局到指纹识别区域中,以便于用户在之后点击该应用程序的应用图标时,能够快速进行鉴权。
本申请第九实施例涉及一种应用程序的显示方法,本实施例是在第八实施例基础上改进,主要改进之处在于:对显示区域是否有效进行判断。
本实施例的应用程序的显示方法的具体流程如图11所示。
其中,步骤902至步骤905与步骤701至步骤704大致相同,在此不再赘述,主要不同之处在于增加了步骤901,具体如下:
步骤901,在终端开机过程中,判断指纹识别区域是否至少部分有效。若是,则进入步骤902;若否,则进入步骤904。
具体而言,判断指纹识别区域是否至少部分有效,即,判断纹识别区域下布设的指纹传感器能否正常工作;指纹识别区域有效则为布设在其下方的指纹传感器能正常工作,指纹识别区域无效则为布设在其下方的指纹传感器不能正常工作。指纹识别区域可以为一个或多个,每个指纹识别区域下方均布设有指纹传感器,在终端开机过程中,系统进行初始化时,对终端中的各个硬件(包括指纹传感器)进行检测,当检测到至少存在一个指纹传感器能正常工作时,则认为至少一个指纹传感器对应的指纹识别区域为有效,即,判定指纹识别区域至少部分有效,进入步骤902(第七实施例中的步骤701),判断终端中是否存在启动时需要鉴权的应用程序。其中,当只有部分指纹识别区域有效时,在 判定存在启动时需要鉴权的应用程序时,将启动时需要鉴权的应用程序对应的应用图标布局在指纹识别区域内。当检测终端中所有指纹传感器均无法正常工作时,则判定显示区域中的指纹识别区域均为无效,此时,进入步骤904(第七实施例中的步骤703)按照预设的第二策略布局终端中的所有应用程序对应的应用图标,并生成当前显示界面。
本实施例相对于第七实施例而言,对指纹识别区域是否可用进行判断,可以避免将启动时需要进行鉴权的应用程序对应的应用图标布局到无效的指纹识别区域内。需要说明的是,本实施例也可以作为在第八实施例基础上的改进,可以达到同样的技术效果。
本申请第十实施例涉及一种终端,例如手机、平板电脑等,终端具有触控显示屏,触控显示屏具有显示区域,触控显示屏的指纹识别区域位于至少部分显示区域内,指纹识别区域为下方布设有指纹传感器的显示区域,指纹传感器可以在用户手指触摸指纹识别区域时采集指纹。本实施例中,指纹识别区域可以包括多个指纹识别区,多个指纹识别区任意分布在显示区域中,每个指纹识别区下方均布设有指纹传感器。其中,指纹传感器例如为光学指纹传感器,然不限于此。
本实施例中的终端包括至少一处理器以及与至少一个处理器通信连接的存储器以及与至少一个处理器通信连接的触控显示屏。
触控显示屏包括指纹识别区域与显示区域,且指纹识别区域位于至少部分显示区域内;存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器执行第一实施例至第六实施例中任一的应用程序的启动方法。
本实施例相对于现有技术而言,在用户用手指触摸应用图标时,采集手指的指纹信息并进行鉴权,在鉴权通过时,打开相应的应用程序;即,在用户用手指触摸应用图标的同时进行鉴权,简化了应用程序的鉴权流程,提高了鉴权效率。
本申请第十一实施例涉及一种终端,例如手机、平板电脑等,终端具有触控显示屏,触控显示屏具有显示区域,触控显示屏的指纹识别区域位于至少部分显示区域内,指纹识别区域为下方布设有指纹传感器的显示区域,指纹传感器可以在用户手指触摸指纹识别区域时采集指纹。本实施例中,指纹识别区域可以包括多个指纹识别区,多个指纹识别区任意分布在显示区域中,每个指纹识别区下方均布设有指纹传感器。其中,指纹传感器例如为光学指纹传感器,然不限于此。
本实施例中的终端包括至少一处理器以及与至少一个处理器通信连接的存储器以及与至少一个处理器通信连接的触控显示屏。
触控显示屏包括指纹识别区域与显示区域,且指纹识别区域位于至少部分显示区域内;存储器存储有可被至少一个处理器执行的指令,指令被至少一个处理器执行,以使至少一个处理器执行第七实施例至第九实施例中任一的应用程序的显示方法。本实施例中的处理器可以为应用管理器,用于将所有应用程序对应的应用图标布局在显示区域中,然本实施例对处理器的类型不作任何限制。
本实施例相对于现有技术而言,在用户用手指触摸应用图标时,采集手指的指纹信息并进行鉴权,在鉴权通过时,打开相应的应用程序;即,在用户用手指触摸应用图标的同时进行鉴权,简化了应用程序的鉴权流程,提高了鉴 权效率。
需要说明的是,本申请中也可以将第十实施例中的终端与第十一实施例的终端合并在一起,即,通过一个终端实现第一实施例至第六实施例中任一的应用程序的启动方法以及第七实施例至第九实施例中任一的应用程序的显示方法,然本实施例对此不作任何限制。
本领域的普通技术人员可以理解,上述各实施例是实现本申请的具体实施例,而在实际应用中,可以在形式上和细节上对其作各种改变,而不偏离本申请的精神和范围。

Claims (16)

  1. 一种应用程序的启动方法,其特征在于,应用于终端,所述终端的指纹识别区域位于至少部分显示区域内;所述方法包括:
    当检测到手指触摸所述显示区域内显示的应用图标时,启动指纹采集功能,并在所述指纹识别区域内采集所述手指的指纹信息;
    利用所述指纹信息进行鉴权,并在鉴权通过时,启动所述应用图标对应的应用程序。
  2. 如权利要求1所述的应用程序的启动方法,其特征在于,所述终端的指纹识别区域位于部分显示区域,且所述方法还包括:
    在启动指纹采集功能之前,判断所述手指的触摸位置是否位于所述指纹识别区域内;
    其中,所述指纹采集功能在判定所述触摸位置位于所述指纹识别区域内时启动。
  3. 如权利要求2所述的应用程序的启动方法,其特征在于,在判断所述手指的触摸位置是否位于所述指纹识别区域内之前,还包括:
    判断所述应用图标对应的应用程序是否需要鉴权;
    若判定所述应用程序需要鉴权,进入所述判断所述手指的触摸位置是否位于所述指纹识别区域内的步骤。
  4. 如权利要求2所述的应用程序的启动方法,其特征在于,若判定所述触摸位置位于所述指纹识别区域内,且在所述启动指纹采集功能之前,还包括:
    获取所述手指在触摸所述应用图标时与所述指纹识别区域的接触面积;
    判断所述接触面积是否大于预设面积;
    若判定所述接触面积大于所述预设面积,进入所述启动指纹采集功能的步骤。
  5. 如权利要求1所述的应用程序的启动方法,其特征在于,所述终端的指纹识别区域位于整个显示区域内,并且在检测到手指触摸所述显示区域内显示的应用图标时直接启动所述指纹采集功能。
  6. 如权利要求5所述的应用程序的启动方法,其特征在于,在所述启动指纹采集功能之前,还包括:
    判断所述应用图标对应的应用程序是否需要鉴权;
    若判定所述应用程序需要鉴权,进入所述启动指纹采集功能的步骤。
  7. 如权利要求6所述的应用程序的启动方法,其特征在于,当检测到手指触摸所述显示区域内显示的应用图标时,且在所述启动指纹采集功能之前,还包括:
    获取所述手指在触摸所述应用图标时与所述指纹识别区域的接触面积;
    判断所述接触面积是否大于预设面积;
    若判定所述接触面积大于所述预设面积,进入所述启动指纹采集功能的步骤。
  8. 如权利要求4或7所述的应用程序的启动方法,其特征在于,若判定所述接触面积未大于所述预设面积,启动预设的另一鉴权流程。
  9. 如权利要求1所述的应用程序的启动方法,其特征在于,还包括:在所述利用所述指纹信息进行鉴权且鉴权不通过时,启动所述另一鉴权流程。
  10. 一种应用程序的显示方法,其特征在于,应用于终端,所述终端的指纹识别区域位于至少部分显示区域内;所述方法包括:
    在所述终端开机过程中,判断所述终端中是否存在启动时需要鉴权的应用程序;
    若判定存在启动时需要鉴权的应用程序,按照预设的第一策略布局所述终端中的所有应用程序对应的应用图标,并生成当前显示界面;其中,所述第一策略中,将所述启动时需要鉴权的应用程序对应的应用图标布局在所述指纹识别区域内;
    若判定不存在启动时需要鉴权的应用程序,按照预设的第二策略布局所述终端中的所有应用程序对应的应用图标,并生成当前显示界面;
    在所述显示区域显示所述当前显示界面。
  11. 如权利要求10所述的应用程序的显示方法,其特征在于,包括:
    在所述终端运行过程中,当检测到应用程序的状态从启动时不需要鉴权更改为启动时需要鉴权时,将所述应用程序对应的应用图标布局到所述指纹识别区域中,并显示出来。
  12. 如权利要求10所述的应用程序的显示方法,其特征在于,当所述指纹识别区位于部分所述显示区域时,所述第二策略中,将所述终端中的所有应用程序对应的应用图标布局在所述显示区域中所述指纹识别区域以外的区域。
  13. 如权利要求10所述的应用程序的显示方法,其特征在于,在所述判断所述终端中是否存在启动时需要鉴权的应用程序之前,还包括:
    判断所述指纹识别区域是否至少部分有效;
    若判定所述指纹识别区域至少部分有效,进入所述判断是否存在启动时需要鉴权的应用程序的步骤;
    其中,所述第一策略中,将所述启动时需要鉴权的应用程序对应的应用图标布局在所述指纹识别区域的有效部分内。
  14. 如权利要求13所述的应用程序的显示方法,其特征在于,若判定所述指纹识别区域均为无效,则按照所述第二策略布局所述终端中的所有应用程序对应的应用图标。
  15. 一种终端,其特征在于,包括至少一处理器、与所述至少一个处理器通信连接的存储器以及与所述至少一个处理器通信连接的触控显示屏;
    所述触控显示屏包括指纹识别区域与显示区域,且所述指纹识别区域位于至少部分显示区域内;
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行如权利要求1至9中任一所述的应用程序的启动方法。
  16. 一种终端,其特征在于,包括至少一处理器以及与所述至少一个处理器通信连接的存储器以及与所述至少一个处理器通信连接的触控显示屏;
    所述触控显示屏包括指纹识别区域与显示区域,且所述指纹识别区域位于至少部分显示区域内;
    所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行如权利要求10至14中任一所述的应用程序的显示方法。
PCT/CN2017/113054 2017-11-27 2017-11-27 应用程序的启动方法及显示方法、终端 WO2019100368A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780001810.0A CN108064370A (zh) 2017-11-27 2017-11-27 应用程序的启动方法及显示方法、终端
PCT/CN2017/113054 WO2019100368A1 (zh) 2017-11-27 2017-11-27 应用程序的启动方法及显示方法、终端

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/113054 WO2019100368A1 (zh) 2017-11-27 2017-11-27 应用程序的启动方法及显示方法、终端

Publications (1)

Publication Number Publication Date
WO2019100368A1 true WO2019100368A1 (zh) 2019-05-31

Family

ID=62142029

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/113054 WO2019100368A1 (zh) 2017-11-27 2017-11-27 应用程序的启动方法及显示方法、终端

Country Status (2)

Country Link
CN (1) CN108064370A (zh)
WO (1) WO2019100368A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11972631B2 (en) 2021-12-30 2024-04-30 Chien Jung Technology Co., Ltd. Skin texture control system, skin texture control method, skin texture sampling device, and computer-readable medium

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108875394B (zh) * 2018-06-25 2022-06-07 Oppo广东移动通信有限公司 电子装置及应用程序控制方法
CN109189481A (zh) * 2018-07-25 2019-01-11 上海与德通讯技术有限公司 应用程序的打开方法及终端设备
CN109240559A (zh) * 2018-08-01 2019-01-18 Oppo广东移动通信有限公司 应用程序控制方法及电子装置
CN109254802B (zh) * 2018-08-01 2022-03-11 Oppo广东移动通信有限公司 应用程序控制方法及电子装置
CN111427498A (zh) * 2019-01-09 2020-07-17 成都鼎桥通信技术有限公司 基于屏下指纹的界面推送方法及装置
CN110213438A (zh) * 2019-05-27 2019-09-06 维沃移动通信有限公司 一种应用程序的处理方法及终端设备
CN110276188B (zh) * 2019-06-26 2021-05-25 Oppo广东移动通信有限公司 控制方法、电子设备及非易失性计算机可读存储介质
CN110262852A (zh) * 2019-06-28 2019-09-20 Oppo广东移动通信有限公司 应用程序的控制方法、电子设备及可读存储介质
US11551466B2 (en) * 2019-08-21 2023-01-10 Novatek Microelectronics Corp. Control circuit and related method for controlling display panel

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866352A (zh) * 2015-05-27 2015-08-26 努比亚技术有限公司 一种启动应用程序的方法及移动终端
CN105574393A (zh) * 2015-07-31 2016-05-11 宇龙计算机通信科技(深圳)有限公司 一种应用程序访问方法及终端
CN106126015A (zh) * 2016-06-17 2016-11-16 广东欧珀移动通信有限公司 一种应用程序启动控制方法及终端
CN106384039A (zh) * 2016-10-18 2017-02-08 维沃移动通信有限公司 一种应用程序的快捷启动方法及移动终端

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103176727B (zh) * 2011-12-23 2016-01-27 宇龙计算机通信科技(深圳)有限公司 应用程序的启动方法及通信终端
CN103678981B (zh) * 2013-12-06 2017-12-29 北京奇虎科技有限公司 针对不同用户实现不同界面的方法及装置
CN105335068A (zh) * 2015-11-18 2016-02-17 广东欧珀移动通信有限公司 一种应用删除方法及终端设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866352A (zh) * 2015-05-27 2015-08-26 努比亚技术有限公司 一种启动应用程序的方法及移动终端
CN105574393A (zh) * 2015-07-31 2016-05-11 宇龙计算机通信科技(深圳)有限公司 一种应用程序访问方法及终端
CN106126015A (zh) * 2016-06-17 2016-11-16 广东欧珀移动通信有限公司 一种应用程序启动控制方法及终端
CN106384039A (zh) * 2016-10-18 2017-02-08 维沃移动通信有限公司 一种应用程序的快捷启动方法及移动终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11972631B2 (en) 2021-12-30 2024-04-30 Chien Jung Technology Co., Ltd. Skin texture control system, skin texture control method, skin texture sampling device, and computer-readable medium

Also Published As

Publication number Publication date
CN108064370A (zh) 2018-05-22

Similar Documents

Publication Publication Date Title
WO2019100368A1 (zh) 应用程序的启动方法及显示方法、终端
US11868459B2 (en) Operation method with fingerprint recognition, apparatus, and mobile terminal
KR102561736B1 (ko) 터치 디스플레이를 가지는 전자 장치 및 이의 지문을 이용한 기능 실행 방법
KR102354415B1 (ko) 전자 장치 및 전자 장치 제어 방법
KR102578253B1 (ko) 전자 장치 및 전자 장치의 지문 정보 획득 방법
US9710630B2 (en) Electronic device and method of providing security using complex biometric information
KR102552312B1 (ko) 복수의 지문 센싱 모드를 갖는 전자 장치 및 그 제어 방법
NL2013335B1 (en) User verification for changing a setting of an electronic device.
CN107223254B (zh) 用于隐藏设置处理的方法、用户装置和存储介质
TWI514182B (zh) 包括基於生物特徵匹配的手指操作輸入裝置之電子裝置及相關方法
WO2018137448A1 (zh) 一种终端指纹识别的方法及移动终端
KR20170098096A (ko) 생체 정보 기반 인증을 이용한 전자 장치들 간 연결 방법 및 장치
TW201322142A (zh) 利用偵測生物特徵執行軟體功能的方法和相關電子裝置
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
JP7083838B2 (ja) 指紋識別に基づくアプリケーションの起動方法および装置
CN104318185A (zh) 一种应用控制方法、设备及移动终端
CN110263515B (zh) 一种加密应用的打开方法及终端设备
JP2015018413A (ja) 携帯端末、画像表示方法、及びプログラム
US9424416B1 (en) Accessing applications from secured states
CN113282202A (zh) 应用图标功能执行方法、装置、通信设备及存储介质
KR20170000654A (ko) 지문 인식 시스템
TWI767623B (zh) 用於保護電子運算裝置應用程式的方法
JP6765929B2 (ja) 情報処理装置とその制御方法及びプログラム
KR20200101187A (ko) 전자 장치에서 사용자 입력을 위한 피드백 제공 장치 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17932839

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17932839

Country of ref document: EP

Kind code of ref document: A1