WO2019196655A1 - 模式切换方法和装置、计算机可读存储介质、终端 - Google Patents

模式切换方法和装置、计算机可读存储介质、终端 Download PDF

Info

Publication number
WO2019196655A1
WO2019196655A1 PCT/CN2019/079924 CN2019079924W WO2019196655A1 WO 2019196655 A1 WO2019196655 A1 WO 2019196655A1 CN 2019079924 W CN2019079924 W CN 2019079924W WO 2019196655 A1 WO2019196655 A1 WO 2019196655A1
Authority
WO
WIPO (PCT)
Prior art keywords
user mode
switching signal
switching
terminal
primary user
Prior art date
Application number
PCT/CN2019/079924
Other languages
English (en)
French (fr)
Inventor
张伟杰
张俊
谭春宏
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2019196655A1 publication Critical patent/WO2019196655A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to a mode switching method and apparatus, a computer readable storage medium, and a terminal.
  • terminal devices As terminal devices enter the era of intelligence, mobile terminals such as mobile phones and communication tablets play an increasingly important role in people's lives. Through various software applications, people can meet different needs in social, shopping, entertainment, work, and learning. Because the terminal stores a large amount of private information related to work and life, users pay more and more attention to the privacy security of the terminal.
  • a user mode with a lower privilege such as a guest mode can be set on the terminal, and the output of the privacy data is restricted in this type of user mode to protect the user's privacy from being leaked.
  • the switching operation of entering and exiting this type of user mode is more obvious and easy to be perceived by others.
  • a mode switching method includes:
  • the first switching signal is detected.
  • the primary user mode is switched to the secondary user mode.
  • the primary user mode has higher terminal usage rights than the secondary user mode.
  • the second switching signal is detected.
  • the main user mode is switched back according to the second switching signal.
  • a mode switching device includes:
  • the first detecting module is configured to detect the first switching signal when in the primary user mode.
  • the second detecting module is configured to detect the second switching signal when in the secondary user mode.
  • a processing module configured to switch from the primary user mode to the secondary user mode when the first switching signal includes a specific terminal attitude change feature.
  • the primary user mode has higher terminal usage rights than the secondary user mode.
  • the processing module is further configured to switch back to the primary user mode according to the second switching signal when the second switching signal includes the specific biometric.
  • a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the steps of a mode switching method in various embodiments of the present application.
  • a terminal includes a memory, a processor, and a computer program stored on the memory and operable on the processor, the processor executing the computer program to implement the steps of the mode switching method in various embodiments of the present application.
  • the mode switching method and device, the computer readable storage medium, and the terminal exit the primary user mode and enter the secondary user mode by verifying the posture change of the terminal, and then exit the secondary user mode according to the biometric identification technology to enter the primary user mode. Therefore, the sub-user mode is entered by adopting a more concealed verification method to ensure that the switching process is not easily perceived by others; and the bio-authentication method with high recognition accuracy is adopted to enter the main user mode, thereby ensuring that the privacy data of the main user mode is not easily leaked.
  • FIG. 1 is a schematic diagram showing the internal structure of a terminal in an embodiment
  • FIG. 2 is a flow chart of a mode switching method in an embodiment
  • FIG. 3 is a schematic diagram showing changes in attitude of a terminal in an embodiment
  • FIG. 4 is a schematic diagram showing a posture change of a wearable device in an embodiment
  • FIG. 5 is a flow chart showing the steps of switching from a primary user mode to a secondary user mode according to a first switching signal in one embodiment
  • FIG. 6 is a flowchart of a mode switching method in a screen-off state in an embodiment
  • Figure 7 is a block diagram showing the structure of a mode switching device in an embodiment
  • FIG. 8 is a block diagram showing a part of a structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • FIG. 1 is a schematic diagram showing the internal structure of a terminal in an embodiment.
  • the terminal includes a processor, a memory, and a display connected through a system bus.
  • the processor is used to provide computing and control capabilities to support the operation of the entire terminal.
  • the memory is used to store data, programs, and/or instruction codes, etc., and the memory stores at least one computer program, which can be executed by the processor to implement the mode switching method applicable to the terminal provided in the embodiments of the present application.
  • the memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a read-only memory (ROM), or a random storage memory (Random-Access-Memory, RAM).
  • the memory includes a non-volatile storage medium and an internal memory.
  • Non-volatile storage media stores operating systems, databases, and computer programs.
  • the database stores data related to implementing a mode switching method provided by the above various embodiments, such as storing acceleration verification features, biometric verification features, and the like.
  • the computer program can be executed by a processor for implementing a mode switching method provided by various embodiments of the present application.
  • the internal memory provides a cached operating environment for operating systems, databases, and computer programs in non-volatile storage media.
  • the display screen can be a touch screen, such as a capacitive screen or an electronic screen, for displaying interface information of the terminal.
  • the terminal can be a mobile phone, a tablet or a personal digital assistant or a wearable device.
  • the structure shown in FIG. 1 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the terminal to which the solution of the present application is applied.
  • the specific terminal may include a ratio. More or fewer components are shown in the figures, or some components are combined, or have different component arrangements.
  • the terminal further includes a sensor connected through the system bus, and the sensor may be one of an acceleration sensor and a gyroscope, and is used for detecting the posture information of the terminal, for example, detecting the position data of the terminal, the rotation angle, and the like.
  • the mode switching method provided by the present application can be applied to support the same terminal used by different users, and can be switched between different user modes, and different users (user A, user B) correspond to different user modes, that is, one user corresponds to A user mode (user A corresponds to one user mode and user B corresponds to another user mode).
  • FIG. 2 is a flow chart of a mode switching method in one embodiment.
  • the mode switching method in this embodiment is described by taking the terminal running in FIG. 1 as an example. As shown in FIG. 2, the mode switching method includes steps 202 to 208.
  • Step 202 When in the primary user mode, detecting the first switching signal.
  • the first switching signal includes a posture change signal of the terminal.
  • the primary user mode and the secondary user mode are a set of relative concepts, the difference being that the primary user mode has higher terminal resource control and access rights (ie, terminal usage rights) than the secondary user mode.
  • the terminal when the terminal is in the primary user mode, it has the highest settings and access control rights for the data stored on the terminal, and can use all the resources of the terminal.
  • the terminal When the terminal is in the secondary user mode, it is allowed to view some information, use some functions of the terminal, and not allow to use SMS, install unknown applications, and so on.
  • the secondary user mode can be an existing guest mode and the primary user mode is a non-guest mode.
  • the number of primary and secondary user modes and the division of rights are not limited to this. Users can also configure two user modes with different permissions. The mode with high permissions is the primary user mode, and the mode with lower permissions is the secondary user mode.
  • the first switching signal includes a terminal attitude change signal
  • the terminal attitude change signal is used to describe actions such as movement and rotation of the terminal
  • the posture change of the terminal includes detailed actions such as a combination of up, down, left, and right movement, flipping, flipping, and moving of the terminal.
  • the terminal attitude change signal may include a rotational attitude change signal, and the Gyro-sensor (also called an angular velocity sensor) may detect the rotation of the terminal and generate a corresponding rotational attitude change signal.
  • the gyro chip on the terminal may specifically include a MEMS Gyroscope, a Ring Laser Gyroscope (RLS), or the like.
  • FIG. 3 is a schematic diagram showing changes in attitude of a terminal in an embodiment. As shown in FIG. 3, the terminal may be a mobile phone 320 that is flipped (turned to the right) by the user's finger 340 in the direction of arrow 340.
  • the gyro chip (not shown) built in the mobile phone 320 detects the flipping action of the mobile phone 320 to generate a corresponding mobile phone rotational attitude change signal.
  • the terminal attitude change signal may include a moving attitude change signal, and the acceleration sensor detects the up, down, left, and right movement of the terminal to generate a corresponding moving attitude change signal.
  • the mobile phone 320 is translated in the direction of the arrow 360 by the user's finger 340.
  • an acceleration sensor (not shown) built in the mobile phone 320 can detect the moving motion of the mobile phone 320 and generate a corresponding mobile phone movement posture change signal.
  • step 204 switching from the primary user mode to the secondary user mode according to the first switching signal; the primary user mode has higher terminal usage rights than the secondary user mode.
  • Terminal usage rights may include permissions to use the privacy application, permissions to use the financial application, permissions to download and delete files, and permissions to use the data network.
  • the privacy application may include a short message application, a social application such as WeChat and Weibo, and an album application; the financial application may include a banking application, an Alipay, etc.; the right to download and delete the file includes deleting all or part of the file, and the download size exceeds a certain threshold. Documents and so on.
  • the process of switching from the primary user mode to the secondary user mode includes a reduction in terminal rights, for example, the right to open the financial application in the original primary user mode, and the terminal no longer has the right after switching to the secondary user mode.
  • the specific process includes matching the first switching signal with a preset attitude password by a processor on the terminal. If the match is successful, the mode is switched from the primary user mode to the secondary user mode. If it is not successful, it is not switched.
  • Step 206 When detecting the second switching signal including the biometric signal, switch back to the main user mode according to the second switching signal.
  • the second switching signal includes a biometric signal, and the biometric signal is based on a biometric identification technology for identifying an identity.
  • biometric identification technology utilizes a human physiological characteristic or behavioral characteristic to identify an individual identity.
  • the type of biometric signal may include at least one of a fingerprint feature, a voiceprint feature, a facial feature, an iris feature, and a vein distribution feature.
  • the process of switching from the secondary user mode to the primary user mode includes an improvement of the terminal authority.
  • the secondary user mode does not have the right to open the financial application, and after switching to the primary user mode, the terminal has the open permission.
  • the specific process includes matching the second switching signal with a preset biometric password by a processor on the terminal. If the match is successful, the mode is switched from the secondary user mode to the primary user mode. If it is not successful, it is not switched.
  • the mode switching method in this embodiment exits the primary user mode and enters the secondary user mode by verifying the terminal posture change of the terminal, and then exits the secondary user mode according to the biometric identification technology to enter the primary user mode. Therefore, the sub-user mode is entered by adopting a more concealed verification method to ensure that the switching process is not easily perceived by others; and the bio-authentication method with high recognition accuracy is adopted to enter the main user mode, thereby ensuring that the privacy data of the main user mode is not easily leaked.
  • the mode switching method in this embodiment may enable the user to switch to the guest mode by simply moving and/or flipping the mobile phone with a specific rule when the user lends the mobile phone, so that the person who borrows the mobile phone feels suspicion of others, and Subsequent biometric verification such as fingerprints and irises can exit the guest mode, and the person who borrows the mobile phone happens to move the flip phone and exit the guest mode, thereby causing the user's privacy to leak.
  • the mode switching method of the present application can be applied to support the same terminal used by multiple users, and can be switched between multiple user modes, and different users can be divided into two types: a primary user and a secondary user, and multiple primary users.
  • a primary user and a secondary user corresponds to different primary user modes
  • multiple secondary users correspond to different secondary user modes.
  • the step of switching from the primary user mode to the secondary user mode according to the first switching signal comprises: matching the first switching signal with the preset at least two attitude ciphers; determining the first switching signal The secondary user mode corresponding to the matched gesture password; switching from the primary user mode to the corresponding secondary user mode.
  • the number of secondary user modes is not limited, and at least two secondary user modes may be configured on one terminal, and each secondary user mode is configured with a corresponding posture password, when the first switching signal is associated with a posture password of a secondary user mode.
  • each secondary user mode is configured with a corresponding posture password, when the first switching signal is associated with a posture password of a secondary user mode.
  • the specific process includes: acquiring, by the terminal, the first switching signal, comparing the first switching signal with the preset at least two posture passwords, determining a secondary user mode corresponding to the posture password that matches the first switching signal, and determining from the current The primary user mode switches to the corresponding secondary user mode.
  • the posture information indicating that the terminal is shaken up and down twice is set as the posture password of the first user mode
  • the posture information indicating that the terminal is shaken twice or so is set as the posture password of the second user mode. Therefore, the terminal shaking up and down and shaking left and right will enter the first and second user modes, respectively.
  • the mode switching method provided in this embodiment simplifies the operation steps of selecting one of the plurality of secondary user modes by configuring different posture passwords for different secondary user modes, thereby improving the user experience.
  • the step of matching the first switching signal with the preset at least two attitude ciphers comprises: acquiring an input gesture cipher corresponding to the first switching signal; and using at least two gesture ciphers respectively and using the maximum matching algorithm The gesture password is checked.
  • the specific process includes: the terminal acquires the first switching signal, parses the first switching signal, and acquires an input gesture password corresponding to the first switching signal, where the input gesture password may be a string sequence generated according to the current user input operation, and the input gesture password is At least two pre-saved user gesture ciphers in the terminal are verified using a maximum matching algorithm.
  • the maximum matching algorithm mainly includes a forward maximum matching algorithm, an inverse maximum matching algorithm, and a bidirectional matching algorithm. The main principle is to cut out the single string, and then compare it with the thesaurus. If it is a word, record it. Otherwise, by adding or subtracting a single word, continue to compare, and there is still one word left.
  • the user who identifies the input first switching signal has the authority to switch the mode, and determines the secondary user mode corresponding to the user gesture password, and from the current The primary user mode switches to the corresponding secondary user mode.
  • the step of switching back to the primary user mode according to the second switching signal comprises:
  • a biometric type of the second switching signal is detected; the biometric type includes at least one of a fingerprint, a voiceprint, a face, an iris, and a vein distribution type.
  • a primary user mode corresponding to the second switching signal is determined according to the biometric type.
  • the number of primary user modes is not limited, and one terminal may include at least two primary user modes, and different biometric password types configured by different primary user modes are different.
  • the specific process includes: the terminal acquires the second switching signal, detects the biometric type of the second switching signal, and matches the second switching signal with the biometric password of the same biometric type. If the matching succeeds, the main user corresponding to the biometric password is entered. Mode, if it fails, it does not enter the main user mode. For example, when the fingerprint feature verification is passed, the first main user mode is entered, and when the voiceprint feature verification is passed, the second main user mode is entered, and the first and second main user modes are different user modes.
  • the mode switching method provided in this embodiment enters different main user modes by different types of biometric verification, thereby simplifying the operation steps of selecting one of the main user modes to switch back to the main user mode, thereby improving the user experience. .
  • the step of detecting the first switching signal comprises: detecting the first switching signal by the external wearable device and receiving the detected first switching when in the primary user mode signal.
  • the first switching signal is detected by the wearable device connected to the terminal, and the terminal further receives the detected first switching signal and determines whether the first switching signal includes a specific terminal posture change feature.
  • the terminal may include a mobile phone, and the external wearable device may include a headset connected to the mobile phone, a smart watch, a smart bracelet, and the like.
  • the device for detecting the first switching signal is changed to a headphone watch or a wristband, and the mobile phone is for receiving the detected first switching signal.
  • the 2.4 GHz wireless headset 420 is wirelessly connected to the mobile phone 440, and the movement of the user's head 460 causes the earphone 420 to move up and down, left and right, and tilt.
  • the attitude change signal of the earphone 420 is detected, and then transmitted to the mobile phone 440 by wireless transmission, and the mobile phone 440 further detects whether the first switching signal includes a specific terminal attitude change feature.
  • the terminal is switched from the primary user mode to the secondary user mode by verifying the posture change of the wearable device connected to the terminal, thereby improving the concealment of the verification process.
  • Figure 5 is a flow diagram of switching from a primary user mode to a secondary user mode in accordance with a first switching signal in one embodiment. As shown in FIG. 5, switching from the primary user mode to the secondary user mode according to the first switching signal includes steps 502 to 508.
  • Step 502 Analyze an angular velocity variation feature corresponding to the first switching signal; the angular velocity variation feature includes an angular velocity direction variation feature or an angular velocity magnitude variation feature.
  • the gyroscope inside the control terminal generates a first switching signal, and the first switching signal carries an angular velocity variation characteristic.
  • the specific process is as follows: the first switching signal generated by the mobile phone gyroscope is received by the processor of the terminal, and the first switching signal is analyzed to obtain the direction and size variation characteristics of the angular velocity. If it is detected that the terminal is rotated 360 degrees, or the terminal is detected to rotate 50 degrees clockwise and then rotate 50 degrees counterclockwise. On the other hand, the speed of the terminal rotation can be detected by the mobile phone gyroscope. If the terminal is rotated 180 degrees within 1 s; further combined with the time information, it can be detected whether the terminal pauses for one end time after rotating 90 degrees, and then continues to rotate 90 degrees.
  • Step 504 Determine whether the deviation between the angular velocity variation feature and the verification feature is greater than a deviation threshold.
  • step 506 is executed to switch from the primary user mode to the secondary user mode. Otherwise, step 508 is executed, not switching from the primary user mode to the secondary user mode.
  • the verification feature is a preset data that can be pre-stored in the non-volatile memory of the terminal or pre-stored on the system server. By pre-existing the verification feature on the server, the authentication feature backed up on the server can be directly imported into the new phone after the phone is replaced, avoiding the cumbersome steps of resetting the verification feature.
  • the verification feature can be initially set or modified on the terminal, or the updated verification feature can be obtained from the server to replace the previously stored verification feature.
  • the verification feature may be one or more preset rotation angle data, and may also include combined data of the rotation angle size and the rotation direction, and may also include combination data of the rotation angle, the rotation direction, and the time.
  • the setting of the data may be that the user inputs a certain number through a touch operation, or may output and display a plurality of values for the user to select, and after receiving the user selection instruction, determine the selected value as the preset verification data.
  • the verification feature includes data characterizing the terminal to rotate 90 degrees.
  • the manner of determining the deviation may include first performing an integral calculation on the angular velocity change in time to obtain an angle of the terminal rotation. If the current terminal rotation angle is less than the preset angle, the determination deviation is a negative value; if the current terminal rotation angle is greater than The preset angle determines that the deviation is positive.
  • the deviation threshold represents a deviation allowable range between the currently detected rotation angle change of the terminal and the preset rotation angle.
  • the preset angle in the verification feature is 90 degrees. Since the deviation threshold is -10 degrees, as long as the user rotates the terminal more than 80 degrees, the determination is greater than the deviation threshold, allowing switching from the primary user mode to the secondary user mode. If the deviation threshold is increased to 0 degrees, the terminal rotation angle exceeds 90 degrees, and it is determined that the deviation threshold is greater than the deviation threshold. In theory, the deviation threshold cannot exceed the preset angle in the verification feature. It can be seen that if the preset deviation threshold is smaller, the process of the terminal switching from the primary user mode to the secondary user mode is more sensitive, but the probability of false triggering is also greater.
  • the deviation threshold can be a range of values that can be obtained by a large number of experimental calculations in the laboratory for most people, or can be set by the user according to his own needs.
  • the process of switching from the primary user mode to the secondary user mode includes the reduction of the terminal permission level.
  • some applications that can be opened in the primary user mode after the switch cannot be opened in the secondary user mode, and the specific rights can be referred to the foregoing. , will not repeat them here.
  • the mode switching method in this embodiment by setting a certain deviation threshold, the user is prevented from artificially predicting the angle error during the rotation process, and the secondary user mode cannot be switched in time, resulting in privacy leakage.
  • the method further includes the step of setting the verification feature, including:
  • the verification setting instruction is received, and the setting state is entered; in the setting state, the verification feature is generated according to the posture change signal generated due to the terminal posture change of the terminal. Accept the end command and exit the setting state according to the end command.
  • the verification setting instruction can be generated according to the touch operation of the user on the touch screen, and can also be automatically generated according to specific conditions.
  • the specific condition may be that the user is in the terminal initial setting phase, and the verification setting instruction is automatically generated at this time to enter the setting state.
  • the verification command can be generated on the terminal or received from the outside.
  • the open duration of the set state is recorded; when the open duration reaches the preset time, an end command is automatically generated.
  • the end command can be generated according to the user operation, and the end command can be automatically generated after the state is turned on for a period of time to avoid the terminal being in the set state for a long time.
  • the setting state in which the terminal is located is turned on by the terminal receiving the verification setting instruction, and is ended by the terminal receiving the end instruction.
  • the terminal displays the corresponding interface or prompts the user to be in the setting state according to the voice information, etc., in this state, the user can perform operations such as rotating and panning the terminal.
  • the processor analyzes the maximum rotation angle generated by the rotation of the terminal, and sets the maximum rotation angle as the verification feature.
  • the maximum displacement produced by the terminal translation is analyzed and the maximum displacement is set as the verification feature.
  • This verification feature is a combination of rotation and translation. It is also possible that the user rotates the terminal in a plurality of setting states, and the processor analyzes the maximum rotation angle in each setting state, obtains an average maximum rotation angle, and sets it as a verification feature.
  • the user rotates the terminal in multiple directions.
  • the user rotates with the longer side of the terminal as an axis (in the direction of arrow 340), then rotates with the shorter side of the terminal as an axis (along arrow 380), detecting the two maximum angles of rotation produced by the rotation and
  • the two maximum rotation angles and the two rotation directions are set as the verification features for the corresponding two rotation directions.
  • the mode switching method in this embodiment simplifies the step of setting the verification feature by using the posture change signal generated in the set state as the verification feature.
  • the mode switching method further includes steps 602 to 604.
  • Step 602 Detect a screen state of the terminal, where the screen state includes a screen-off state and a bright-screen state.
  • the screen status includes the off screen status and the bright screen status.
  • the Power Manager Service can detect whether the screen is lit or not, and determine whether the terminal is in a bright state or a blackout state.
  • the power receives the light-off screen call, it will first set the mobile phone wakefullness state, and then send the light-off screen broadcast to notify other application mobile phones that the screen is on or off.
  • the user mode in which the terminal is located is detected.
  • the user mode in which the terminal is in the off state can be determined according to the user mode in which the terminal is located when the screen is last turned off. For example, if the terminal is in the primary user mode when the screen is last turned off, the terminal in the off-screen state is in the primary user mode; if the terminal is in the secondary user mode when the screen is last cleared, the terminal in the off-screen state is In secondary user mode. In another example, it can also be set to be in the primary or secondary user mode regardless of the last time the screen is off, and the terminal after the screen is off will be in the primary user mode.
  • Step 604 in the screen-off state, according to the first switching signal, switching from the screen-off gesture to the bright screen posture and releasing the screen lock.
  • the first switching signal In the off-screen state, the first switching signal is detected, and when the first switching signal is received, the control screen is lit.
  • the lock screen state refers to a state in which the screen on the terminal can be successfully unlocked after the user inputs the correct unlock information.
  • the first and second switching signals can be used not only as the switching trigger signal between the primary and secondary user modes of the terminal, but also as the unlocking information in the lock screen state. After receiving the first and second switching signals, the lock screen state is automatically released.
  • the method before the step of switching from the screen-out gesture to the screen-on gesture and releasing the screen-locking step, the method further comprises: acquiring the user mode according to a user mode in which the terminal is located when the screen is last turned off; Receiving and detecting the first switching signal when the user mode is the main user mode; switching the user mode to the secondary user mode according to the first switching signal.
  • the step of releasing the lock screen state can be set after the step of switching to the secondary user mode, because unlocking if it has not been switched to the secondary user mode (such as guest mode), it is easy to expose user privacy. It can be understood that there is a mode detecting step before detecting the lock screen state, that is, detecting whether the current user mode has been switched to the secondary user mode, and if the first switching signal is received and the user mode is detected as the secondary user mode, The terminal automatically releases the lock screen status.
  • the mode switching method provided in this embodiment considers that the secondary user mode has low authority.
  • the unlocking information of the terminal in the secondary user mode can be simplified. That is, while the terminal is switched from the primary user mode to the secondary user mode according to the posture change of the terminal, the automatic unlocking screen can also be realized according to the posture change. Greatly simplified user operations.
  • the mobile phone owner can flip the mobile phone in a preset manner for two weeks, at which time the mobile phone switches to the guest mode and completes the screen unlocking. This not only protects user privacy but also simplifies user operations.
  • the method includes: acquiring desktop theme information loaded in the primary user mode; controlling, after switching from the primary user mode to the secondary user mode, loading the secondary user mode Desktop theme information.
  • the mobile phone is in a bright screen state, and someone borrows the mobile phone.
  • the mobile phone owner inputs the first switching signal, for example, the mobile phone is flipped in a preset manner for two weeks, and then the mobile phone switches to the guest mode.
  • the theme of the mobile phone desktop remains the same, thereby protecting the privacy of the user and ensuring that the switching process is not easily detected by others.
  • FIGS. 1-6 are sequentially displayed as indicated by the arrows, these steps are not necessarily performed in the order indicated by the arrows. Except as explicitly stated herein, the execution of these steps is not strictly limited, and the steps may be performed in other orders. Moreover, at least some of the steps in FIGS. 1-6 may include a plurality of sub-steps or stages, which are not necessarily performed at the same time, but may be executed at different times, these sub-steps or stages The order of execution is not necessarily performed sequentially, but may be performed alternately or alternately with at least a portion of other steps or sub-steps or stages of other steps.
  • Fig. 7 is a block diagram showing the structure of a mode switching device of an embodiment. As shown in FIG. 7, the mode switching device 700 includes:
  • the first detecting module 701 is configured to detect the first switching signal when in the primary user mode.
  • the first switching signal includes a terminal attitude change signal of the terminal.
  • the second detecting module 702 is configured to detect a second switching signal that includes the biometric signal.
  • the processing module 703 is configured to switch from the primary user mode to the secondary user mode according to the first switching signal.
  • the primary user mode has higher terminal usage rights than the secondary user mode.
  • the processing module 703 is further configured to switch back to the primary user mode according to the second switching signal when the second switching signal is detected.
  • the processor 703 exits the primary user mode and enters the secondary user mode by receiving the first switching signal of the first detecting module 701, and the processor 703 receives the second switching by the second detecting module 703.
  • the signal exits the secondary user mode and enters the primary user mode.
  • This application adopts a more concealed verification method to enter the secondary user mode, ensuring that the switching process is not easily perceived by others.
  • the authentication mode with high recognition accuracy is used to enter the main user mode, which ensures that the privacy data of the main user mode is not easily leaked.
  • the mode switching apparatus 700 in this embodiment may enable the user to switch to the guest mode by simply flipping the mobile phone with a specific rule when the user lends the mobile phone, so that the person who borrows the mobile phone feels suspicion of others, and subsequently adopts Fingerprint verification can exit the guest mode, and the person who borrows the mobile phone happens to flip the mobile phone and exits the guest mode, thereby causing the user's privacy to leak.
  • the processing module includes:
  • a comparing unit configured to match the first switching signal with the preset at least two posture passwords.
  • a selecting unit configured to determine a secondary user mode corresponding to the gesture password that matches the first switching signal.
  • a switching unit configured to switch from the primary user mode to the corresponding secondary user mode.
  • the mode switching apparatus provided in this embodiment simplifies the operation steps of selecting one of the plurality of secondary user modes by configuring different posture passwords for different secondary user modes, thereby improving the user experience.
  • the processing module includes:
  • the type identifying unit is configured to detect a biometric type of the second switching signal; the biometric type includes at least one of a fingerprint, a voiceprint, a face, an iris, and a vein distribution type.
  • a selecting unit configured to determine a primary user mode corresponding to the second switching signal according to the biometric type
  • the switching unit switches from the secondary user mode back to the corresponding primary user mode.
  • the mode switching device in this embodiment enters different main user modes by different types of biometric verification, thereby simplifying the operation steps of selecting to switch back to one of the main user modes, and improving the user experience. .
  • the processing module is further configured to: when in the primary user mode, detect the first switching signal by the external wearable device, and receive the detected first switching signal
  • the mode switching device in this embodiment controls the terminal to switch from the primary user mode to the secondary user mode by verifying the posture change of the wearable device connected to the terminal, thereby improving the concealability of the verification process.
  • the processing module includes:
  • the analyzing unit is configured to analyze an angular velocity variation characteristic corresponding to the first switching signal.
  • the angular velocity variation feature includes an angular velocity direction change characteristic or an angular velocity change characteristic.
  • the determining unit is configured to determine whether a deviation between the angular velocity change feature and the preset verification feature is greater than a set deviation threshold. If yes, switch from primary user mode to secondary user mode. Otherwise, it does not switch from the primary user mode to the secondary user mode.
  • the mode switching device in this embodiment prevents a user from automatically switching to the secondary user mode in time by setting a certain deviation threshold, thereby preventing privacy leakage.
  • the processing module includes:
  • the startup unit is configured to receive the verification setting instruction and enter a setting state.
  • the generating unit generates a verification feature according to a state change signal generated due to a change in the terminal posture of the terminal in the set state.
  • the exit module is configured to receive an end instruction and exit the set state.
  • the process of setting the verification feature is simplified by using the attitude change signal generated in the set state as the verification feature.
  • each module in the above mode switching device is for illustrative purposes only. In other embodiments, the mode switching device may be divided into different modules as needed to complete all or part of the functions of the mode switching device.
  • the various modules in the above mode switching device may be implemented in whole or in part by software, hardware, and combinations thereof.
  • Each of the above modules may be embedded in or independent of the processor in the computer device, or may be stored in a memory in the computer device in a software form, so that the processor invokes the operations corresponding to the above modules.
  • each module in the mode switching device may be in the form of a computer program.
  • the computer program can run on a terminal or server.
  • the program modules of the computer program can be stored on the memory of the terminal or server.
  • the embodiment of the present application also provides a computer readable storage medium.
  • One or more non-transitory computer readable storage media containing computer executable instructions that, when executed by one or more processors, cause the processor to perform the steps of a mode switching method.
  • a computer program product comprising instructions that, when run on a computer, cause the computer to perform a mode switching method.
  • the embodiment of the present application further provides a terminal.
  • a terminal As shown in FIG. 8 , for the convenience of description, only the parts related to the embodiments of the present application are shown. For details that are not disclosed, refer to the method part of the embodiment of the present application.
  • the terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the terminal is a mobile phone as an example:
  • FIG. 8 is a block diagram showing a part of a structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components.
  • RF radio frequency
  • the RF circuit 810 can be used for receiving and transmitting information during the transmission or reception of information, and can receive and send the downlink information of the base station, and then send the uplink data to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • RF circuitry 810 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
  • the memory 820 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application required for at least one function (such as an application of a sound playing function, an application of an image playing function, etc.);
  • the data storage area can store data (such as audio data, address book, etc.) created according to the use of the mobile phone.
  • memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 830 can be used to detect a user touch operation to generate a time setting instruction, and generate a key signal input related to user settings and function control of the mobile phone 800.
  • the input unit 830 may include an operation panel 831 and other input devices 832.
  • the operation panel 831 which may also be referred to as a touch screen, may collect touch operations on or near the user (such as an operation of the user using a finger, a stylus, or the like on any of the appropriate objects or accessories on or near the operation panel 831) And drive the corresponding connection device according to a preset program.
  • the operation panel 831 can include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 880 is provided and can receive commands from the processor 880 and execute them.
  • the operation panel 831 can be realized by various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 830 may also include other input devices 832.
  • other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.).
  • the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
  • the display unit 840 can include a display panel 841.
  • the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the operation panel 831 can cover the display panel 841, and when the operation panel 831 detects a touch operation thereon or nearby, it is transmitted to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event The type provides a corresponding visual output on display panel 841.
  • the operation panel 831 and the display panel 841 are two separate components to implement the input and input functions of the mobile phone, in some embodiments, the operation panel 831 and the display panel 841 may be integrated to implement the mobile phone. Input and output functions.
  • the handset 800 can also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a distance sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the distance sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
  • the motion sensor may include an acceleration sensor, and the acceleration sensor can detect the magnitude of the acceleration in each direction, and the magnitude and direction of the gravity can be detected at rest, and can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching), and vibration recognition related functions (such as Pedometer, tapping, etc.; in addition, the phone can also be equipped with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors.
  • the first switching signal can be generated by the gyroscope according to the terminal attitude change of the terminal.
  • Audio circuitry 860, speaker 861, and microphone 862 can provide an audio interface between the user and the handset.
  • the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then processed by the audio data output processor 880, sent to another mobile phone via the RF circuit 810, or outputted to the memory 820 for subsequent processing.
  • WiFi is a short-range wireless transmission technology
  • the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
  • FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone 800 and can be omitted as needed.
  • the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The various functions of the mobile phone and the processing of the data, so that the overall monitoring of the mobile phone.
  • processor 880 can include one or more processing units.
  • the processor 880 can integrate an application processor and a modem, wherein the application processor primarily processes an operating system, a user interface, an application, etc.; the modem primarily processes wireless communications. It will be appreciated that the above modem may also not be integrated into the processor 880.
  • the processor 880 can integrate an application processor and a baseband processor, and the baseband processor and other peripheral chips can form a modem.
  • the mobile phone 800 also includes a power source 890 (such as a battery) that supplies power to various components.
  • the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the handset 800 can also include a camera, a Bluetooth module, and the like.
  • the processor included in the mobile phone implements the mode switching method described above when executing a computer program stored in the memory.
  • Non-volatile memory can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory can include random access memory (RAM), which acts as an external cache.
  • RAM is available in a variety of forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization.
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDR SDRAM dual data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM Link (Synchlink) DRAM
  • SLDRAM Memory Bus
  • Rambus Direct RAM
  • RDRAM Direct Memory Bus Dynamic RAM
  • RDRAM Memory Bus Dynamic RAM

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

一种模式切换方法,包括:当处于主用户模式时,检测第一切换信号;所述第一切换信号包括终端的姿态变化信号;根据所述第一切换信号从主用户模式切换至次用户模式;当检测到包括生物特征信号的第二切换信号时,根据所述第二切换信号切换回所述主用户模式。

Description

模式切换方法和装置、计算机可读存储介质、终端
相关申请的交叉引用
本申请要求于2018年4月10日提交中国专利局、申请号为201810317223.9,申请名称为“模式切换方法和装置、计算机可读存储介质、终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端技术领域,特别是涉及一种模式切换方法和装置、计算机可读存储介质、终端。
背景技术
随着终端设备进入智能时代,手机、通讯平板等移动终端在人们的生活中扮演越来越重要的角色。通过各种软件应用,可以在社交、购物、娱乐、工作、学习等方面满足人们的不同需求。由于终端上存储着大量涉及工作、生活的隐私信息,用户越来越关注终端的隐私安全性。
目前,终端上可设置访客模式等权限较低的用户模式,在该类用户模式下限制隐私数据的输出以保护用户隐私不被泄露。但进入和退出该类用户模式的切换操作较为明显,易被他人察觉。
发明内容
基于此,有必要提供一种模式切换方法、装置、计算机可读存储介质、终端,可以实现用户模式的隐蔽切换,且方便快捷,提升了用户体验度。
一种模式切换方法,包括:
当处于主用户模式时,检测第一切换信号。
当第一切换信号包括特定的终端姿态变化特征时,从主用户模式切换至次用户模式。主用户模式具有比次用户模式更高的终端使用权限。
当处于次用户模式时,检测第二切换信号。
当第二切换信号包括特定的生物特征时,根据第二切换信号切换回主用户模式。
一种模式切换装置包括:
第一检测模块,用于当处于主用户模式时,检测第一切换信号。
第二检测模块,用于当处于次用户模式时,检测第二切换信号。
处理模块,用于当第一切换信号包括特定的终端姿态变化特征时,从主用户模式 切换至次用户模式。主用户模式具有比次用户模式更高的终端使用权限。处理模块还用于当第二切换信号包括特定的生物特征时,根据第二切换信号切换回主用户模式。
一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现本申请各个实施例中的模式切换方法的步骤。
一种终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现本申请各个实施例中的模式切换方法的步骤。
上述模式切换方法和装置、计算机可读存储介质、终端,通过验证终端的姿态变化而退出主用户模式进入次用户模式,再根据生物特征识别技术退出次用户模式进入主用户模式。从而采用隐蔽性较强的验证方式进入次用户模式,保证切换过程不易被他人察觉;再配合采用识别准确率高的生物验证方式进入主用户模式,保证了主用户模式的隐私数据不易泄露。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他实施例的附图。
图1为一个实施例中终端的内部结构示意图;
图2为一个实施例中模式切换方法的流程图;
图3为一个实施例中终端姿态变化示意图;
图4为一个实施例中可穿戴设备的姿态变化示意图;
图5为一个实施例中根据第一切换信号从主用户模式切换至次用户模式的步骤的流程图;
图6为一个实施例中灭屏状态下模式切换方法的流程图;
图7为一个实施例中模式切换装置的结构框图;
图8为与本申请实施例提供的终端相关的手机的部分结构的框图。
具体实施方式
为了便于理解本发明,下面将参照相关附图对本发明进行更全面的描述。附图中给出了本发明的较佳实施例。但是,本发明可以以许多不同的形式来实现,并不限于本文所描述的实施例。相反地,提供这些实施例的目的是使对本发明的公开内容的理解更加透彻全面。
图1为一个实施例中终端的内部结构示意图。如图1所示,该终端包括通过系统总线连接的处理器、存储器和显示屏。其中,该处理器用于提供计算和控制能力,支撑整个终端的运行。存储器用于存储数据、程序、和/或指令代码等,存储器上存储至少一个计算机程序,该计算机程序可被处理器执行,以实现本申请实施例中提供的适用于终端的模式切换方法。存储器可包括磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)等非易失性存储介质,或随机存储记忆体(Random-Access-Memory,RAM)等。例如,在一个实施例中,存储器包括非易失性存储介质及内存储器。非易失性存储介质存储有操作系统、数据库和计算机程序。该数据库中存储有用于实现以上各个实施例所提供的一种模式切换方法相关的数据,比如可存储加速度验证特征、生物验证特征等。该计算机程序可被处理器所执行,以用于实现本申请各个实施例所提供的一种模式切换方法。内存储器为非易失性存储介质中的操作系统、数据库和计算机程序提供高速缓存的运行环境。显示屏可以是触摸屏,比如为电容屏或电子屏,用于显示终端的界面信息。该终端可以是手机、平板电脑或者个人数字助理或穿戴式设备等。
本领域技术人员可以理解,图1中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的终端的限定,具体的终端可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。如该终端还包括通过系统总线连接的传感器,传感器可以是加速度传感器、陀螺仪中的一种及以上,用于对终端的姿态信息进行检测,比如可用于检测终端的位置数据、转动角度等。
本申请所提供的模式切换方法可以应用于支持不同用户使用的同一终端,且可以在不同用户模式间进行切换,不同的用户(用户A、用户B)对应于不同的用户模式,即一个用户对应一种用户模式(用户A对应于一种用户模式、用户B对应于另一种用户模式)。
图2为一个实施例中模式切换方法的流程图。本实施例中的模式切换方法,以运行于图1中的终端上为例进行描述。如图2所示,模式切换方法包括步骤202至步骤208。
步骤202,当处于主用户模式时,检测第一切换信号。所述第一切换信号包括终端的姿态变化信号。
主用户模式和次用户模式是一组相对的概念,二者的区别在于主用户模式具有比次用户模式更高的终端资源控制和访问权限(即终端使用权限)。
一般来说,终端处于主用户模式时,对终端上存储的数据拥有最高的设置和访问控制权限,可以使用终端的所有资源等。终端处于次用户模式时,允许查看部分信息 资料,使用终端的部分功能,而不允许使用短信、安装未知应用等。例如,次用户模式可以是现有的访客模式,主用户模式则是非访客模式。
需要说明的是,主次用户模式的数量和权限划分不限于此。用户还可以自行配置两种不同权限的用户模式,其中权限高的模式即为主用户模式,权限较低的模式即为次用户模式。
第一切换信号包括终端姿态变化信号,终端姿态变化信号用于表征终端的移动和转动等动作,终端的姿态变化包括终端上下左右移动、翻转、翻转和移动的组合等细节性动作。
终端姿态变化信号可包括转动姿态变化信号,通过陀螺仪(Gyro-sensor,又叫角速度传感器)可检测终端的转动情况并生成相应的转动姿态变化信号。终端上的陀螺仪芯片具体可以包括微机电陀螺仪(MEMS Gyroscope)、激光陀螺仪(Ring Laser Gyroscope,RLS)等。图3为一个实施例中终端姿态变化示意图。如图3所示,终端可以是手机320,通过用户手指340使手机320沿箭头340方向翻转(向右翻转)。手机320内置的陀螺仪芯片(图中未示出)检测手机320的翻转动作以产生相应的手机转动姿态变化信号。
终端姿态变化信号可以包括移动姿态变化信号,通过加速度传感器检测终端的上下左右移动情况以生成相应的移动姿态变化信号。结合图3,通过用户手指340使手机320沿箭头360方向平移,此时手机320内置的加速度传感器(图中未示出)可以检测到手机320的移动动作并产生相应的手机移动姿态变化信号。
重新结合图2,步骤204,根据第一切换信号从主用户模式切换至次用户模式;主用户模式具有比次用户模式更高的终端使用权限。
终端使用权限可以包括使用隐私应用的权限、使用金融应用的权限、下载删除文件的权限以及使用数据网络的权限。其中,隐私应用可以包括短信应用,微信、微博这类社交应用以及相册应用等;金融应用可以包括银行应用、支付宝等;下载删除文件的权限包括删除全部或部分文件,以及下载大小超过一定阈值的文件等。
从主用户模式切换至次用户模式的过程包括终端权限的降低,例如,本来再主用户模式下所具有的开启金融应用的权限,在切换至次用户模式后,终端不再具有该权限。具体过程包括通过终端上的处理器将第一切换信号与预设的姿态密码相匹配。若匹配成功,则从主用户模式切换至次用户模式,若不成功,则不切换。
步骤206,当检测到包括生物特征信号的第二切换信号时,根据第二切换信号切换回主用户模式。
第二切换信号包括生物特征信号,生物特征信号基于生物特征识别技术而产生的用于识别身份的信号,所谓生物特征识别技术是利用人的生理特征或行为特征,来进 行个人身份的鉴定。生物特征信号的类型可包括指纹特征、声纹特征、面部特征、虹膜特征、静脉分布特征中的至少一种。
从次用户模式切换至主用户模式的过程包括终端权限的提高,例如,本来在次用户模式下不具有开启金融应用的权限,在切换至主用户模式后,终端具有开启权限。具体过程包括通过终端上的处理器将第二切换信号与预设的生物密码相匹配。若匹配成功,则从次用户模式切换至主用户模式,若不成功,则不切换。
本实施例中的模式切换方法,通过验证终端的终端姿态变化而退出主用户模式进入次用户模式,再根据生物特征识别技术退出次用户模式进入主用户模式。从而采用隐蔽性较强的验证方式进入次用户模式,保证切换过程不易被他人察觉;再配合采用识别准确率高的生物验证方式进入主用户模式,保证了主用户模式的隐私数据不易泄露。
具体地,本实施例中的模式切换方法可以使得用户出借手机时,只需将手机以特定的规则移动和/或翻转即可切换为访客模式,避免借手机的人感觉受到他人猜疑防备,并且后续通过指纹、虹膜等生物验证才能退出访客模式,避免借手机的人碰巧移动翻转手机而退出访客模式,进而导致用户的隐私泄露。
进一步地,本申请的模式切换方法可以应用于支持多个用户使用的同一终端,且可以在多个用户模式间进行切换,不同的用户可分为主用户和次用户两类,多个主用户(用户A1、用户A2)对应不同的主用户模式,多个次用户(用户B1、用户B2)对应不同的次用户模式。
在一个实施例中,根据第一切换信号从主用户模式切换至次用户模式的步骤,包括:将所述第一切换信号与预设的至少两个姿态密码相匹配;确定与第一切换信号相匹配的姿态密码所对应的次用户模式;从主用户模式切换至所述对应的次用户模式。
具体地,次用户模式的数量不限,一个终端上可以有至少两个次用户模式,每个次用户模式配置有对应的姿态密码,当第一切换信号与某个次用户模式的姿态密码相匹配时,选择进入该次用户模式,而不进入其他不匹配的次用户模式。
具体过程包括:终端获取第一切换信号,将第一切换信号与预设的至少两个姿态密码相比较后,确定与第一切换信号相匹配的姿态密码所对应的次用户模式,并从当前的主用户模式切换至所述相对应的次用户模式。例如,预先将表征终端上下摇动两次的姿态信息设置为第一次用户模式的姿态密码,将表征终端左右晃动两次的姿态信息设置为第二次用户模式的姿态密码。于是,终端上下摇动和左右摇动将分别进入第一、第二次用户模式。
本实施例提供的模式切换方法,通过为不同的次用户模式配置不同的姿态密码,简化了选择进入多个次用户模式中的某一个次用户模式的操作步骤,提高了用户体验。
在一个实施例中,将第一切换信号与预设的至少两个姿态密码相匹配步骤,包括:获取第一切换信号对应的输入姿态密码;利用最大匹配算法将至少两个姿态密码分别与输入姿态密码进行校验。
具体过程包括:终端获取第一切换信号,解析第一切换信号,获取第一切换信号对应的输入姿态密码,该输入姿态密码可以是根据当前用户输入操作生成的字符串序列,将输入姿态密码与终端内至少两个预先保存的用户姿态密码利用最大匹配算法进行校验。其中,最大匹配算法主要包括正向最大匹配算法、逆向最大匹配算法、双向匹配算法等。其主要原理都是切分出单字串,然后和词库进行比对,如果是一个词就记录下来,否则通过增加或者减少一个单字,继续比较,一直还剩下一个单字则终止。当存在与输入姿态密码相同或相似度满足阈值的用户姿态密码时,标识输入第一切换信号的用户具备切换模式的权限,并确定出与该用户姿态密码对应的次用户模式,且从当前的主用户模式切换至相对应的次用户模式。
在一个实施例中,根据第二切换信号切换回主用户模式的步骤,包括:
检测第二切换信号的生物特征类型;生物特征类型包括指纹、声纹、面部、虹膜、静脉分布类型中的至少一种。
根据生物特征类型,确定与第二切换信号对应的主用户模式。
从次用户模式切换回对应的主用户模式。
具体地,主用户模式的数量不限,一个终端上可以包括至少两个主用户模式,不同主用户模式配置的生物特征密码类型不同。
具体过程包括:终端获取第二切换信号,检测第二切换信号的生物特征类型,将第二切换信号与相同生物特征类型的生物密码相匹配,若匹配成功,则进入该生物密码对应的主用户模式,若失败,则不进入主用户模式。例如当指纹特征验证通过时,进入第一主用户模式,声纹特征验证通过时,进入第二主用户模式,第一、第二主用户模式是不同的用户模式。
本实施例提供的模式切换方法,通过不同类型的生物特征验证,进入不同的主用户模式,从而简化了选择切换回多个主用户模式中的某一个主用户模式的操作步骤,提高了用户体验。
在一个实施例中,当处于主用户模式时,检测第一切换信号的步骤,包括:当处于主用户模式时,通过外界的可穿戴设备检测第一切换信号,以及接收检测到的第一切换信号。
终端处于主用户模式时,通过与终端连接的可穿戴设备检测第一切换信号,终端进而接收检测到的第一切换信号并判断第一切换信号是否包括特定的终端姿态变化特征。终端可以包括手机,外界的可穿戴设备可以包括与手机连接的耳机、智能手表、 智能手环等。此时,检测第一切换信号的设备改为耳机手表或手环等,手机则是用于接收检测到的第一切换信号。如图4所示,2.4GHz无线耳机420与手机440无线连接,用户头部460运动导致耳机420上下左右移动以及倾斜,此时,耳机420上配置的陀螺仪装置和加速度传感器(图中未示出)检测到耳机420的姿态变化信号,接着通过无线传输方式将该信号传输至手机440,手机440进而对第一切换信号是否包括特定的终端姿态变化特征进行检测。
本实施例提供的模式切换方法,通过验证与终端连接的可穿戴设备的姿态变化,控制终端从主用户模式切换至次用户模式,从而提高了验证过程的隐蔽性。
图5为一个实施例中根据第一切换信号从主用户模式切换至次用户模式的流程图。如图5所示,根据第一切换信号从主用户模式切换至次用户模式包括步骤502至步骤508。
步骤502,分析第一切换信号对应的角速度变化特征;角速度变化特征包括角速度方向变化特征或角速度大小变化特征。
在其中一个实施例中,控制终端内部的陀螺仪生成第一切换信号,第一切换信号携带角速度变化特征。具体过程如下:通过终端的处理器接收手机陀螺仪产生的第一切换信号,分析第一切换信号,获得角速度的方向和大小变化特征。如检测到终端旋转了360度,或者,检测到终端先顺时针旋转50度再逆时针旋转50度。另一方面,可以通过手机陀螺仪检测终端旋转的速度。如终端是否在1s内旋转了180度;进一步结合时间信息,可以检测终端是否在旋转了90度后,暂停一端时间,接着再继续旋转90度。
步骤504,判断角速度变化特征与验证特征之间的偏差是否大于偏差阈值。
若是,则执行步骤506,从主用户模式切换至次用户模式。否则,执行步骤508,不从主用户模式切换至次用户模式。
验证特征是一个预设的数据,该数据可以预存在终端的非易失性存储器中,也可以预存在系统服务器上。通过将验证特征预存在服务器上可以在更换手机后,将服务器上备份的验证特征直接导入新手机中,避免要重新设置验证特征的繁琐步骤。验证特征可以在终端上进行初始设置或者修改,或者从服务器获取更新后的验证特征以替代原先存储的验证特征。
验证特征可以是一个或多个预设的旋转角度数据,还可以包括旋转角度大小和旋转方向的组合数据,还可以包括旋转角度、旋转方向和时间的组合数据。该数据的设置可以是用户通过触控操作输入某个数字,还可以是输出显示多个数值供用户选择,接收用户选择指令后,确定选择的数值作为预设的验证数据。如验证特征包括表征终端旋转90度的数据。
判断偏差的方式可以包括,首先对角速度变化在时间上进行积分计算以获得终端旋转的角度,若当前终端旋转的角度小于预设的角度,则判定偏差为负值;若当前终端旋转的角度大于预设的角度,则判定偏差为正值。
偏差阈值代表当前检测到的终端的旋转角度变化与预设的旋转角度之间的偏差允许范围。例如,验证特征中预设的角度为90度,由于偏差阈值为-10度,则只要用户将终端旋转角度超过80度,判定大于偏差阈值,允许从主用户模式切换至次用户模式。若增大偏差阈值为0度,则终端旋转角度超过90度时,才判定大于偏差阈值。理论而言,偏差阈值不可以超过验证特征中预设的角度。由此可见,若预设的偏差阈值越小,则终端从主用户模式切换至次用户模式的过程越敏感,但误触发的几率也更大。若预设的偏差阈值越大,则从主用户切换至次用户模式的要求更严格,误触的几率越小。偏差阈值可以是通过在实验室进行大量实验计算以获得的适用于大多数人的数值范围,也可以用户根据自身需要自行设置。
从主用户模式切换至次用户模式的过程包括终端权限等级的降低,例如,切换后一些原本可在主用户模式下打开的应用,在次用户模式下将无法打开,具体的权限内容可参照前文,在此不再赘述。
本实施例中的模式切换方法,通过设置一定的偏差阈值,避免用户在旋转过程中人为预估角度失误,无法及时切换至次用户模式,导致隐私泄露。
在一个实施例中,还包括设置所述验证特征的步骤,包括:
接收验证设置指令,进入设置状态;在设置状态下,根据因终端的终端姿态变化所产生的姿态变化信号生成验证特征。接受结束指令,根据结束指令退出设置状态。
验证设置指令可以根据用户在触控屏上的触控操作产生,还可以根据特定条件自动生成。特定条件可以是用户处于终端初始化设置阶段,此时自动生成验证设置指令,进入设置状态。验证指令可以在终端上生成,还可以是从外界接收。
在其中一个实施例中,记录设置状态的开启时长;当开启时长到达预设时间时,自动生成结束指令。
结束指令可根据用户操作生成,还可以设置状态开启一段时间后自动生成结束指令,以避免终端长时间处于设置状态。
终端所处的设置状态通过终端接收验证设置指令而开启,以及,通过终端接收结束指令而结束。在设置状态下,终端上显示相应的界面或根据语音信息等方式提示用户当前处于设置状态下,用户在此状态下可对终端进行旋转、平移等操作。在设置状态结束后,处理器分析终端旋转所产生的最大旋转角度,将该最大旋转角度设置为验证特征。另一方面,分析终端平移所产生的最大位移,并将该最大位移设置为验证特征。该验证特征为旋转和平移的组合。还可以是用户在多个设置状态下对终端进行旋 转操作,处理器分析各个设置状态下的最大旋转角度,获取平均最大旋转角度,并将其设置为验证特征。
例如,在设置状态下,用户将终端进行多个方向的旋转操作。重新结合图3,例如,用户以终端的较长边为轴线旋转(沿箭头340方向),接着以终端的较短边为轴线旋转(沿箭头380),检测旋转产生的两个最大旋转角度和对应的两个旋转方向,将两个最大旋转角度和两个旋转方向都设置为验证特征。
本实施例中的模式切换方法,通过将设置状态下产生的姿态变化信号作为验证特征,从而简化了设置验证特征的步骤。
在一个实施例中,模式切换方法还包括步骤602至步骤604.
步骤602,检测终端的屏幕状态,所述屏幕状态包括灭屏状态和亮屏状态;
屏幕状态包括灭屏状态和亮屏状态。具体地,可以通过Power Manager Service检测屏幕是否被点亮的方式,确定终端处于亮屏状态或熄屏状态。当power接收到亮灭屏调用后,会先进行设置手机wakefullness状态,之后发送亮灭屏广播通知其他应用手机处于亮屏还是灭屏状态。
检测到终端处于灭屏状态时,进而检测终端所处的用户模式。终端灭屏状态时所处的用户模式,可根据最近一次灭屏时终端所处的用户模式来决定。例如,若最近一次灭屏时,终端处于主用户模式下,则灭屏状态下的终端处于主用户模式;若最近一次灭屏时,终端处在次用户模式下,则灭屏状态下的终端处于次用户模式。在另一个例子中,还可以设置为,无论最近一次灭屏时,终端处于主或次用户模式,灭屏后的终端都会处于主用户模式下。
步骤604,在灭屏状态下,根据所述第一切换信号,由灭屏姿态切换至亮屏姿态并解除屏幕锁定。
在灭屏状态下,检测第一切换信号,当接收到第一切换信号时,控制屏幕点亮。
一般情况下,点亮后的屏幕处于锁屏状态。锁屏状态是指当用户输入正确的解锁信息后、终端上的屏幕才能被成功解锁的状态。
本实施例中,第一、第二切换信号不仅可作为终端主、次用户模式间的切换触发信号,还可作为锁屏状态下的解锁信息。在接收到第一、第二切换信号后,锁屏状态被自动解除。
在一个实施例中,所述由灭屏姿态切换至亮屏姿态并解除屏幕锁定步骤之前,所述方法还包括:根据最近一次灭屏时终端所处的用户模式获取所述用户模式;当所述用户模式为主用户模式时,接收并检测所述第一切换信号;根据所述第一切换信号将所述用户模式切换至所述次用户模式。
解除锁屏状态的步骤可以设置在切换至次用户模式步骤后进行,因为若还未切换 至次用户模式(如访客模式)就解锁的话,容易暴露用户隐私。可以理解的是,在解除锁屏状态之前还有一个模式检测步骤,即检测当前的用户模式是否已切换至次用户模式,若接收到第一切换信号以及检测到用户模式为次用户模式,则终端自动解除锁屏状态。
本实施例提供的模式切换方法,考虑到次用户模式具备的权限较低,为简化解锁操作,在次用户模式下终端的解锁信息可以简单化。即根据终端的姿态变化将终端从主用户模式切换至次用户模式的同时,还可以根据该姿态变化实现自动解锁屏幕。极大程度上简化了用户操作。
具体地,当手机处于锁屏状态时,有人来借手机,此时手机主人可以将手机以预设的方式翻转两周,此时手机即切换至访客模式并完成屏幕解锁。从而既保护了用户隐私又简化用户操作。
在其中一个实施例中,所述方法包括:获取所述主用户模式下加载的桌面主题信息;从所述主用户模式切换至所述次用户模式后,控制所述次用户模式下加载所述桌面主题信息。
具体地,手机处于亮屏状态,有人来借手机,此时手机主人通过输入第一切换信号,如将手机以预设的方式翻转两周,此时手机即切换至访客模式。切换前后,手机桌面主题保持一致,从而既保护了用户隐私又保证切换过程不易被他人察觉避免尴尬。
应该理解的是,虽然图1-6的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图1-6中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
图7为一个实施例的模式切换装置的结构框图。如图7所示,模式切换装置700包括:
第一检测模块701,用于当处于主用户模式时,检测第一切换信号。第一切换信号包括终端的终端姿态变化信号。
第二检测模块702,用于检测包括生物特征信号的第二切换信号。
处理模块703,用于根据第一切换信号从主用户模式切换至次用户模式。主用户模式具有比次用户模式更高的终端使用权限。处理模块703还用于当检测到第二切换信号时根据第二切换信号切换回主用户模式。
本实施例中的模式切换装置700,处理器703通过接收第一检测模块701的第一切 换信号而退出主用户模式进入次用户模式,处理器703再通过接收第二检测模块703的第二切换信号退出次用户模式进入主用户模式。本申请采用隐蔽性较强的验证方式进入次用户模式,保证切换过程不易被他人察觉。再配合采用识别准确率高的验证方式进入主用户模式,保证了主用户模式的隐私数据不易泄露。
具体地,本实施例中的模式切换装置700可以使得用户出借手机时,只需将手机以特定的规则移动翻转即可切换为访客模式,避免借手机的人感觉受到他人猜疑防备,并且后续采用指纹验证才能退出访客模式,避免借手机的人碰巧翻转手机导致退出访客模式,进而导致用户的隐私泄露。
在一个实施例中,处理模块包括:
比较单元,用于将第一切换信号与预设的至少两个姿态密码相匹配。
选择单元,用于确定与第一切换信号相匹配的姿态密码所对应的次用户模式。
切换单元,用于从主用户模式切换至所述对应的次用户模式。
本实施例提供的模式切换装置,通过为不同的次用户模式配置不同的姿态密码,简化了选择进入多个次用户模式中的某一个次用户模式的操作步骤,提高了用户体验。
在一个实施例中,处理模块包括:
类型识别单元,用于检测第二切换信号的生物特征类型;生物特征类型包括指纹、声纹、面部、虹膜、静脉分布类型中的至少一种。
选择单元,用于根据生物特征类型,确定与第二切换信号对应的主用户模式
切换单元,从次用户模式切换回对应的主用户模式。
本实施例中的模式切换装置,通过不同类型的生物特征验证,进入不同的主用户模式,从而简化了选择切换回多个主用户模式中的某一个主用户模式的操作步骤,提高了用户体验。
在一个实施例中,处理模块还用于当处于主用户模式时,通过外界的可穿戴设备检测第一切换信号,以及接收检测到的所述第一切换信号
本实施例中的模式切换装置,通过验证与终端连接的可穿戴设备的姿态变化,控制终端从主用户模式切换至次用户模式,从而提高了验证过程的隐蔽性。
在一个实施例中,处理模块,包括:
分析单元,用于分析第一切换信号对应的角速度变化特征。角速度变化特征包括角速度方向变化特征或角速度大小变化特征。
判断单元,用于判断角速度变化特征与预设的验证特征之间的偏差是否大于设定的偏差阈值。若是,则从主用户模式切换至次用户模式。否则,不从主用户模式切换至次用户模式。
本实施例中的模式切换装置,通过设置一定的偏差阈值,避免用户在旋转过程中 人为预估角度失误,无法及时切换至次用户模式,导致隐私泄露。
在一个实施例中,处理模块,包括:
启动单元,用于接收验证设置指令,进入设置状态。
生成单元,在设置状态下,根据因终端的终端姿态变化所产生的状态变化信号生成验证特征。
退出模块,用于接收结束指令,退出所述设置状态。
本实施例中的通过将设置状态下产生的姿态变化信号作为验证特征,从而简化了设置验证特征的过程。
上述模式切换装置中各个模块的划分仅用于举例说明,在其他实施例中,可将模式切换装置按照需要划分为不同的模块,以完成上述模式切换装置的全部或部分功能。
关于模式切换装置的具体限定可以参见上文中对于模式切换方法的限定,在此不再赘述。上述模式切换装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
本申请实施例中提供的模式切换装置中的各个模块的实现可为计算机程序的形式。该计算机程序可在终端或服务器上运行。该计算机程序构成的程序模块可存储在终端或服务器的存储器上。该计算机程序被处理器执行时,实现本申请实施例中所描述模式切换方法的步骤。
本申请实施例还提供了一种计算机可读存储介质。一个或多个包含计算机可执行指令的非易失性计算机可读存储介质,当所述计算机可执行指令被一个或多个处理器执行时,使得所述处理器执行模式切换方法的步骤。
一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行模式切换方法。
本申请实施例还提供了一种终端。如图8所示,为了便于说明,仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point ofSales,销售终端)、车载电脑、穿戴式设备等任意终端设备,以终端为手机为例:
图8为与本申请实施例提供的终端相关的手机的部分结构的框图。参考图8,手机包括:射频(Radio Frequency,RF)电路810、存储器820、输入单元830、显示单元840、传感器850、音频电路860、无线保真(wireless fidelity,WiFi)模块870、处理器880、以及电源890等部件。本领域技术人员可以理解,图8所示的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件 布置。
其中,RF电路810可用于收发信息或通话过程中,信号的接收和发送,可将基站的下行信息接收后,给处理器880处理;也可以将上行的数据发送给基站。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路810还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE))、电子邮件、短消息服务(Short Messaging Service,SMS)等。
存储器820可用于存储软件程序以及模块,处理器880通过运行存储在存储器820的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器820可主要包括程序存储区和数据存储区,其中,程序存储区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能的应用程序、图像播放功能的应用程序等)等;数据存储区可存储根据手机的使用所创建的数据(比如音频数据、通讯录等)等。此外,存储器820可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元830可用于检测用户触控操作以产生时间设置指令,以及产生与手机800的用户设置以及功能控制有关的键信号输入。具体地,输入单元830可包括操作面板831以及其他输入设备832。操作面板831,也可称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在操作面板831上或在操作面板831附近的操作),并根据预先设定的程式驱动相应的连接装置。在一个实施例中,操作面板831可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器880,并能接收处理器880发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现操作面板831。除了操作面板831,输入单元830还可以包括其他输入设备832。具体地,其他输入设备832可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)等中的一种或多种。
显示单元840可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。显示单元840可包括显示面板841。在一个实施例中,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板841。在一个实施例中,操作面板831可覆盖显示面板841,当操作面板 831检测到在其上或附近的触摸操作后,传送给处理器880以确定触摸事件的类型,随后处理器880根据触摸事件的类型在显示面板841上提供相应的视觉输出。虽然在图8中,操作面板831与显示面板841是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将操作面板831与显示面板841集成而实现手机的输入和输出功能。
手机800还可包括至少一种传感器850,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及距离传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板841的亮度,距离传感器可在手机移动到耳边时,关闭显示面板841和/或背光。运动传感器可包括加速度传感器,通过加速度传感器可检测各个方向上加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换)、振动识别相关功能(比如计步器、敲击)等;此外,手机还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器等。通过陀螺仪可根据终端的终端姿态变化产生第一切换信号。
音频电路860、扬声器861和传声器862可提供用户与手机之间的音频接口。音频电路860可将接收到的音频数据转换后的电信号,传输到扬声器861,由扬声器861转换为声音信号输出;另一方面,传声器862将收集的声音信号转换为电信号,由音频电路860接收后转换为音频数据,再将音频数据输出处理器880处理后,经RF电路810可以发送给另一手机,或者将音频数据输出至存储器820以便后续处理。
WiFi属于短距离无线传输技术,手机通过WiFi模块870可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图8示出了WiFi模块870,但是可以理解的是,其并不属于手机800的必须构成,可以根据需要而省略。
处理器880是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器820内的软件程序和/或模块,以及调用存储在存储器820内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监听。在一个实施例中,处理器880可包括一个或多个处理单元。在一个实施例中,处理器880可集成应用处理器和调制解调器,其中,应用处理器主要处理操作系统、用户界面和应用程序等;调制解调器主要处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器880中。比如,该处理器880可集成应用处理器和基带处理器,基带处理器与和其它外围芯片等可组成调制解调器。手机800还包括给各个部件供电的电源890(比如电池),优选的,电源可以通过电源管理系统与处理器880逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
在一个实施例中,手机800还可以包括摄像头、蓝牙模块等。
在本申请实施例中,该手机所包括的处理器执行存储在存储器上的计算机程序时实现上述所描述的模式切换方法。
本申请所使用的对存储器、存储、数据库或其它介质的任何引用可包括非易失性和/或易失性存储器。合适的非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM),它用作外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDR SDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)。
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本发明的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本发明构思的前提下,还可以做出若干变形和改进,这些都属于本发明的保护范围。因此,本发明专利的保护范围应以所附权利要求为准。

Claims (15)

  1. 一种模式切换方法,包括:
    当处于主用户模式时,检测第一切换信号;所述第一切换信号包括终端的姿态变化信号;
    根据所述第一切换信号从主用户模式切换至次用户模式;所述主用户模式具有比所述次用户模式更高的终端使用权限;
    当检测到包括生物特征信号的第二切换信号时,根据所述第二切换信号切换回所述主用户模式。
  2. 根据权利要求1所述的方法,其中,所述根据所述第一切换信号从主用户模式切换至次用户模式的步骤,包括:
    将所述第一切换信号与预设的至少两个姿态密码相匹配;
    确定与第一切换信号相匹配的姿态密码所对应的次用户模式;
    从主用户模式切换至所述对应的次用户模式。
  3. 根据权利要求2所述的方法,其中,所述将所述第一切换信号与预设的至少两个姿态密码相匹配步骤,包括:
    获取与所述第一切换信号对应的输入姿态密码;
    利用最大匹配算法将至少两个所述姿态密码分别与所述输入姿态密码进行校验。
  4. 根据权利要求1所述的方法,其中,所述根据所述第二切换信号切换回所述主用户模式的步骤,包括:
    检测所述第二切换信号的生物特征类型;所述生物特征类型包括指纹、声纹、面部、虹膜、静脉分布类型中的至少一种;
    根据所述生物特征类型,确定与第二切换信号对应的主用户模式;
    从次用户模式切换回所述对应的主用户模式。
  5. 根据权利要求1所述的方法,其中,所述当处于主用户模式时,检测第一切换信号的步骤,包括:
    当处于主用户模式时,通过外界的可穿戴设备检测第一切换信号,以及接收检测到的所述第一切换信号。
  6. 根据权利要求1所述的方法,其中,所述根据所述第一切换信号从主用户模式切换至次用户模式的步骤,包括:
    分析所述第一切换信号对应的角速度变化特征;所述角速度变化特征包括角速度方向变化特征或角速度大小变化特征;
    判断所述角速度变化特征与预设的验证特征之间的偏差是否大于设定的偏差阈值;
    若是,则从主用户模式切换至次用户模式;否则,不从主用户模式切换至次用户模式。
  7. 根据权利要求6所述的方法,其中,所述分析所述第一切换信号对应的角速度变化特征之前,所述方法还包括:
    控制所述终端内部的陀螺仪生成所述第一切换信号,所述第一切换信号携带所述角速度变化特征。
  8. 根据权利要求6所述的方法,其中,所述方法还包括设置所述验证特征的步骤,包括:
    接收验证设置指令,进入设置状态;
    在所述设置状态下,根据因终端姿态变化所产生的姿态变化信号生成验证特征;
    接受结束指令,退出所述设置状态。
  9. 根据权利要求8所述的方法,其中,所述方法还包括:
    记录所述设置状态的开启时长;
    当所述开启时长到达预设时间时,自动生成所述结束指令。
  10. 根据权利要求1所述的方法,其中,所述方法还包括:
    检测终端的屏幕状态,所述屏幕状态包括灭屏状态和亮屏状态;
    在灭屏状态下,根据所述第一切换信号,由灭屏姿态切换至亮屏姿态并解除屏幕锁定。
  11. 根据权利要求10所述的方法,其中,所述由灭屏姿态切换至亮屏姿态并解除屏幕锁定步骤之前,所述方法还包括:
    根据最近一次灭屏时终端所处的用户模式获取所述用户模式;
    当所述用户模式为主用户模式时,接收并检测所述第一切换信号;
    根据所述第一切换信号将所述用户模式切换至所述次用户模式。
  12. 根据权利要求1所述的方法,其中,所述方法包括:
    获取所述主用户模式下加载的桌面主题信息;
    从所述主用户模式切换至所述次用户模式后,控制所述次用户模式下加载所述桌面主题信息。
  13. 一种模式切换装置,包括:
    第一检测模块,用于当处于主用户模式时实时检测第一切换信号;所述第一切换信号包括终端的空间位置变化信号;
    第二检测模块,用于检测包括生物特征信号的第二切换信号;
    处理模块,用于根据所述第一切换信号从主用户模式切换至次用户模式;所述主用户模式具有比所述次用户模式更高的终端使用权限;还用于当检测到第二切换信号时根据所述第二切换信号切换回所述主用户模式。
  14. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1至12中任一项所述方法的步骤。
  15. 一种终端,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现权利要求1至12中任一项所述方法的步骤。
PCT/CN2019/079924 2018-04-10 2019-03-27 模式切换方法和装置、计算机可读存储介质、终端 WO2019196655A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810317223.9 2018-04-10
CN201810317223.9A CN108549804B (zh) 2018-04-10 2018-04-10 模式切换方法和装置、计算机可读存储介质、终端

Publications (1)

Publication Number Publication Date
WO2019196655A1 true WO2019196655A1 (zh) 2019-10-17

Family

ID=63514683

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/079924 WO2019196655A1 (zh) 2018-04-10 2019-03-27 模式切换方法和装置、计算机可读存储介质、终端

Country Status (2)

Country Link
CN (1) CN108549804B (zh)
WO (1) WO2019196655A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108549804B (zh) * 2018-04-10 2020-03-27 Oppo广东移动通信有限公司 模式切换方法和装置、计算机可读存储介质、终端
CN111182122A (zh) * 2018-11-12 2020-05-19 奇酷互联网络科技(深圳)有限公司 模式控制方法、智能终端以及具有存储功能的装置
CN110769406A (zh) * 2019-10-31 2020-02-07 拉扎斯网络科技(上海)有限公司 通信控制方法、装置及存储介质和电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136479A (zh) * 2011-11-22 2013-06-05 中兴通讯股份有限公司 移动终端的信息保护方法及装置
CN106778118A (zh) * 2016-11-16 2017-05-31 乐视控股(北京)有限公司 终端的模式切换方法及系统
CN107277266A (zh) * 2017-07-13 2017-10-20 广东小天才科技有限公司 一种模式切换方法及装置
CN107688425A (zh) * 2017-05-05 2018-02-13 平安科技(深圳)有限公司 一种进入访客模式的操作方法和一种移动终端
CN108549804A (zh) * 2018-04-10 2018-09-18 Oppo广东移动通信有限公司 模式切换方法和装置、计算机可读存储介质、终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103136479A (zh) * 2011-11-22 2013-06-05 中兴通讯股份有限公司 移动终端的信息保护方法及装置
CN106778118A (zh) * 2016-11-16 2017-05-31 乐视控股(北京)有限公司 终端的模式切换方法及系统
CN107688425A (zh) * 2017-05-05 2018-02-13 平安科技(深圳)有限公司 一种进入访客模式的操作方法和一种移动终端
CN107277266A (zh) * 2017-07-13 2017-10-20 广东小天才科技有限公司 一种模式切换方法及装置
CN108549804A (zh) * 2018-04-10 2018-09-18 Oppo广东移动通信有限公司 模式切换方法和装置、计算机可读存储介质、终端

Also Published As

Publication number Publication date
CN108549804B (zh) 2020-03-27
CN108549804A (zh) 2018-09-18

Similar Documents

Publication Publication Date Title
US10867025B2 (en) Opportunistically collecting sensor data from a mobile device to facilitate user identification
ES2945065T3 (es) Método para abrir rápidamente una aplicación o función de la aplicación y terminal
WO2018032661A1 (zh) 一种终端设备信息显示方法和终端设备
US11457017B2 (en) System and method of determing persistent presence of an authorized user while performing an allowed operation on an allowed resource of the system under a certain context-sensitive restriction
CN106778175B (zh) 一种界面锁定方法、装置和终端设备
KR20150046766A (ko) 단말기의 잠금 해제 처리방법, 장치, 단말기 장치, 프로그램 및 기록매체
CN109416800B (zh) 一种移动终端的认证方法及移动终端
US11176228B2 (en) Application interface display method, apparatus, and terminal, and storage medium
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
US11562051B2 (en) Varying computing device behavior for different authenticators
WO2019196693A1 (zh) 应用控制方法和装置、可读存储介质、终端
WO2013059464A1 (en) Context-dependent authentication
WO2019011109A1 (zh) 权限控制方法及相关产品
KR20150050732A (ko) 생체 정보를 이용한 인증 방법 및 이를 지원하는 휴대형 전자장치
US11017066B2 (en) Method for associating application program with biometric feature, apparatus, and mobile terminal
WO2020001385A1 (zh) 电子装置及应用程序控制方法
WO2019196655A1 (zh) 模式切换方法和装置、计算机可读存储介质、终端
CN108781234B (zh) 功能控制方法及终端
JP7148045B2 (ja) 認証ウィンドウ表示方法、端末、コンピュータ可読記憶媒体及びコンピュータプログラム
CA2845226C (en) Method of locking an application on a computing device
WO2017193645A1 (zh) 一种显示数据的方法、装置和终端
WO2021121178A1 (zh) 应用启动方法及电子设备
WO2019090702A1 (zh) 一种终端的安全保护方法及装置
WO2020025005A1 (zh) 移动终端和私密系统的进入的方法、装置
WO2019095449A1 (zh) 一种防止个人信息泄露的方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19784388

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19784388

Country of ref document: EP

Kind code of ref document: A1