WO2020156313A1 - 操作的执行方法、装置、终端及存储介质 - Google Patents

操作的执行方法、装置、终端及存储介质 Download PDF

Info

Publication number
WO2020156313A1
WO2020156313A1 PCT/CN2020/073157 CN2020073157W WO2020156313A1 WO 2020156313 A1 WO2020156313 A1 WO 2020156313A1 CN 2020073157 W CN2020073157 W CN 2020073157W WO 2020156313 A1 WO2020156313 A1 WO 2020156313A1
Authority
WO
WIPO (PCT)
Prior art keywords
control
target control
fingerprint
fingerprint information
preset
Prior art date
Application number
PCT/CN2020/073157
Other languages
English (en)
French (fr)
Inventor
王翛
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2020156313A1 publication Critical patent/WO2020156313A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Definitions

  • the embodiments of the present application relate to an operation execution method, device, terminal, and storage medium.
  • the mobile terminal can protect the startup of a specified application through fingerprint recognition technology. For example, when the mobile terminal recognizes an instruction for starting a designated application, the mobile terminal will display a dialog box on the screen, requesting the user to press a finger in the designated fingerprint recognition area of the mobile terminal. When the fingerprint obtained by the mobile terminal matches the preset fingerprint, the designated application is started.
  • the embodiments of the present application provide an operation execution method, device, terminal, and storage medium.
  • the technical solution is as follows:
  • an operation execution method includes:
  • Target control is a control used to perform sensitive operations in the application
  • an operation execution device in another aspect, and the device includes:
  • the control display module is used to display a target control in the user interface, where the target control is a control used to perform sensitive operations in an application;
  • An instruction receiving module configured to receive a trigger instruction acting on the target control, the trigger instruction being used to instruct the application program to execute a sensitive operation corresponding to the target control after being started;
  • a fingerprint collection module configured to collect fingerprint information in the area where the target control is located according to the trigger instruction
  • the operation execution module is configured to execute the sensitive operation when the fingerprint information matches a preset fingerprint template.
  • a terminal in another aspect, includes a processor and a memory, and at least one instruction is stored in the memory, and the instruction is loaded and executed by the processor to implement the operations provided in the implementation of this application. Implementation method.
  • a computer-readable storage medium is provided, and at least one instruction is stored in the storage medium, and the instruction is loaded and executed by a processor to implement the operation execution method provided in the implementation of this application.
  • Fig. 1 is a structural block diagram of a terminal provided by an exemplary embodiment of the present application.
  • Fig. 2 is a flowchart of an operation execution method provided by an exemplary embodiment of the present application
  • FIG. 3 is a schematic diagram of a fingerprint collection area provided based on the embodiment shown in FIG. 2;
  • FIG. 4 is a flowchart of an operation execution method provided by another exemplary embodiment of the present application.
  • FIG. 5 is a schematic diagram of a method for displaying target controls on a terminal based on FIG. 4;
  • FIG. 6 is a schematic diagram of another method for displaying target controls on a terminal based on FIG. 4;
  • FIG. 7 is a flowchart of another operation execution method provided by an embodiment of the present application.
  • Fig. 8 is a structural block diagram of a device for executing operations provided by an exemplary embodiment of the present application.
  • User interface refers to the interface that displays information to the user through a graphical interface in the terminal.
  • the user interface is the interface displayed after the application is started. That is, in this case, the user interface is an interface in the application.
  • the target control is displayed in the user interface in the application.
  • the user interface is the main interface (or desktop) provided by the operating system of the terminal.
  • the target control is displayed in the main interface provided by the operating system.
  • the target control can be displayed side by side with the startup icons of other applications.
  • the startup icon of application A, the startup icon of application B, and the startup icon of target control C1 are displayed side by side in the main interface of the mobile terminal.
  • Target control It is a control used to perform sensitive operations in an application.
  • the application can display the target control in the user interface when it is displayed on its own user interface, such as the delete control of the SMS application, the picture editing control and delete control of the photo album application, or the personal Information display control and modification control.
  • the operation execution method shown in the embodiment of the present application may be applied to a terminal, which has a display screen and has a function of executing operations.
  • the terminal may include at least one of a mobile phone, a tablet computer, a laptop computer, a smart watch, a digital camera, an MP4 player terminal, an MP5 player terminal, a learning machine, a dot reading machine, an electronic paper book, and an electronic dictionary.
  • FIG. 1 is a structural block diagram of a terminal provided in an exemplary embodiment of the present application.
  • the terminal includes a processor 120, a memory 140, a fingerprint sensor 160, and a touch screen 180.
  • the memory 140 stores at least one instruction, and the instruction is loaded and executed by the processor 120 to implement the Apply for the execution method of the operation described in each method embodiment.
  • the terminal 100 is an electronic device with a fingerprint recognition function in any area on the screen.
  • the terminal 100 displays the target control in the user interface
  • the trigger instruction is used to instruct the application to execute the sensitive operation corresponding to the target control after startup; the terminal 100 collects the target according to the trigger instruction
  • the processor 120 may include one or more processing cores.
  • the processor 120 uses various interfaces and lines to connect various parts of the entire terminal 100, and executes the terminal by running or executing instructions, programs, code sets, or instruction sets stored in the memory 140, and calling data stored in the memory 140. 100 various functions and processing data.
  • the processor 120 may adopt at least one of digital signal processing (Digital Signal Processing, DSP), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), and Programmable Logic Array (Programmable Logic Array, PLA).
  • DSP Digital Signal Processing
  • FPGA Field-Programmable Gate Array
  • PLA Programmable Logic Array
  • the processor 120 may integrate one or a combination of a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), and a modem.
  • CPU Central Processing Unit
  • GPU Graphics Processing Unit
  • modem modem
  • the CPU mainly processes the operating system, user interface, and application programs; the GPU is used to render and draw the content that the display needs to display; the modem is used to process wireless communication. It can be understood that the above-mentioned modem may not be integrated into the processor 120, but may be implemented by a chip alone.
  • the memory 140 may include random access memory (RAM) or read-only memory (Read-Only Memory).
  • the memory 140 includes a non-transitory computer-readable storage medium.
  • the memory 140 may be used to store instructions, programs, codes, code sets or instruction sets.
  • the memory 140 may include a program storage area and a data storage area, where the program storage area may store instructions for implementing the operating system and instructions for at least one function (such as touch function, sound playback function, image playback function, etc.), Instructions used to implement the following various method embodiments, etc.; the storage data area can store the data involved in the following various method embodiments, etc.
  • the fingerprint sensor 160 may be an optical fingerprint sensor or an acoustic fingerprint sensor.
  • the fingerprint sensor 160 When the fingerprint sensor 160 is an optical fingerprint sensor, the fingerprint sensor 160 collects an image of the fingerprint through a camera unit arranged under the touch screen 180, and matches the fingerprint information of the collected fingerprint image with the preset fingerprint information. When the fingerprint information is matched successfully When, the terminal will confirm the fingerprint verification.
  • the fingerprint sensor 160 When the fingerprint sensor 160 is a sound wave fingerprint sensor, the fingerprint sensor 160 transmits sound waves to an object above the touch screen 180.
  • the sound wave can be ultrasound.
  • an ultrasonic wave encounters a finger located above the touch screen 180, an ultrasonic echo containing the fingerprint information of the finger will be generated.
  • the fingerprint sensor 160 will receive the ultrasonic echo and identify the fingerprint information therein, and the fingerprint information in the echo will be combined with the pre- Set the fingerprint information to be matched.
  • the terminal When the fingerprint information is matched successfully, the terminal will confirm that the fingerprint verification is passed.
  • the target control in this application can be located in any area of the touch screen 180. Therefore, if the fingerprint sensor 160 in the terminal is an optical fingerprint sensor, the camera unit in the optical fingerprint sensor needs to be deployed in the area where the target control is displayed. In the same way, if the fingerprint sensor 160 in the terminal is a sonic fingerprint sensor, the sonic fingerprint sensor needs to be able to identify any fingerprint information on the area displayed by the target control.
  • the touch screen 180 is located in the front panel of the terminal, and the fingerprint sensor 160 is disposed under the touch screen 180, that is, the fingerprint sensor 160 is disposed in a cavity enclosed by the touch screen 180 and the terminal housing.
  • the touch screen 180 has a function of receiving touch signals.
  • FIG. 2 is a flowchart of an operation execution method provided by an exemplary embodiment of the present application.
  • the execution method of this operation can be applied to the terminal shown in FIG. 1 above.
  • the execution method of the operation includes:
  • Step 210 Display a target control in the user interface, where the target control is a control used to perform sensitive operations in the application.
  • the terminal may be a mobile terminal such as a mobile phone.
  • terminals can use technologies such as under-screen fingerprints to avoid additional fingerprint sensors in the housing through the digging area.
  • the terminal may display the target control in the user interface of the application program, or may provide the main interface to display the target control in the main interface provided by the operating system.
  • the target control is a control used to perform sensitive operations in the application.
  • the target control may be at least one of a virtual button, a virtual slider, or a virtual check box.
  • the sensitive operation is used to indicate an operation involving sensitive information in the mobile terminal.
  • it involves viewing at least one of text message content, memo content, album content, personal data content, account content, shopping record content, travel record content, or accommodation record content.
  • it involves deleting at least one of text message content, friend relationship, target application, contact information, memo content, album content, personal data content, account content, shopping record content, travel record content, or accommodation record content.
  • it involves editing at least one of memo content, images in an album, personal data content, account content, shopping record content, travel record content, or accommodation record content.
  • Step 220 Receive a trigger instruction that acts on the target control, where the trigger instruction is used to instruct the application to execute a sensitive operation corresponding to the target control after it is started.
  • the terminal can receive a trigger instruction that acts on the target control. For example, a user clicks a target control in the user interface, and the touch screen is activated under the user's click operation to generate a trigger instruction.
  • the trigger instruction is used to instruct the application to execute a sensitive operation corresponding to the target control after startup.
  • the application when the application is running in the foreground, there is at least one process used to implement the function of the application. After the target control is triggered, it is used to instruct the application in the started state to perform sensitive operations corresponding to the target control.
  • the application needs to be started first, and the sensitive operation corresponding to the target control is executed.
  • the target control does not respond to the trigger instruction acting on the target control when the application is not started.
  • Step 230 According to the trigger instruction, collect fingerprint information in the area where the target control is located.
  • the terminal can collect fingerprint information in the area where the target control is located according to the trigger instruction.
  • FIG. 3 is a schematic diagram of a fingerprint collection area provided based on the embodiment shown in FIG. 2.
  • the user interface 310 is the user interface of the social application A
  • the target control 320 is an entry for viewing and editing the personal information of the social application A.
  • the terminal receives a trigger instruction that acts on the target control 320 (that is, the operation of clicking the target 320)
  • the terminal will collect fingerprint information in the area 330.
  • the area 330 is the area where the target control is located.
  • the area size of the area 330 can be freely arranged through design.
  • the size of the area 330 may be the projection area of the target control on the touch screen, the projection area is a closed area, and the terminal can collect fingerprint information in the projection area through a trigger instruction.
  • the target control is usually a rectangle, and the side length of the rectangle is constant.
  • the terminal can determine the area where the target control is located as an area with the same size as the target control.
  • Step 240 Perform a sensitive operation when the fingerprint information matches the preset fingerprint template.
  • the terminal after the terminal collects fingerprint information, it can match the fingerprint information with a preset fingerprint template. When the fingerprint information matches the preset fingerprint template, the terminal will execute the sensitive operation corresponding to the target control.
  • the fingerprint template may be a fingerprint template that the user pre-registered in the terminal.
  • the fingerprint information matches the preset fingerprint template it means that the fingerprint information collected by the terminal is the same as the fingerprint pre-registered on the terminal, and the user has the authority to perform sensitive operations. Therefore, in this scenario, the terminal performs sensitive operations.
  • the terminal when the fingerprint information collected by the terminal in the area 330 matches the preset fingerprint template, the terminal will display the account information setting interface 340 of the social application A.
  • the setting interface 340 information such as the account name, personalized signature, my favorites, my photo album, gender, and birth date are displayed.
  • the operation execution method provided in this embodiment displays a target control in the user interface.
  • the target control is a control used to perform sensitive operations in an application.
  • the terminal receives a trigger instruction that acts on the target control.
  • the instruction is used to instruct the application to perform the sensitive operation corresponding to the target control after startup, and collect the fingerprint information of the target control in the area according to the trigger instruction.
  • the fingerprint information matches the preset fingerprint template, perform the sensitive operation corresponding to the target control , So that the terminal can complete the protection of user privacy without the user feeling, and the effect of ensuring the safety of sensitive operations.
  • the displaying the target control in the user interface includes:
  • the target control is displayed in the user interface.
  • the editable object is a picture
  • the target control is at least one of a delete control, a modification control, and a copy control.
  • the editable object is a text file
  • the target control is at least one of a text copy control, a text addition control, and a text deletion control.
  • the method further includes:
  • the control matching the control identifier in the whitelist is determined as the target control.
  • the performing the sensitive operation when the fingerprint information matches a preset fingerprint template includes:
  • the sensitive operation is performed.
  • the performing the sensitive operation when the fingerprint information matches a preset fingerprint template includes:
  • the trigger instruction instruct the microphone to collect the voice to be measured
  • the sensitive operation corresponding to the target control is executed.
  • the collecting fingerprint information in the area where the target control is located according to the trigger instruction includes:
  • the target control When the target control is displayed in the user interface of the application program, acquiring a projection area of the target control on the touch screen, where the projection area is a closed area;
  • the fingerprint information in the projection area is collected.
  • the method further includes:
  • the abnormal access information includes the fingerprint information and the operating environment information of the application.
  • the operating environment information is used to indicate the hardware device and software information of the application;
  • the abnormal access information is displayed, and the second time is later than the first time.
  • the method further includes:
  • the abnormal access information further includes the target face, and the method further includes:
  • the terminal can also display an editable object. After the editable object is displayed, it is determined whether to display the target control according to the situation. Please refer to the following example.
  • FIG. 4 is a flowchart of an operation execution method provided by another exemplary embodiment of the present application.
  • the execution method of this operation can be applied to the terminal shown in FIG. 1 above.
  • the execution method of this operation includes:
  • step 411 the editable object is displayed in the user interface.
  • the terminal displays an editable object in the user interface of the application program. Or, the terminal displays editable objects in the main interface of the operating system.
  • the editable object is a picture, text, audio file, video file or other objects that can be edited.
  • the terminal can display the editable object in the user interface of the application program. It should be noted that displaying the editable object may not be a private operation.
  • Step 412 When receiving an editing instruction acting on the editable object, obtain fingerprint information in the area where the editable object is located.
  • the terminal when the terminal receives an editing instruction that acts on the editable object, it obtains the fingerprint information of the editable object and the area.
  • the area mapped by the editable object on the touch screen may be the area where the size of the editable object itself is located.
  • the area mapped by the editable object on the touch screen may be an area larger than the size of the editable object itself.
  • Step 413 When the fingerprint information matches the preset fingerprint template, display the target control in the user interface.
  • the terminal can display the target control on the user interface when the fingerprint information matches the preset fingerprint template.
  • the terminal can obtain the identifier of the control displayed in the user interface.
  • the terminal matches the acquired control identifier with the control identifier in the preset whitelist, and determines the control matching the control identifier in the whitelist as the target control.
  • the terminal determines the two identifiers as the target control.
  • the terminal can set the area where the target control is located as a monitoring area in advance, and obtain fingerprint information in the area, so that the fingerprint unlocking process has a faster speed and avoids the lag in actual operation.
  • Step 420 Receive a trigger instruction that acts on the target control, where the trigger instruction is used to instruct the application to execute a sensitive operation corresponding to the target control after being started.
  • step 420 is the same as the execution process of step 220, and will not be repeated here.
  • Step 430 according to the trigger instruction, collect fingerprint information in the area where the target control is located.
  • step 430 is the same as the execution process of step 230, and will not be repeated here.
  • Step 440 When the fingerprint information matches the preset fingerprint template, perform a sensitive operation.
  • step 440 is the same as the execution process of step 240, and will not be repeated here.
  • FIG. 5 is a schematic diagram of a method for displaying target controls on a terminal based on FIG. 4.
  • a picture 520 is displayed in the user interface 510, and the picture 520 is an editable object.
  • the terminal obtains the fingerprint information in the area 530 where the picture 520 is located.
  • the terminal will display the edit control 541 and the delete control 542 in the pop-up menu of the user interface, and display the mark control at the same time 543. Share control 544 and copy control 545.
  • the edit control 541 and the delete control 542 are target controls.
  • FIG. 6 is a schematic diagram of another method for displaying target controls on a terminal based on the embodiment shown in FIG. 4.
  • the terminal determines that the fingerprint information in the area 530 does not match the preset fingerprint template, the terminal only displays the mark control 543, the sharing control 544, and the copy control 545 in the pop-up menu of the user interface.
  • the target control will not be displayed, that is, it will not be displayed. Edit control 541 and delete control 542.
  • the terminal may also perform step (1) and step (2) to record information about abnormal use of the target control.
  • Steps (1) and (2) are introduced as follows:
  • Step (1) If the fingerprint information collected at the first moment does not match the preset fingerprint template, record abnormal access information, the abnormal access information including the fingerprint information and the running of the application Environment information, where the operating environment information is used to indicate the hardware device and software information of the application program.
  • the terminal can record abnormal access information.
  • the hardware device of the application refers to the identification of the terminal running the application, which can be IMEI (Chinese: International Mobile Equipment Identity, English: International Mobile Equipment Identity), MAC (Chinese: Media Access Control Address, English: Media Access Control Address) or other hardware device identification.
  • the software information can be the version number of the software, the name of the installation package, or the IP address used.
  • Step (2) If the fingerprint information collected at the second time matches the preset fingerprint template, display the abnormal access information, and the second time is later than the first time.
  • the terminal after the terminal records the above abnormal access information, it can display the abnormal access information when the fingerprint information collected next time matches the preset fingerprint template, so that the user can know the abnormal operation of the target control and improve the terminal Traceability to illegal operations.
  • the terminal in addition to recording the abnormal access information related to the illegal operation, can also display an error message when the fingerprint information does not match the preset fingerprint template.
  • the error message is used to indicate that the sensitive operation has failed.
  • the error message may be text information or picture information.
  • the content of the error message may be "the operation cannot be performed” or "the operation cannot be performed for unknown reasons”.
  • the abnormal access information can also include the target face, and the terminal can also obtain the target face through the front camera at the first moment, so that the abnormal access information can record the appearance of the illegal operator, which further improves This improves the terminal’s ability to trace illegal operations.
  • the editable object can be a picture
  • the target control can be at least one of a delete control, a modification control, and a copy control.
  • the terminal can display the picture first, and the user who is currently using the terminal long presses the picture.
  • the terminal can directly verify the current user's fingerprint through the off-screen fingerprint technology Whether the information matches the preset fingerprint template.
  • the terminal will display the target control, such as showing at least one of the delete control, modification control, and copy control.
  • the target controls related to sensitive operations are displayed, and the terminal's ability to protect user privacy is improved without adding steps.
  • the editable object is a text file
  • the target control is at least one of a text copy control, a text addition control, and a text deletion control.
  • the terminal can display the icon of an editable object in a window such as a resource manager.
  • the terminal will display the target control of at least one of the above-mentioned text copy control, text addition control and text deletion control in a pop-up window or a new form, without increasing the difficulty of verification , Improve the terminal's ability to provide security protection for text files.
  • the embodiment of the present application also provides an operation execution method, which can be combined with other security verification methods to protect the manner of executing sensitive operations. Please refer to the following embodiment.
  • FIG. 7 is a flowchart of another operation execution method provided by an embodiment of the present application.
  • the execution method of this operation can be applied to the terminal shown in FIG. 1 above.
  • the execution method of this operation includes:
  • Step 710 Display a target control in the user interface, where the target control is a control used to perform sensitive operations in the application.
  • step 710 is the same as the execution process of step 210, and will not be repeated here.
  • Step 720 Receive a trigger instruction that acts on the target control, where the trigger instruction is used to instruct the application to execute a sensitive operation corresponding to the target control after being started.
  • step 720 is the same as the execution process of step 220, and will not be repeated here.
  • Step 730 according to the trigger instruction, collect fingerprint information in the area where the target control is located.
  • step 730 is the same as the execution process of step 220, and will not be repeated here.
  • the terminal can choose to perform step 74a1, step 74a2, and step 74a3, or can choose step 74b1 and step 74b2, which is not limited in this embodiment.
  • Step 74a1 according to the trigger instruction, start the front camera.
  • the terminal can also start the front camera through a hardware drive or the like.
  • the terminal starts the front camera through an independent system service or a system process.
  • Step 74a2 Obtain the face to be tested through the front camera.
  • the terminal can automatically instruct the front camera to collect the current picture, and obtain the face to be tested from the current picture.
  • the terminal can recognize the face in the screen as the face to be tested.
  • Step 74a3 when the face to be tested matches the preset template face, and the fingerprint information matches the preset fingerprint template, perform a sensitive operation.
  • the terminal compares the face to be tested with a preset template face.
  • the face to be tested matches the preset face template
  • the fingerprint information matches the preset fingerprint template information
  • the terminal performs a sensitive operation.
  • the face to be tested is a face image with open eyes
  • the preset template face is also a face image with open eyes.
  • the terminal avoids the illegal execution of sensitive operations in the original user's unconscious state, and further improves the security of sensitive operations.
  • Step 74b1 instruct the microphone to collect the voice to be measured.
  • the terminal can instruct the microphone to collect the voice to be measured according to the trigger instruction.
  • the terminal After receiving the trigger instruction, the terminal starts to perform voice recognition on the sound collected by the microphone, and collects the voice within a preset time period as the voice to be measured.
  • Step 74b2 when the voiceprint feature of the voice to be tested matches the preset voiceprint template, and the fingerprint information matches the preset fingerprint template, perform a sensitive operation.
  • the terminal will extract the voiceprint feature of the voice to be tested, and match the voiceprint feature of the voice to be tested with a preset voiceprint template.
  • the terminal will perform a sensitive operation.
  • step 74a1, step 74a2, and step 74a3 constitute process one
  • step 74b1 and step 74b2 constitute process two.
  • Process one and process two can be used in combination, that is, the terminal matches the face to be tested with the preset template face, and the voiceprint feature of the voice to be tested matches the preset voiceprint template, and the fingerprint information is consistent with the preset template.
  • the sensitive operation corresponding to the target control is executed, which further improves the security of the sensitive operation.
  • this application can also perform security classification on the sensitive operations corresponding to the target control.
  • the sensitive operations corresponding to the target control can be divided into three levels: high, medium and low.
  • High-security sensitive operations require Combine the schemes of the above process one and process two to determine whether to perform sensitive operations.
  • Sensitive operations with a medium security level need to execute the above-mentioned process one or two schemes to determine whether to perform sensitive operations.
  • Sensitive operations with low security levels only need to determine whether the fingerprint information matches the preset fingerprint template to determine whether to perform sensitive operations.
  • the operation execution method provided in this embodiment can collect fingerprint information in the area where the target control is located when the target control used to perform sensitive operations in the application is triggered by an instruction, through the front camera or microphone Collect other biological information, and when the other biological information matches the biological information pre-stored in the terminal, and when the fingerprint information matches the fingerprint template pre-stored in the terminal, the sensitive operation corresponding to the target control is executed. Since the terminal is verifying fingerprint information, and at the same time verifying other input biological information that requires the user's active cooperation, the security of performing sensitive operations is improved.
  • FIG. 8 shows a structural block diagram of an operation executing apparatus provided by an exemplary embodiment of the present application.
  • the means for executing this operation can be implemented as all or part of the terminal through software, hardware or a combination of the two.
  • the device includes:
  • the control display module 810 is configured to display a target control in the user interface, where the target control is a control used to perform sensitive operations in an application program.
  • the instruction receiving module 820 is configured to receive a trigger instruction acting on the target control, and the trigger instruction is used to instruct the application program to execute a sensitive operation corresponding to the target control after being started.
  • the fingerprint collection module 830 is configured to collect fingerprint information in the area where the target control is located according to the trigger instruction.
  • the operation execution module 840 is configured to execute the sensitive operation when the fingerprint information matches a preset fingerprint template.
  • control display module 810 is configured to display an editable object in the user interface; when an edit instruction acting on the editable object is received, obtain the editable object Fingerprint information in the area where the object is located; when the fingerprint information matches a preset fingerprint template, the target control is displayed in the user interface.
  • the editable object is a picture
  • the target control is at least one of a delete control, a modification control, and a copy control.
  • the editable object is a text file
  • the target control is at least one of a text copy control, a text addition control, and a text deletion control.
  • the device further includes an execution module configured to obtain the identifier of the control displayed in the user interface; and compare the identifier of the control with a preset whitelist The control ID of the control is matched; the control matching the control ID in the whitelist is determined as the target control.
  • the operation execution module 840 is configured to activate the front camera according to the trigger instruction; obtain the face to be tested through the front camera; when the face to be tested is compared with the preset When the set template matches the face, and the fingerprint information matches the preset fingerprint template, the sensitive operation is performed.
  • the operation execution module 840 is configured to instruct the microphone to collect the voice to be tested according to the trigger instruction; when the voiceprint feature of the voice to be tested matches a preset voiceprint template And when the fingerprint information matches the preset fingerprint template, the sensitive operation corresponding to the target control is executed.
  • the fingerprint collection module 830 is configured to obtain the projection area of the target control on the touch screen when the target control is displayed in the user interface of the application, and the projection The area is a closed area; according to the trigger instruction, the fingerprint information in the projection area is collected.
  • the device further includes an abnormality recording module and an abnormality display module, and the abnormality recording module is configured to: if the fingerprint information collected at the first moment is different from the preset fingerprint template If it matches, record abnormal access information.
  • the abnormal access information includes the fingerprint information and the operating environment information of the application program.
  • the operating environment information is used to indicate the hardware device and software information of the application program;
  • the display module is configured to display the abnormal access information if the fingerprint information collected at the second time matches the preset fingerprint template, and the second time is later than the first time.
  • the device further includes an error reporting module, configured to display error reporting information when the fingerprint information does not match the preset fingerprint template, and the error reporting information is used to indicate the sensitive Operation execution failed.
  • the abnormal access information involved in the device further includes a target face
  • the device further includes a face recording module, which is configured to acquire all the information through the front camera at the first moment. Describe the target face.
  • the embodiments of the present application also provide a computer-readable medium that stores at least one instruction, and the at least one instruction is loaded and executed by the processor to implement the operations described in each of the above embodiments. method.
  • the program can be stored in a computer-readable storage medium.
  • the storage medium mentioned can be a read-only memory, a magnetic disk or an optical disk, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本申请实施例公开了一种操作的执行方法、装置、终端及存储介质,属于计算机技术领域,通过在用户界面内显示目标控件,目标控件是应用程序中用于执行敏感操作的控件,终端接收作用于目标控件的触发指令,该触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作,并根据触发指令采集目标控件在区域内的指纹信息,当指纹信息与预设的指纹模版匹配时,执行目标控件对应的敏感操作,使得终端能够在用户无感的情况下完成保护用户隐私,保障敏感操作安全的效果。

Description

操作的执行方法、装置、终端及存储介质
本申请要求于2019年1月31日提交的申请号为201910100761.7、发明名称为“操作的执行方法、装置、终端及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请实施例涉及一种操作的执行方法、装置、终端及存储介质。
背景技术
随着指纹识别技术的发展,当前指纹识别技术已能够广泛应用在具备触摸屏的移动终端中。
相关技术中,移动终端能够通过指纹识别技术来保护指定应用的启动。例如,当移动终端识别到用于启动指定应用的指令时,移动终端将在屏幕中显示对话框,请求用户在移动终端中的指定指纹识别区域中按压手指。在移动终端获取到的指纹与预设的指纹匹配时,启动指定应用。
发明内容
本申请实施例提供了一种操作的执行方法、装置、终端及存储介质。所述技术方案如下:
一方面,提供了一种操作的执行方法,所述方法包括:
在用户界面内显示目标控件,所述目标控件是应用程序中用于执行敏感操作的控件;
接收作用于所述目标控件的触发指令,所述触发指令用于指示所述应用程序在启动后执行所述目标控件对应的敏感操作;
根据所述触发指令,采集所述目标控件所在区域内的指纹信息;
当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
另一方面,提供了一种操作的执行装置,所述装置包括:
控件显示模块,用于在用户界面内显示目标控件,所述目标控件是应用程序中用于执行敏感操作的控件;
指令接收模块,用于接收作用于所述目标控件的触发指令,所述触发指令用于指示所述应用程序在启动后执行所述目标控件对应的敏感操作;
指纹采集模块,用于根据所述触发指令,采集所述目标控件所在区域内的指纹信息;
操作执行模块,用于当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
另一方面,提供了一种终端,所述终端包括处理器和存储器,所述存储器中存储有至少一条指令,所述指令由所述处理器加载并执行以实现如本申请实施提供的操作的执行方法。
另一方面,提供了一种计算机可读存储介质,所述存储介质中存储有至少一条指令,所述指令由处理器加载并执行以实现如本申请实施提供的操作的执行方法。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请一个示例性实施例提供的终端的结构框图;
图2是本申请一个示例性实施例提供的操作的执行方法的流程图;
图3是基于图2所示实施例提供的一种指纹采集区域的示意图;
图4是本申请另一个示例性实施例提供的操作的执行方法流程图;
图5是基于图4提供的一种终端展示目标控件的方法的示意图;
图6是基于图4提供的另一种终端展示目标控件的方法的示意图;
图7是本申请实施例提供的另一种操作的执行方法的流程图;
图8是本申请一个示例性实施例提供的操作的执行装置的结构框图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。
下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同 或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本申请相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本申请的一些方面相一致的装置和方法的例子。
在本申请的描述中,需要理解的是,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性。在本申请的描述中,需要说明的是,除非另有明确的规定和限定,术语“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。此外,在本申请的描述中,除非另有说明,“多个”是指两个或两个以上。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三种情况。字符“/”一般表示前后关联对象是一种“或”的关系。
为了本申请实施例所示方案易于理解,下面对本申请实施例中出现的若干名词进行介绍。
用户界面:指在终端中显示通过图形界面向用户显示信息的界面。
在一种可能的实现方式中,用户界面是应用程序启动后展示的界面。即在此情况下,用户界面是应用程序中的一个界面。目标控件在应用程序中的用户界面中显示。
在另一种可能的实现方式中,用户界面是终端的操作系统所提供的主界面(或称桌面)。在此情况下,目标控件在操作系统所提供的主界面中显示。例如,目标控件可以与其它应用程序的启动图标并列显示。如在移动终端的主界面中,应用程序A的启动图标、应用程序B的启动图标和目标控件C1的启动图标并列显示在移动终端的主界面中。
目标控件:是应用程序中用于执行敏感操作的控件。
在一种可能的方式中,应用程序可以在自身的用户界面展示时,在用户界面中显示该目标控件,例如短信应用程序的删除控件,相册应用程序的图片编辑控件和删除控件,或者,个人信息的显示控件和修改控件。
示例性地,本申请实施例所示的操作的执行方法,可以应用在终端中,该终端具备显示屏且具备操作的执行的功能。终端可以包括手机、平板电脑、膝 上型电脑、智能手表、数码相机、MP4播放终端、MP5播放终端、学习机、点读机、电纸书和电子词典的至少一种中。
请参考图1,其是本申请一个示例性实施例提供的终端的结构框图。如图1所示,该终端包括处理器120、存储器140、指纹传感器160和触摸屏180,所述存储器140中存储有至少一条指令,所述指令由所述处理器120加载并执行以实现如本申请各个方法实施例所述的操作的执行方法。
在本申请中,终端100是具备在屏幕中的任意区域中进行指纹识别功能的电子设备。当终端100在用户界面内显示目标控件时,终端100接收作用于目标控件的触发指令,该触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作;终端100根据触发指令,采集目标控件所在区域内的指纹信息,当指纹信息与预设的指纹模版相匹配时,执行敏感操作。
处理器120可以包括一个或者多个处理核心。处理器120利用各种接口和线路连接整个终端100内的各个部分,通过运行或执行存储在存储器140内的指令、程序、代码集或指令集,以及调用存储在存储器140内的数据,执行终端100的各种功能和处理数据。可选的,处理器120可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器120可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示屏所需要显示的内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器120中,单独通过一块芯片进行实现。
存储器140可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory)。可选的,该存储器140包括非瞬时性计算机可读介质(non-transitory computer-readable storage medium)。存储器140可用于存储指令、程序、代码、代码集或指令集。存储器140可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现下述各个方法实施例的指令等;存储数据区可存储下面各个方法实施例中涉及 到的数据等。
指纹传感器160可以是光学指纹传感器,也可以是声波指纹传感器。
当指纹传感器160是光学指纹传感器时,指纹传感器160通过设置于触摸屏180下方的摄像单元采集指纹的图像,将采集到的指纹图像的指纹信息和预设的指纹信息进行匹配,当指纹信息匹配成功时,终端将确认通过指纹验证。
当指纹传感器160是声波指纹传感器时,指纹传感器160对触摸屏180上方的物体发送声波。在一种可能的方式中,该声波可以是超声波。当超声波遇到位于触摸屏180上方的手指时,会产生包含手指的指纹信息的超声波回波,指纹传感器160将接收该超声波回波并识别其中的指纹信息,将该回波中的指纹信息和预设的指纹信息进行匹配,当指纹信息匹配成功时,终端将确认通过指纹验证。
需要说明的是,由于本申请中的目标控件可以位于触摸屏180中的任意一个区域。因此,若终端中的指纹传感器160是光学指纹传感器,则该光学指纹传感器中的摄像单元需要在目标控件显示的区域均有部署。同理,若终端中的指纹传感器160是声波指纹传感器,则声波指纹传感器需要能够识别目标控件显示的区域上的任意的指纹信息。
触摸屏180位于终端的正面板中,指纹传感器160设置在触摸屏180的下方,即指纹传感器160设置在触摸屏180与终端壳体围成的腔体中。触摸屏180具备接收触控信号的功能。
请参考图2,其是本申请一个示例性实施例提供的操作的执行方法的流程图。该操作的执行方法可以应用在上述图1所示的终端中。在图2中,操作的执行方法包括:
步骤210,在用户界面内显示目标控件,目标控件是应用程序中用于执行敏感操作的控件。
在本申请实施例中,终端可以是例如手机等移动终端。随着指纹识别技术的进步,终端能够采用诸如屏下指纹的技术,避免手机在壳体中额外通过挖孔区域设置指纹传感器。
在本申请实施例中,终端既可以在应用程序中的用户界面中显示目标控件,也可以在操作系统所提供的主界面中提供主界面中显示目标控件。其中,该目标控件是应用程序中用于执行敏感操作的控件。在一种可能实现的方式中,目 标控件可以是虚拟按钮、虚拟滑条或虚拟复选框中的至少一种。
可选地,敏感操作用于指示涉及移动终端中的敏感信息的操作。
例如,涉及查看短信内容、备忘录内容、相册内容、个人资料内容、账号内容、购物记录内容、行程记录内容或住宿记录内容中至少一种。
再例如,涉及删除短信内容、好友关系、目标应用程序、联系人信息、备忘录内容、相册内容、个人资料内容、账号内容、购物记录内容、行程记录内容或住宿记录内容中至少一种。
再例如,涉及编辑备忘录内容、相册中的图像、个人资料内容、账号内容、购物记录内容、行程记录内容或住宿记录内容中至少一种。
步骤220,接收作用于目标控件的触发指令,触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作。
在本申请实施例中,终端能够接收作用于目标控件的触发指令。例如,用户在用户界面中点击目标控件,触摸屏在用户的点击操作下被激发生成触发指令,该触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作。
在一种可能的实现方式中,应用程序在前台运行时,存在至少一个进程用来实现应用程序的功能。目标控件被触发后,用于指示启动状态下的应用程序执行目标控件对应的敏感操作。
可选地,若应用程序处于未启动的状态,则目标控件被触发后需要首先启动该应用程序,在执行目标控件对应的敏感操作。或者,在另一种可能的方式中,目标控件在应用程序未启动时,不响应作用于目标控件的触发指令。
步骤230,根据触发指令,采集目标控件所在区域内的指纹信息。
在本申请实施例中,终端能够根据触发指令,采集目标控件所在区域内的指纹信息。
请参见图3,其是基于图2所示实施例提供的一种指纹采集区域的示意图。在图3中,用户界面310是社交应用A的用户界面,目标控件320是社交应用A的个人资料的查看和编辑入口。当终端接收到作用于该目标控件320的触发指令(也即点击目标320的操作)时,终端将在区域330中采集指纹信息。需要说明的是,区域330是目标控件所在的区域。可选地,区域330的区域大小可以通过设计来自由安排。
在一种可能的方式中,区域330的大小可以是目标控件在触摸屏上的投影区域,该投影区域是封闭的区域,终端能够通过触发指令采集该投影区域内的 指纹信息。
需要说明的是,在终端的用户界面设计中,目标控件通常为矩形,该矩形的边长是常数。在此场景中,终端能够将目标控件所在的区域确定为和目标控件大小相同的区域。
步骤240,当指纹信息与预设的指纹模版匹配时,执行敏感操作。
在本申请实施例中,终端在采集到指纹信息后,能够将指纹信息与预设的指纹模版进行匹配。当指纹信息与预设的指纹模版匹配时,终端将执行目标控件对应的敏感操作。
在一种可能的方式中,指纹模版可以是用户预先录到终端中的指纹模版。当指纹信息与预设的指纹模版匹配时,说明终端采集到的指纹信息和预先录到终端的指纹相同,用户具备执行敏感操作的权限。因此,在此场景下,终端执行敏感操作。
基于图3所示的实施例,当终端在区域330中采集的指纹信息与预设的指纹模版匹配时,终端将展示社交应用程序A的账户信息设置界面340。在该设置界面340中,展示有账户的名称、个性签名、我的收藏、我的相册、性别和出生年月等信息。
综上所述,本实施例提供的操作的执行方法,通过在用户界面内显示目标控件,目标控件是应用程序中用于执行敏感操作的控件,终端接收作用于目标控件的触发指令,该触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作,并根据触发指令采集目标控件在区域内的指纹信息,当指纹信息与预设的指纹模版匹配时,执行目标控件对应的敏感操作,使得终端能够在用户无感的情况下完成保护用户隐私,保障敏感操作安全的效果。
可选地,所述在用户界面内显示目标控件,包括:
在所述用户界面中,显示可编辑对象;
当接收到作用于所述可编辑对象的编辑指令时,获取所述可编辑对象所在区域内的指纹信息;
当所述指纹信息与预设的指纹模版匹配时,在所述用户界面中显示所述目标控件。
可选地,所述可编辑对象是图片,所述目标控件是删除控件、修改控件和复制控件中至少一种。
可选地,所述可编辑对象是文本文件,所述目标控件是文本复制控件、文 本增添控件和文本删除控件中至少一种。
可选地,所述方法还包括:
获取在所述用户界面内显示的控件的标识;
将所述控件的标识,与预设的白名单中的控件标识进行匹配;
将与所述白名单中的控件标识匹配的控件确定为目标控件。
可选地,所述当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作,包括:
根据所述触发指令,启动前置摄像头;
通过所述前置摄像头获取待测人脸;
当所述待测人脸与预设的模版人脸匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
可选地,所述当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作,包括:
根据所述触发指令,指示麦克风采集待测语音;
当所述待测语音的声纹特征与预设的声纹模版相匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述目标控件对应的所述敏感操作。
可选地,所述根据所述触发指令,采集所述目标控件所在区域内的指纹信息,包括:
当所述目标控件显示在所述应用程序的用户界面中时,获取所述目标控件在触摸屏上的投影区域,所述投影区域是封闭的区域;
根据所述触发指令,采集所述投影区域内的所述指纹信息。
可选地,所述方法还包括:
若在第一时刻采集的所述指纹信息与所述预设的指纹模版不匹配,则记录异常访问信息,所述异常访问信息包括所述指纹信息和所述应用程序的运行环境信息,所述运行环境信息用于指示所述应用程序的硬件设备和软件信息;
若在第二时刻采集的指纹信息与所述预设的指纹模版匹配,则显示所述异常访问信息,所述第二时刻晚于所述第一时刻。
可选地,所述方法还包括:
当所述指纹信息与所述预设的指纹模版不匹配时,显示报错信息,所述报错信息用于指示所述敏感操作执行失败。
可选地,所述异常访问信息还包括目标人脸,所述方法还包括:
在所述第一时刻通过所述前置摄像头获取所述目标人脸。
上述所有可选技术方案,均可按照任意结合形成本申请的可选实施例,本申请实施例对此不再一一赘述。
基于上一个实施例所公开的方案,终端还能够显示可编辑对象,在可编辑对象展示后,根据情况决定是否展示目标控件。请参考如下实施例。
请参见图4,其是本申请另一个示例性实施例提供的操作的执行方法流程图。该操作的执行方法可以应用在上述图1所示的终端中。在图4中,该操作的执行方法包括:
步骤411,在用户界面中,显示可编辑对象。
在本申请实施例中,终端在应用程序的用户界面中,显示可编辑对象。或者,终端在操作系统中的主界面中,显示可编辑对象。
在一种可能的实现方式中,可编辑对象是图片、文本、音频文件、视频文件或者其它可被编辑的对象。
在本申请实施例中,终端能够在应用程序的用户界面中,显示该可编辑对象。需要说明的是,显示该可编辑对象可以不属于隐私的操作。
步骤412,当接收到作用于可编辑对象的编辑指令时,获取可编辑对象所在区域内的指纹信息。
在本申请实施例中,终端在接收到作用于可编辑对象的编辑指令时,获取可编辑对象和区域内的指纹信息。
在一种可能的实现方式中,可编辑对象在触摸屏中映射的区域可以是该可编辑对象自身的大小所在的区域。
在另一种可能的实现方式中,可编辑对象在触摸屏中映射的区域可以是大于该可编辑对象自身的大小所在的区域。
步骤413,当指纹信息与预设的指纹模版匹配时,在用户界面中显示目标控件。
在本申请实施例中,终端能够在指纹信息与预设的指纹模版匹配时,在用户界面中显示目标控件。
作为一种可能的实施方式,终端能够获取用户界面内显示的控件的标识。终端将获取到的控件的标识,与预设的白名单中的控件标识进行匹配,并将与白名单中的控件标识匹配的控件确定为目标控件。
例如,在指定的用户界面内存在七个控件,其中两个控件的标识与预设的名名单中的控件标识匹配,即终端将该两个标识确定为目标控件。在此基础上,终端可以预先将目标控件所在区域设置为监听区域,获取该区域中的指纹信息,以令指纹解锁进程有较快的速度,避免实际操作时的迟滞情况的出现。
步骤420,接收作用于目标控件的触发指令,触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作。
在本申请实施例中,步骤420的执行过程和步骤220的执行过程相同,此处不再赘述。
步骤430,根据触发指令,采集目标控件所在区域内的指纹信息。
在本申请实施例中,步骤430的执行过程和步骤230的执行过程相同,此处不再赘述。
步骤440,当指纹信息与预设的指纹模版匹配时,执行敏感操作。
在本申请实施例中,步骤440的执行过程和步骤240的执行过程相同,此处不再赘述。
请参考图5,其是基于图4提供的一种终端展示目标控件的方法的示意图。在图5中,用户界面510中显示有图片520,该图片520是可编辑对象。当该图片520被用户长按时,相当于接收到作用于该可编辑对象的编辑指令。此时,终端获取图片520所在区域530中的指纹信息,在该指纹信息与预设的指纹模版匹配时,终端将在用户界面的弹出菜单中显示编辑控件541和删除控件542,同时显示标记控件543、分享控件544和复制控件545。需要说明的是,编辑控件541和删除控件542是目标控件。
在另一种可能实现的方式中,请参考图6,其是基于图4所示实施例提供的另一种终端展示目标控件的方法的示意图。当终端确定区域530中的指纹信息与预设的指纹模版不匹配时,终端在用户界面的弹出菜单中仅显示标记控件543、分享控件544和复制控件545,不会显示目标控件,即不显示编辑控件541和删除控件542。
在另一种可能的方式中,终端还可以执行步骤(1)和步骤(2)来记录异常使用目标控件的信息。步骤(1)和步骤(2)介绍如下:
步骤(1),若在第一时刻采集的所述指纹信息与所述预设的指纹模版不匹配,则记录异常访问信息,所述异常访问信息包括所述指纹信息和所述应用程序的运行环境信息,所述运行环境信息用于指示所述应用程序的硬件设备和软 件信息。
示意性的,终端能够记录异常访问信息。其中,应用程序的硬件设备指运行该应用程序的终端的标识,可以是IMEI(中文:国际移动设备识别码,英文:International Mobile Equipment Identity)、MAC(中文:媒体存取控制位址,英文:Media Access Control Address)或者其它硬件设备标识。
软件信息可以是软件的版本号、安装包名或所使用的IP地址等。
步骤(2),若在第二时刻采集的指纹信息与所述预设的指纹模版匹配,则显示所述异常访问信息,所述第二时刻晚于所述第一时刻。
示意性的,终端在记录上述异常访问信息后,可以在下一次采集的指纹信息与预设的指纹模版匹配时,显示该异常访问信息,以便用户知晓目标控件曾出现过的异常操作,提高了终端对于非法操作的追溯能力。
在另一种可能的方式中,终端除了上述记录非法操作相关的异常访问信息,还能够在指纹信息与预设的指纹模版不匹配时,显示报错信息,该报错信息用于指示敏感操作执行失败。例如,报错信息可以是文字信息或图片信息。示意性的,报错信息的内容可以是“无法执行该操作”或“未知原因,无法执行该操作”。
在另一种可能的方式中,异常访问信息中还可以包括目标人脸,终端还能够在第一时刻通过前置摄像头获取目标人脸,使得异常访问信息能够记录非法操作者的相貌,进一步提高了终端对于非法操作的追溯能力。
综上所述,可编辑对象可以是图片,目标控件可以是删除控件、修改控件和复制控件中至少一种。在此场景中,终端可以先显示图片,在当前使用终端的用户长按图片,希望终端展示目标控件以便对图片进行编辑、删除或者复制时,终端能够通过屏下指纹技术直接验证当前用户的指纹信息是否与预设的指纹模版匹配,在当前用户的指纹信息与预设的指纹模版匹配时,终端将展示目标控件,例如展示删除控件、修改控件和复制控件中至少一种,实现了终端在验证用户身份后才展示有关敏感操作的目标控件,在不增加步骤的前提下,提高了终端保护用户隐私的能力。
可选地,可编辑对象是文本文件,目标控件是文本复制控件、文本增添控件和文本删除控件中至少一种。在此场景中,终端可以在资源管理器等窗体中显示可编辑对象的图标。当其中可编辑对象的图标被触发后,终端将在弹出窗口或者新窗体中显示上述文本复制控件、文本增添控件和文本删除控件中至少一种的目标控件,在不增加验证难度的条件下,提高了终端为文本文件提供安 全保护的能力。
基于上述实施例所示的方法,本申请实施例还提供一种操作的执行方法,能够结合其它安全验证方法对执行敏感操作的方式进行保护,请参考如下实施例。
请参考图7,其是本申请实施例提供的另一种操作的执行方法的流程图。该操作的执行方法可以应用在上述图1所示的终端中。在图7中,该操作的执行方法包括:
步骤710,在用户界面内显示目标控件,目标控件是应用程序中用于执行敏感操作的控件。
在本申请实施例中,步骤710的执行过程和步骤210的执行过程相同,此处不再赘述。
步骤720,接收作用于目标控件的触发指令,触发指令用于指示应用程序在启动后执行目标控件对应的敏感操作。
在本申请实施例中,步骤720的执行过程和步骤220的执行过程相同,此处不再赘述。
步骤730,根据触发指令,采集目标控件所在区域内的指纹信息。
在本申请实施例中,步骤730的执行过程和步骤220的执行过程相同,此处不再赘述。
在本申请实施例中,当终端完成步骤730后,终端既可以选择执行步骤74a1、步骤74a2和步骤74a3,也可以选择步骤74b1和步骤74b2,本实施例对此不做限定。
步骤74a1,根据触发指令,启动前置摄像头。
在本申请实施例中,终端还能够启动通过硬件驱动等方式启动前置摄像头。作为一种可能的实现方式,终端通过独立系统服务或者是系统进程启动前置摄像头。
步骤74a2,通过前置摄像头获取待测人脸。
在本申请实施例中,终端能够自动指示前置摄像头采集当前的画面,从当前的画面中获取待测人脸。可选地,终端能够将画面中的人脸识别为待测人脸。
步骤74a3,当待测人脸与预设的模版人脸匹配,且指纹信息与预设的指纹模版匹配时,执行敏感操作。
在本申请实施例中,终端将待测人脸与预设的模版人脸进行比较。当该待测人脸和预设的人脸模版匹配,且指纹信息与预设的指纹模版信息匹配时,终端执行敏感操作。可选地,待测人脸为眼睛睁开的人脸图像,预设的模版人脸也为眼睛睁开的人脸图像。
可见,终端通过结合人脸识别和指纹识别的技术,避免了敏感操作在原用户无意识的状态下被非法执行,进一步提高了敏感操作的安全性。
步骤74b1,根据触发指令,指示麦克风采集待测语音。
在本申请实施例中,终端能够根据触发指令,指示麦克风采集待测语音。在一种可能的方式中,终端在接收到触发指令后,开始对麦克风采集到的声音进行语音识别,将预设时间段内的语音采集为待测语音。
步骤74b2,当待测语音的声纹特征与预设的声纹模版相匹配,且指纹信息与预设的指纹模版匹配时,执行敏感操作。
在本申请实施例中,终端将提取待测语音的声纹特征,将待测语音的声纹特征与预设的声纹模版进行匹配。当待测语音的声纹特征与待测语音的声纹特征匹配,且指纹信息与预设的指纹模版匹配时,终端将执行敏感操作。
通常而言,若使用人员不存在主观使用意愿,则使用人员将不会通过语音进行验证。可见,本方案通过结合语音和指纹验证执行敏感操作的方法,能够保证用户确实主观希望执行敏感操作,进一步提高了终端执行敏感操作的安全性。
需要说明的是,步骤74a1、步骤74a2和步骤74a3组成流程一,步骤74b1和步骤74b2组成流程二。流程一和流程二能够结合使用,即终端在待测人脸与预设的模版人脸匹配,且待测语音的声纹特征与预设的声纹模版相匹配,且指纹信息与预设的指纹模版匹配时,执行目标控件对应的敏感操作,使得敏感操作的安全性进一步提高。
作为另一种可能的实现方式,本申请还能够对目标控件所对应的敏感操作进行安全分级,例如,将目标控件所对应的敏感操作分为高中低三个等级,高安全等级的敏感操作需要结合上述流程一和流程二的方案,来确定是否执行敏感操作。中安全等级的敏感操作需要执行上述流程一或流程二的方案,来确定是否执行敏感操作。低安全等级的敏感操作仅需要判断指纹信息与预设的指纹模版是否匹配即可确定是否执行敏感操作。
综上所述,本实施例提供的操作的执行方法,能够在应用程序中用于执行 敏感操作的目标控件被触发指令作用时,采集目标控件所在区域内的指纹信息,通过前置摄像头或者麦克风采集其它生物信息,在该其它生物信息和终端中预先保存的生物信息相匹配,并且,指纹信息与终端中预先存储的指纹模版匹配时,执行目标控件对应的敏感操作。由于终端处于对指纹信息进行验证,同时还验证其它需要用户主动配合的输入的生物信息,因此,提高了执行敏感操作的安全性。
下述为本申请装置实施例,可以用于执行本申请方法实施例。对于本申请装置实施例中未披露的细节,请参照本申请方法实施例。
请参考图8,其示出了本申请一个示例性实施例提供的操作的执行装置的结构框图。该操作的执行装置可以通过软件、硬件或者两者的结合实现成为终端的全部或一部分。该装置包括:
控件显示模块810,用于在用户界面内显示目标控件,所述目标控件是应用程序中用于执行敏感操作的控件。
指令接收模块820,用于接收作用于所述目标控件的触发指令,所述触发指令用于指示所述应用程序在启动后执行所述目标控件对应的敏感操作。
指纹采集模块830,用于根据所述触发指令,采集所述目标控件所在区域内的指纹信息。
操作执行模块840,用于当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
在一个可选的实施例中,所述控件显示模块810,用于在所述用户界面中,显示可编辑对象;当接收到作用于所述可编辑对象的编辑指令时,获取所述可编辑对象所在区域内的指纹信息;当所述指纹信息与预设的指纹模版匹配时,在所述用户界面中显示所述目标控件。
在一个可选的实施例中,所述可编辑对象是图片,所述目标控件是删除控件、修改控件和复制控件中至少一种。
在一个可选的实施例中,所述可编辑对象是文本文件,所述目标控件是文本复制控件、文本增添控件和文本删除控件中至少一种。
在一个可选的实施例中,所述装置还包括执行模块,所述执行模块用于获取在所述用户界面内显示的控件的标识;将所述控件的标识,与预设的白名单中的控件标识进行匹配;将与所述白名单中的控件标识匹配的控件确定为目标 控件。
在一个可选的实施例中,所述操作执行模块840,用于根据所述触发指令,启动前置摄像头;通过所述前置摄像头获取待测人脸;当所述待测人脸与预设的模版人脸匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
在一个可选的实施例中,所述操作执行模块840,用于根据所述触发指令,指示麦克风采集待测语音;当所述待测语音的声纹特征与预设的声纹模版相匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述目标控件对应的所述敏感操作。
在一个可选的实施例中,所述指纹采集模块830,用于当所述目标控件显示在所述应用程序的用户界面中时,获取所述目标控件在触摸屏上的投影区域,所述投影区域是封闭的区域;根据所述触发指令,采集所述投影区域内的所述指纹信息。
在一个可选的实施例中,所述装置还包括异常记录模块和异常显示模块,所述异常记录模块,用于若在第一时刻采集的所述指纹信息与所述预设的指纹模版不匹配,则记录异常访问信息,所述异常访问信息包括所述指纹信息和所述应用程序的运行环境信息,所述运行环境信息用于指示所述应用程序的硬件设备和软件信息;所述异常显示模块,用于若在第二时刻采集的指纹信息与所述预设的指纹模版匹配,则显示所述异常访问信息,所述第二时刻晚于所述第一时刻。
在一个可选的实施例中,所述装置还包括报错模块,用于当所述指纹信息与所述预设的指纹模版不匹配时,显示报错信息,所述报错信息用于指示所述敏感操作执行失败。
在一个可选的实施例中,所述装置中涉及的异常访问信息还包括目标人脸,所述装置还包括人脸记录模块,用于在所述第一时刻通过所述前置摄像头获取所述目标人脸。
本申请实施例还提供了一种计算机可读介质,该计算机可读介质存储有至少一条指令,所述至少一条指令由所述处理器加载并执行以实现如上各个实施例所述的操作的执行方法。
需要说明的是:上述实施例提供的操作的执行装置在执行操作的执行方法 时,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将设备的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。另外,上述实施例提供的操作的执行装置与操作的执行方法实施例属于同一构思,其具体实现过程详见方法实施例,这里不再赘述。
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。
本领域普通技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上所述仅为本申请的较佳实施例,并不用以限制本申请,凡在本申请的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本申请的保护范围之内。

Claims (20)

  1. 一种操作的执行方法,其中,所述方法包括:
    在用户界面内显示目标控件,所述目标控件是应用程序中用于执行敏感操作的控件;
    接收作用于所述目标控件的触发指令,所述触发指令用于指示所述应用程序在启动后执行所述目标控件对应的敏感操作;
    根据所述触发指令,采集所述目标控件所在区域内的指纹信息;
    当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
  2. 根据权利要求1所述的方法,所述在用户界面内显示目标控件,包括:
    在所述用户界面中,显示可编辑对象;
    当接收到作用于所述可编辑对象的编辑指令时,获取所述可编辑对象所在区域内的指纹信息;
    当所述指纹信息与预设的指纹模版匹配时,在所述用户界面中显示所述目标控件。
  3. 根据权利要求2所述的方法,所述可编辑对象是图片,所述目标控件是删除控件、修改控件和复制控件中至少一种。
  4. 根据权利要求2所述的方法,所述可编辑对象是文本文件,所述目标控件是文本复制控件、文本增添控件和文本删除控件中至少一种。
  5. 根据权利要求2所述的方法,所述方法还包括:
    获取在所述用户界面内显示的控件的标识;
    将所述控件的标识,与预设的白名单中的控件标识进行匹配;
    将与所述白名单中的控件标识匹配的控件确定为目标控件。
  6. 根据权利要求1所述的方法,所述当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作,包括:
    根据所述触发指令,启动前置摄像头;
    通过所述前置摄像头获取待测人脸;
    当所述待测人脸与预设的模版人脸匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
  7. 根据权利要求6所述的方法,所述当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作,包括:
    根据所述触发指令,指示麦克风采集待测语音;
    当所述待测语音的声纹特征与预设的声纹模版相匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述目标控件对应的所述敏感操作。
  8. 根据权利要求1至7任一所述的方法,所述根据所述触发指令,采集所述目标控件所在区域内的指纹信息,包括:
    当所述目标控件显示在所述应用程序的用户界面中时,获取所述目标控件在触摸屏上的投影区域,所述投影区域是封闭的区域;
    根据所述触发指令,采集所述投影区域内的所述指纹信息。
  9. 根据权利要求7所述的方法,所述方法还包括:
    若在第一时刻采集的所述指纹信息与所述预设的指纹模版不匹配,则记录异常访问信息,所述异常访问信息包括所述指纹信息和所述应用程序的运行环境信息,所述运行环境信息用于指示所述应用程序的硬件设备和软件信息;
    若在第二时刻采集的指纹信息与所述预设的指纹模版匹配,则显示所述异常访问信息,所述第二时刻晚于所述第一时刻。
  10. 根据权利要求9所述的方法,所述方法还包括:
    当所述指纹信息与所述预设的指纹模版不匹配时,显示报错信息,所述报错信息用于指示所述敏感操作执行失败。
  11. 根据权利要求9所述的方法,所述异常访问信息还包括目标人脸,所述方法还包括:
    在所述第一时刻通过所述前置摄像头获取所述目标人脸。
  12. 一种操作的执行装置,其中,所述装置包括:
    控件显示模块,用于在用户界面内显示目标控件,所述目标控件是应用程序中用于执行敏感操作的控件;
    指令接收模块,用于接收作用于所述目标控件的触发指令,所述触发指令用于指示所述应用程序在启动后执行所述目标控件对应的敏感操作;
    指纹采集模块,用于根据所述触发指令,采集所述目标控件所在区域内的指纹信息;
    操作执行模块,用于当所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
  13. 根据权利要求12所述的装置,所述操作执行模块,用于:
    所述用户界面中,显示可编辑对象;
    当接收到作用于所述可编辑对象的编辑指令时,获取所述可编辑对象所在区域内的指纹信息;
    当所述指纹信息与预设的指纹模版匹配时,在所述用户界面中显示所述目标控件。
  14. 根据权利要求13所述的装置,所述可编辑对象是图片,所述目标控件是删除控件、修改控件和复制控件中至少一种。
  15. 根据权利要求13所述的装置,所述可编辑对象是文本文件,所述目标控件是文本复制控件、文本增添控件和文本删除控件中至少一种。
  16. 根据权利要求13所述的装置,所述装置还包括执行模块,所述执行模块,用于:
    获取在所述用户界面内显示的控件的标识;
    将所述控件的标识,与预设的白名单中的控件标识进行匹配;
    将与所述白名单中的控件标识匹配的控件确定为目标控件。
  17. 根据权利要求12所述的装置,所述操作执行模块,用于:
    根据所述触发指令,启动前置摄像头;
    通过所述前置摄像头获取待测人脸;
    当所述待测人脸与预设的模版人脸匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述敏感操作。
  18. 根据权利要求17所述的装置,所述操作执行模块,用于:
    根据所述触发指令,指示麦克风采集待测语音;
    当所述待测语音的声纹特征与预设的声纹模版相匹配,且所述指纹信息与预设的指纹模版匹配时,执行所述目标控件对应的所述敏感操作。
  19. 一种终端,其特征在于,所述终端包括处理器和存储器,所述存储器中存储有至少一条指令,所述指令由所述处理器加载并执行以实现如权利要求1至11任一所述的操作的执行方法。
  20. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有至少一条指令,所述指令由处理器加载并执行以实现如权利要求1至11任一所述的操作的执行方法。
PCT/CN2020/073157 2019-01-31 2020-01-20 操作的执行方法、装置、终端及存储介质 WO2020156313A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910100761.7 2019-01-31
CN201910100761.7A CN109857505A (zh) 2019-01-31 2019-01-31 操作的执行方法、装置、终端及存储介质

Publications (1)

Publication Number Publication Date
WO2020156313A1 true WO2020156313A1 (zh) 2020-08-06

Family

ID=66897333

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073157 WO2020156313A1 (zh) 2019-01-31 2020-01-20 操作的执行方法、装置、终端及存储介质

Country Status (2)

Country Link
CN (1) CN109857505A (zh)
WO (1) WO2020156313A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112988586A (zh) * 2021-03-25 2021-06-18 腾讯科技(深圳)有限公司 一种控件测试方法、装置、电子设备及存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857505A (zh) * 2019-01-31 2019-06-07 Oppo广东移动通信有限公司 操作的执行方法、装置、终端及存储介质
CN113961110A (zh) * 2020-07-01 2022-01-21 腾讯科技(深圳)有限公司 用户操作响应方法、装置、计算机设备和存储介质
CN112099724A (zh) * 2020-09-23 2020-12-18 努比亚技术有限公司 防误触方法、移动终端及计算机可读存储介质
CN113689197A (zh) * 2021-08-31 2021-11-23 陕西万唯教育传媒有限公司 一种教师定位变更的方法、系统及计算机储存介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075526A1 (en) * 2012-09-07 2014-03-13 Lg Electronics Inc. Method for controlling content and digital device using the same
CN105447365A (zh) * 2015-11-04 2016-03-30 广东欧珀移动通信有限公司 一种基于控件的隐私保护方法及用户终端
CN105701383A (zh) * 2015-12-30 2016-06-22 魅族科技(中国)有限公司 一种功能触发方法、装置及终端
CN107644072A (zh) * 2017-09-18 2018-01-30 广东欧珀移动通信有限公司 数据删除方法及装置
CN109857505A (zh) * 2019-01-31 2019-06-07 Oppo广东移动通信有限公司 操作的执行方法、装置、终端及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105825106B (zh) * 2015-11-30 2018-10-23 南京步步高通信科技有限公司 拍照加密查看方法和移动终端
CN107317931A (zh) * 2017-06-28 2017-11-03 深圳市金立通信设备有限公司 一种信息处理方法、终端及计算机可读存储介质
CN109284060A (zh) * 2018-08-30 2019-01-29 Oppo(重庆)智能科技有限公司 显示控制方法及相关装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075526A1 (en) * 2012-09-07 2014-03-13 Lg Electronics Inc. Method for controlling content and digital device using the same
CN105447365A (zh) * 2015-11-04 2016-03-30 广东欧珀移动通信有限公司 一种基于控件的隐私保护方法及用户终端
CN105701383A (zh) * 2015-12-30 2016-06-22 魅族科技(中国)有限公司 一种功能触发方法、装置及终端
CN107644072A (zh) * 2017-09-18 2018-01-30 广东欧珀移动通信有限公司 数据删除方法及装置
CN109857505A (zh) * 2019-01-31 2019-06-07 Oppo广东移动通信有限公司 操作的执行方法、装置、终端及存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112988586A (zh) * 2021-03-25 2021-06-18 腾讯科技(深圳)有限公司 一种控件测试方法、装置、电子设备及存储介质
CN112988586B (zh) * 2021-03-25 2023-07-14 腾讯科技(深圳)有限公司 一种控件测试方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN109857505A (zh) 2019-06-07

Similar Documents

Publication Publication Date Title
WO2020156313A1 (zh) 操作的执行方法、装置、终端及存储介质
WO2020248955A1 (zh) 一种分享内容的方法和电子设备
CN106055996B (zh) 一种多媒体信息分享方法及移动终端
US10204618B2 (en) Terminal and method for voice control on terminal
US9900427B2 (en) Electronic device and method for displaying call information thereof
US11523087B2 (en) Methods and systems for utilizing multi-pane video communications in connection with notarizing digital documents
US11004163B2 (en) Terminal-implemented method, server-implemented method and terminal for acquiring certification document
CN105320897A (zh) 信息处理系统、信息处理装置以及信息处理方法
JP2023554519A (ja) 電子文書の編集方法と装置及びコンピュータ機器とプログラム
WO2020006669A1 (zh) 一种图标切换方法、显示gui的方法及电子设备
WO2023173686A1 (zh) 检测方法、装置、电子设备及存储介质
CN105550643A (zh) 医学术语识别方法及装置
WO2019052053A1 (zh) 白板信息读取方法、装置、可读存储介质和电子白板
CN108229171B (zh) 驱动程序处理方法、装置及存储介质
CN111656347B (zh) 一种项目的显示方法及终端
US20230386255A1 (en) Method and system for verifying image identification
CN104077210B (zh) 一种客户端崩溃的定位方法及系统
US11244679B2 (en) Electronic device, and message data output method of electronic device
WO2020020095A1 (zh) 编辑工具的配置方法和配置参数的生成方法
WO2021017277A1 (zh) 一种图片截取方法、装置及计算机存储介质
CN108347401B (zh) 一种登录信息处理的方法及装置
CN106778296B (zh) 一种访问对象的访问方法、装置及终端
JP2016051229A (ja) 情報処理装置、情報処理装置の制御方法、およびプログラム。
CN106161365B (zh) 一种数据处理方法、装置及终端
US20170228504A1 (en) Mobile device network traffic modification and user based restrictions on data access

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20749628

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20749628

Country of ref document: EP

Kind code of ref document: A1