CN107391990A - A kind of method, terminal and storage medium for identifying user - Google Patents

A kind of method, terminal and storage medium for identifying user Download PDF

Info

Publication number
CN107391990A
CN107391990A CN201710572701.6A CN201710572701A CN107391990A CN 107391990 A CN107391990 A CN 107391990A CN 201710572701 A CN201710572701 A CN 201710572701A CN 107391990 A CN107391990 A CN 107391990A
Authority
CN
China
Prior art keywords
user
terminal
rank
casual
presented
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710572701.6A
Other languages
Chinese (zh)
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710572701.6A priority Critical patent/CN107391990A/en
Publication of CN107391990A publication Critical patent/CN107391990A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application is related to field of terminal, discloses a kind of method, terminal and storage medium for identifying user.Methods described includes:When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;The rank of the user is determined according to the biological characteristic of acquisition;It is determined that target unlocking manner corresponding with the rank according to the user;Unlock interface corresponding with the target unlocking manner is presented;Receive the checking information that the user inputs in the unlock interface;When the checking information passes through checking, user interface corresponding with the rank of the user is presented;Wherein, the information presented in different user interfaces is different.Pass through above-mentioned technical proposal, when the authentication succeeds, user interface corresponding with the user class is presented eventually, wherein, the information presented in different user interfaces is different, so as to which the information according to the different presentations of user class is also different, and then lifts the security of end message.

Description

A kind of method, terminal and storage medium for identifying user
Technical field
The present invention relates to field of terminal, more particularly to a kind of method, terminal and storage medium for identifying user.
Background technology
With the development of science and technology and material life it is abundant, mobile terminal becomes more popular.
People such as can be handled official business, be done shopping, being entertained at the activity by mobile terminal, therefore be stored more above mobile terminal Carry out more important informations.
It is pointed out that user often have input password currently in order to ensure the safety of terminal to terminal.But can be with Understand, as long as the input password, it is possible to any operation is carried out to terminal, any information can be obtained, end now End is at breakneck state.
The content of the invention
, can be according to current operation the embodiment of the invention discloses a kind of method, terminal and storage medium for identifying user The biological characteristic of the user of terminal determines user class, and determines verification mode corresponding with the user class, when being proved to be successful When, user interface corresponding with the user class is presented eventually, wherein, the letter presented in different user interfaces Breath is different, so as to which the information according to the different presentations of user class is also different, and then lifts the security of end message.
First aspect of the embodiment of the present invention discloses a kind of method for identifying user, and methods described includes:
The method for identifying user, it is characterised in that methods described includes:
When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;
The biological characteristic of acquisition is matched to determine the rank of the user with the biological characteristic to prestore;
It is determined that target unlocking manner corresponding with the rank according to the user;
Corresponding with target unlocking manner unlock interface is presented with cause the user in the unlock interface it is defeated Enter checking information;
Receive the checking information that the user inputs in the unlock interface;
When the checking information passes through checking, user interface corresponding with the rank of the user is presented;Wherein, The information presented in different user interfaces is different.
Second aspect of the present invention discloses a kind of terminal, and the terminal includes:
Acquiring unit, for when the screen for detecting terminal is lit, obtaining the biology for the user for operating the terminal Feature;
Matching unit, for the biological characteristic of acquisition to be matched to determine the user's with the biological characteristic to prestore Rank;
Determining unit, for determining target unlocking manner corresponding with the rank according to the user;
Display unit, for corresponding with target unlocking manner unlock interface to be presented to cause the user described Validation information in unlock interface;
Receiving unit, the checking information inputted for receiving the user in the unlock interface;
The display unit, for when the checking information passes through checking, presenting corresponding with the rank of the user User interface;Wherein, the information presented in different user interfaces is different.
Third aspect present invention discloses a kind of terminal, and the terminal includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
And display;
The processor calls the executable program code stored in the memory, performs first aspect present invention Any one of method, wherein, in above method implementation procedure, the idsplay order of the display reception processing device is to hold Row display action.
Fourth aspect present invention discloses a kind of computer-readable recording medium, and it is stored based on electronic data interchange Calculation machine program, wherein, the computer program causes terminal to perform the method as described in any one of first aspect present invention.
Fifth aspect present invention discloses a kind of mobile terminal, including:The mobile terminal includes living things feature recognition group Part, screen and application processor;And be stored in the program code of the memory, when described program code is run, Above-mentioned all parts cooperation performs the method instruction as described in any one of first aspect.
Compared with prior art, the embodiment of the present invention has the advantages that:
In the embodiment of the present invention, when the screen for detecting terminal is lit, the life for the user for operating the terminal is obtained Thing feature;The biological characteristic of acquisition is matched to determine the rank of the user with the biological characteristic to prestore;It is determined that and root According to target unlocking manner corresponding to the rank of the user;Unlock interface corresponding with the target unlocking manner is presented to cause User validation information in the unlock interface;Receive the checking letter that the user inputs in the unlock interface Breath;When the checking information passes through checking, user interface corresponding with the rank of the user is presented;Wherein, not The information presented in same user interface is different.Pass through above-mentioned technical proposal, can be according to the user of current operation terminal Biological characteristic determine user class, and determine verification mode corresponding with the user class, when the authentication succeeds, present eventually and User interface corresponding to the user class, wherein, the information presented in different user interfaces is different, so as to It is also different according to the information of the different presentations of user class, and then lift the security of end message.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is a kind of schematic flow sheet for the method for identifying user disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for another identification user disclosed in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the method for another identification user disclosed in the embodiment of the present invention;
Fig. 4 is a kind of structural representation of user terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of another user terminal disclosed in the embodiment of the present invention;
Fig. 6 is the structural representation of another user terminal disclosed in the embodiment of the present invention;
Fig. 7 is a kind of physical arrangement schematic diagram of user terminal disclosed in the embodiment of the present invention;
Fig. 8 is the physical arrangement schematic diagram of another user terminal disclosed in the embodiment of the present invention.
Fig. 9 is the physical arrangement schematic diagram of another user terminal disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, belongs to the scope of protection of the invention.
, can be according to current operation the embodiment of the invention discloses a kind of method, terminal and storage medium for identifying user The biological characteristic of the user of terminal determines user class, and determines verification mode corresponding with the user class, when being proved to be successful When, user interface corresponding with the user class is presented eventually, wherein, the letter presented in different user interfaces Breath is different, so as to which the information according to the different presentations of user class is also different, and then lifts the security of end message.
It is described in detail individually below.
Referring to Fig. 1, Fig. 1 is a kind of schematic flow sheet for the method for identifying user disclosed in the embodiment of the present invention.The boundary The method of face push may comprise steps of.
S101, when the screen for detecting terminal is lit, obtain the biological characteristic for the user for operating the terminal;
It is pointed out that the executive agent of the present embodiment is terminal.
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Persona LDigita lAssistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
Wherein, optionally, when the screen for detecting terminal is lit, terminal can prompt user's selection into terminal Pattern.For example can be casual user's pattern or owner's pattern.It is pointed out that the verification mode of different mode Can be different.If user selection Dietary behavior for casual user's pattern, then carry out face recognition;If user selects During owner's pattern, then iris unblock is carried out.
It is understood that regardless of bio-identification, it is required for the biology for obtaining the user for operating the terminal special Sign.Common bio-identification mode includes iris recognition, fingerprint recognition, recognition of face, voice recognition, and hand vein recognition etc.. Wherein it is possible to understand, at least one mode therein can be selected to be identified.
For example prompting user is predeterminable area typing finger print information;For example prompting eyes of user is directed at camera so as to end Hold and the biological information of user is extracted;Biological information according to extracting further obtains biological characteristic.
Illustrated by fingerprint, two pieces of fingerprints often have identical general characteristic, but their minutia, impossible It is identical.Fingerprint lines is not continuous, smooth straight, but interruption, bifurcated or turnover often occurs.These are disconnected Point, bifurcation and turning point are known as " characteristic points ".Characteristic point provides the confirmation of fingerprint uniqueness, wherein most typical It is destination node and bifurcation, other also include ramification point, isolated point, circling point, short grain etc..It is appreciated that when, this feature point is just It is the biological characteristic of the user.
Illustrated by iris, the eye structure of people is made up of the part such as sclera, iris, pupil crystalline lens, retina.Iris is Annular formations between black pupil and white sclera, its include many interlaced spots, filament, it is coronal, The minutia of striped, crypts etc..The minutia is exactly the biological characteristic of the user.In addition, it is necessary to, it is noted that iris exists After prenatal development stage is formed, it will be to maintain in whole life course constant.These features determine iris feature only One property, while also determine the uniqueness of identification.Therefore, can know the iris feature of eyes as everyone identity Other object.
S102, the biological characteristic of acquisition matched to determine the rank of the user with the biological characteristic to prestore;
It may be noted that when, the rank of user can be divided into owner's rank and casual user's rank.Owner's rank can make With any resource in terminal.And casual user's rank can only be in using terminal part resource.For example, the use of owner's rank Resource can be marked for family.When the user of casual user's rank uses the terminal, terminal can be by labeled as important money Source is hidden.Optionally, terminal will can be encrypted labeled as important resource, then be hidden again.
It is appreciated that when, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal.When the biology to prestore When being characterized in the biological characteristic of the owner of the terminal, if the biological characteristic obtained and the biometric matches to prestore, illustrate Active user is host user.
Optionally, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal and the user for using this terminal Feature.
Optionally, the biological characteristic to prestore can be the feature for the user for using this terminal.
Wherein it is determined that the feature of user, it is possible to determine the identity of user.
S103, determine target unlocking manner corresponding with the rank according to the user;
For example the unlocking manner of host user is simpler than the unlocking manner of casual user.Such as the unblock of host user Mode is unlocked by fingerprint, and the unlocking manner unlocked by fingerprint of casual user adds iris to unlock.
S104, unlock interface corresponding with the target unlocking manner is presented to cause the user in the unlock interface Upper input validation;
S105, receive the checking information that the user inputs in the unlock interface;
S106, when the checking information passes through checking, corresponding with the rank of user user interface is presented; Wherein, the information presented in different user interfaces is different.
It is appreciated that when, the rank of host user is higher than the rank of casual user.Therefore casual user can only see Host user set without the resource hidden.The resources such as important photo, contact person's mode, account can be labeled, when interim When user logs in, these resources can be encrypted hide.
In addition, optional, it is described user interface corresponding with the rank of the user is presented after, methods described is also Including:When the rank of the user is casual user, user described in the terminal-pair is taken pictures includes the use to obtain The picture of family facial characteristics, and the picture is stored.
It is appreciated that when, after temporary user logon, terminal can record information and the casual user of the casual user All operations.For example the casual user is taken pictures, preserve the photo of the casual user.Wherein, being included in the photo should The head portrait of casual user.The operation of casual user includes having browsed those files, which webpage having been browsed, and which file is carried out Modification is deleted.
In addition, it is necessary to point out when, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;Operation life according to the destination object and to the destination object Stored into the Operation Log of casual user, and by the Operation Log of the casual user.
It is understood that the Operation Log of casual user can be deposited according to the mark and date of casual user Shelves.For example casual user is A, then establishes a file according to A mark, operation is established according to the operating time each A Document.
In addition, it is necessary to point out when, for the important operation of casual user, must be backed up, such as casual user Delete file, then this document can be deleted, but this document can be backed up and hidden by terminal.It is specifically, described Method also includes:When the rank of the user is casual user, the file that the user deletes is determined;By the text of the deletion Part is backed up and hidden.
In addition, it is optional, after host user logs in, all operations before casual user can be checked, specific institute Stating method also includes:When it is determined that the rank of the user is owner's rank, presents in preset time period and operated the terminal The picture of casual user and the Operation Log of the casual user check for active user.
From the above it can be seen that by implementing technical scheme provided in an embodiment of the present invention, when the screen for detecting terminal is lit When, acquisition operates the biological characteristic of the user of the terminal;The biological characteristic of acquisition is matched with the biological characteristic to prestore To determine the rank of the user;It is determined that target unlocking manner corresponding with the rank according to the user;Present and the mesh Unlock interface corresponding to unlocking manner is marked to cause user validation information in the unlock interface;Receive the use The checking information that family inputs in the unlock interface;When the checking information passes through checking, the level with the user is presented Not corresponding user interface;Wherein, the information presented in different user interfaces is different.Pass through above-mentioned technical side Case, user class can be determined according to the biological characteristic of the user of current operation terminal, and determined corresponding with the user class Verification mode, when the authentication succeeds, user interface corresponding with the user class is presented eventually, wherein, in different use The information presented in the operation interface of family is different, so as to which the information according to the different presentations of user class is also different, and then lifts terminal The security of information.
Referring to Fig. 2, Fig. 2 is a kind of schematic flow sheet for the method for identifying user disclosed in the embodiment of the present invention.Such as Fig. 2 Shown, the method for identification user may comprise steps of.
S201, when the screen for detecting terminal is lit, obtain the biological characteristic for the user for operating the terminal;
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Persona LDigita lAssistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
S202, the biological characteristic of acquisition matched to determine the rank of the user with the biological characteristic to prestore;
S203, determine target unlocking manner corresponding with the rank according to the user;
S204, unlock interface corresponding with the target unlocking manner is presented to cause the user in the unlock interface Upper validation information;
S205, receive the checking information that the user inputs in the unlock interface;
S206, when the checking information passes through checking, corresponding with the rank of user user interface is presented;
Wherein, the information presented in different user interfaces is different.
S207, when the rank of the user is casual user, user described in the terminal-pair taken pictures with obtain bag Picture containing the user's face feature, and the picture is stored;The destination object that the user chooses is determined, and The operation carried out to the destination object;Operation generation casual user according to the destination object and to the destination object Operation Log, and the Operation Log of the casual user is stored;And determine the file that the user deletes;Will The file of the deletion is backed up and hidden.
S208, when it is determined that the rank of the user is owner's rank, present preset time period in operated the terminal The picture of casual user and the Operation Log of the casual user check for active user.
In addition, when owner feels to have a suspect, photo can be further clicked on and see its operation made to terminal.
In the method described by Fig. 2, terminal can record to the operation after temporary user logon, facilitate owner to use Family can check the operation that casual user is carried out to terminal, so as to lift the security of terminal.
Referring to Fig. 3, Fig. 3 is a kind of schematic flow sheet for the method for identifying user disclosed in the embodiment of the present invention.Such as Fig. 3 Shown, the method for identification user may comprise steps of.
S301, terminal notifying user selection pattern into terminal above-mentioned when the screen for detecting terminal is lit;Need It is noted that the executive agent of the present embodiment is terminal.
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Persona LDigita lAssistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
S302, the target pattern for determining above-mentioned user's selection, and login interface corresponding with the target pattern is presented;Its In, it is different without validation difficulty corresponding to pattern;
S303, the biological characteristic for obtaining the user for operating the terminal;
S304, when the biological characteristic passes through checking, corresponding with pattern user interface is presented;Wherein, The information presented in user interface corresponding to different mode is different.
, wherein it is desired to point out when, when the screen for detecting terminal is lit, terminal can prompt user select enter The pattern of terminal.For example can be casual user's pattern or owner's pattern.It is pointed out that different mode is tested Card mode can be different.If user selection Dietary behavior for casual user's pattern, then carry out face recognition;If with When family selects owner's pattern, then iris unblock is carried out.
It is understood that regardless of bio-identification, it is required for the biology for obtaining the user for operating the terminal special Sign.Common bio-identification mode includes iris recognition, fingerprint recognition, recognition of face, voice recognition, and hand vein recognition etc.. Wherein it is possible to understand, at least one mode therein can be selected to be identified.
For example prompting user is predeterminable area typing finger print information;For example prompting eyes of user is directed at camera so as to end Hold and the biological information of user is extracted;Biological information according to extracting further obtains biological characteristic.Illustrated by fingerprint, Two pieces of fingerprints often have identical general characteristic, but their minutia, but can not possibly be identical.Fingerprint lines is simultaneously It is not continuous, smooth straight, but interruption, bifurcated or turnover often occurs.These breakpoints, bifurcation and turning point just claim For " characteristic points ".Characteristic point provides the confirmation of fingerprint uniqueness, wherein most typically destination node and bifurcation, other Also include ramification point, isolated point, circling point, short grain etc..It is appreciated that when, this feature point is exactly the biological characteristic of the user.Take Iris is illustrated, and the eye structure of people is made up of the part such as sclera, iris, pupil crystalline lens, retina.Iris is to be located at black pupil Annular formations between hole and white sclera, it includes many interlaced spots, filament, coronal, striped, crypts etc. Minutia.The minutia is exactly the biological characteristic of the user.In addition, it is necessary to, it is noted that iris is in development of fetus rank After section is formed, it will be to maintain in whole life course constant.These features determine the uniqueness of iris feature, while Determine the uniqueness of identification.Therefore, can be using the iris feature of eyes as everyone identification object.
It may be noted that when, pattern can be divided into owner's pattern and casual user's pattern.Owner's pattern can be with using terminal In any resource.And casual user's pattern can only be in using terminal part resource.For example, the user of owner's rank can be with Resource is marked.When the user of casual user's rank uses the terminal, terminal can be by labeled as important resource progress Hide.Optionally, terminal will can be encrypted labeled as important resource, then be hidden again.
It is appreciated that when, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal.When the biology to prestore When being characterized in the biological characteristic of the owner of the terminal, if the biological characteristic obtained and the biometric matches to prestore, illustrate Active user is host user.Optionally, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal and use The feature of the user of this terminal.Optionally, the biological characteristic to prestore can be the feature for the user for using this terminal.Wherein, The feature of user is determined, it is possible to determine the identity of user.For example the unlocking manner of host user is than the solution of casual user Lock mode is simple.For example the unlocking manner of host user is unlocked by fingerprint, the unlocking manner unlocked by fingerprint of casual user adds iris Unblock.
It is appreciated that when, the rank of host user is higher than the rank of casual user.Therefore casual user can only see Host user set without the resource hidden.The resources such as important photo, contact person's mode, account can be labeled, when interim When user logs in, these resources can be encrypted hide.
In addition, optional, it is described user interface corresponding with the rank of the user is presented after, methods described is also Including:When the rank of the user is casual user, user described in the terminal-pair is taken pictures includes the use to obtain The picture of family facial characteristics, and the picture is stored.
It is appreciated that when, after temporary user logon, terminal can record information and the casual user of the casual user All operations.For example the casual user is taken pictures, preserve the photo of the casual user.Wherein, being included in the photo should The head portrait of casual user.The operation of casual user includes having browsed those files, which webpage having been browsed, and which file is carried out Modification is deleted.
In addition, it is necessary to point out when, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;Operation life according to the destination object and to the destination object Stored into the Operation Log of casual user, and by the Operation Log of the casual user.
It is understood that the Operation Log of casual user can be deposited according to the mark and date of casual user Shelves.For example casual user is A, then establishes a file according to A mark, operation is established according to the operating time each A Document.
In addition, it is necessary to point out when, for the important operation of casual user, must be backed up, such as casual user Delete file, then this document can be deleted, but this document can be backed up and hidden by terminal.It is specifically, described Method also includes:When the rank of the user is casual user, the file that the user deletes is determined;By the text of the deletion Part is backed up and hidden.
In addition, it is optional, after host user logs in, all operations before casual user can be checked, specific institute Stating method also includes:When it is determined that the rank of the user is owner's rank, presents in preset time period and operated the terminal The picture of casual user and the Operation Log of the casual user check for active user.
In the method described by Fig. 3, the checking of different difficulty is carried out to user according to the Dietary behavior that user selects, from And improve the security of terminal.
Referring to Fig. 4, Fig. 4 is a kind of structural representation of terminal disclosed in the embodiment of the present invention.At the end described by Fig. 4 In end, it can include:
Acquiring unit 401, for when the screen for detecting terminal is lit, obtaining the life for the user for operating the terminal Thing feature;
Matching unit 402, for the biological characteristic of acquisition to be matched to determine the use with the biological characteristic to prestore The rank at family;
Determining unit 403, for determining target unlocking manner corresponding with the rank according to the user;
Display unit 404, for corresponding with target unlocking manner unlock interface to be presented to cause the user to exist Validation information in the unlock interface;
Receiving unit 405, the checking information inputted for receiving the user in the unlock interface;
Display unit 404, for use corresponding with the rank of the user when the checking information passes through checking, to be presented Family operation interface;Wherein, the information presented in different user interfaces is different.
It is pointed out that the structure shown in Fig. 4 can be used for performing the method described in S101-S106.
Please refer to fig. 5, Fig. 5 is the structural representation of another terminal disclosed in the embodiment of the present invention.Shown in Fig. 5 Terminal can also include:
Acquiring unit 501, for when the screen for detecting terminal is lit, obtaining the life for the user for operating the terminal Thing feature;
Matching unit 502, for the biological characteristic of acquisition to be matched to determine the use with the biological characteristic to prestore The rank at family;
Determining unit 503, for determining target unlocking manner corresponding with the rank according to the user;
Display unit 504, for corresponding with target unlocking manner unlock interface to be presented to cause the user to exist Validation information in the unlock interface;
Receiving unit 505, the checking information inputted for receiving the user in the unlock interface;
Display unit 504, for use corresponding with the rank of the user when the checking information passes through checking, to be presented Family operation interface;Wherein, the information presented in different user interfaces is different.
Photographing unit 506, for when the rank of the user is casual user, user described in the terminal-pair to be clapped According to the picture that the user's face feature is included with acquisition;
Memory cell 507, for the picture to be stored.
Determining unit 503, it is additionally operable to, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;
Generation unit 508, casual user is generated for the operation according to the destination object and to the destination object Operation Log;
Memory cell 507, it is additionally operable to be stored the Operation Log of the casual user.
Determining unit 503, it is additionally operable to when the rank of the user is casual user, determine the text that the user deletes Part;
Backup units 509, for being backed up and being hidden the file of the deletion.
Display unit 504, it is additionally operable to when it is determined that the rank of the user is owner's rank, presents in preset time period and grasp Made the picture of the casual user of the terminal and the Operation Log of the casual user so that active user checks.
It is understood that the terminal described in Fig. 5 can be used for performing the method shown in S201-S208.
Also referring to Fig. 6, Fig. 6 is the structural representation of another user terminal disclosed in the embodiment of the present invention.Fig. 6 institutes The terminal shown includes:
Tip element 601, for above-mentioned when the screen for detecting terminal is lit, prompting user's selection enters terminal Pattern;
It is pointed out that the executive agent of the present embodiment is terminal.
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Persona LDigita lAssistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
Determining unit 602, for determining the target pattern of above-mentioned user's selection;
Display unit 603, for login interface corresponding with the target pattern to be presented;Wherein, without corresponding to pattern Validation difficulty is different;
Acquiring unit 604, for obtaining the biological characteristic for the user for operating the terminal;
Display unit 603, it is additionally operable to when the biological characteristic passes through checking, user behaviour corresponding with the pattern is presented Make interface;Wherein, the information presented in user interface corresponding to different mode is different.
It is understood that the terminal described in Fig. 6 is able to carry out the method described in S301-S304.
Referring to Fig. 7, Fig. 7 is the structural representation of another terminal disclosed in the embodiment of the present invention, as shown in fig. 7, should Terminal can include:At least one processor 710, such as CPU, memory 720, at least one communication bus 730, input unit 740, display device 750.Wherein, communication bus 730 is used to realize the communication connection between these components.Memory 720 can be with It is high-speed RAM memory or non-labile memory (non-volatile memory), a for example, at least magnetic Disk storage.Memory 720 optionally can also be at least one storage device for being located remotely from aforementioned processor 710.Wherein, Processor 710 can store batch processing code, and processor 710 with reference to the terminal described by Fig. 4 to Fig. 6 in memory 720 The program code stored in memory 720 is called, for performing following operation:
When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;
The biological characteristic of acquisition is matched to determine the rank of the user with the biological characteristic to prestore;
It is determined that target unlocking manner corresponding with the rank according to the user;
Send and instruct to display device 750, to cause display device 750 that solution corresponding with the target unlocking manner is presented Interface is locked to cause user validation information in the unlock interface;
Receive the checking information that the user inputs in the unlock interface;
When the checking information passes through checking, send and instruct to display device 750, to cause display device 750 to present User interface corresponding with the rank of the user;Wherein, the information presented in different user interfaces is different.
Optionally, after presentation user interface corresponding with the rank of the user, the operation also includes:
When the rank of the user is casual user, the user is taken pictures and includes the user's face to obtain The picture of feature, and the picture is stored.
Optionally, the operation also includes:
When the rank of the user is casual user, the destination object that the user chooses is determined, and to the mesh Mark the operation that object is carried out;
The Operation Log of casual user is generated according to the destination object and the operation to the destination object, and by institute The Operation Log for stating casual user is stored.
Optionally, the operation also includes:
When the rank of the user is casual user, the file that the user deletes is determined;
The file of the deletion is backed up and hidden.
Can be target-seeking, the operation also includes:
When it is determined that the rank of the user is owner's rank, sends and instruct to display device 750, to cause display device Operated in 750 presentation preset time periods the picture of casual user and the Operation Log of the casual user of the terminal with Checked for active user.
When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;By acquisition Biological characteristic is matched with the biological characteristic to prestore to determine the rank of the user;It is determined that with the rank according to the user Corresponding target unlocking manner;Unlock interface corresponding with the target unlocking manner is presented to cause the user in the solution Lock validation information on interface;Receive the checking information that the user inputs in the unlock interface;When the checking letter When breath passes through checking, user interface corresponding with the rank of the user is presented;Wherein, in different user interfaces The information of middle presentation is different.Pass through above-mentioned technical proposal, it can determine to use according to the biological characteristic of the user of current operation terminal Family rank, and verification mode corresponding with the user class is determined, when the authentication succeeds, present eventually corresponding with the user class User interface, wherein, the information that is presented in different user interfaces is different, so as to different according to user class The information of presentation is also different, and then lifts the security of end message.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
RF circuits 810 can be used for the reception and transmission of information.Generally, RF circuits 810 include but is not limited to antenna, at least one Individual amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division it is more Location (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storage software program and module, and processor 880 is stored in memory 820 by operation Software program and module, so as to perform the various function application of mobile phone and data processing.Memory 820 can mainly include Storing program area and storage data field, wherein, storing program area can storage program area, the application journey needed at least one function Sequence (for example obtain the function of the biological characteristic of user, determine the function of user class, the function of unblock, function for taking pictures etc.) Deng;Storage data field can store that (for example the biological characteristic of user, prestore biological characteristic according to the created data that use of mobile phone Target unlocking manner etc. corresponding to the rank of corresponding user, user class) etc..In addition, memory 820 can include at a high speed with Machine accesses memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or its His volatile solid-state part.
Input block 830 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the key signals input that function control is relevant.Specifically, input block 830 may include fingerprint recognition module 831 and other are defeated Enter equipment 832.Fingerprint recognition module 831, user can be gathered in finger print data thereon.Optionally, fingerprint recognition module 831 can Including optical fingerprint module, capacitance type fingerprint module and RF-type fingerprint module.It is condenser type with fingerprint recognition module 831 Exemplified by fingerprint recognition module, specifically include induction electrode (n1 abnormal induction electrodes and n2 normal induction electrode) and with it is described The signal processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.) of induction electrode connection.Except referring to Line identifies module 831, and input block 830 can also include other input equipments 832.Specifically, other input equipments 832 can be with Including but not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. In one or more.
Display unit 840 can be used for display by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display screen 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 841.Although in fig. 8, fingerprint recognition module 831 and display screen 841 are the parts independent as two to realize mobile phone Input and input function, it is but in some embodiments it is possible to fingerprint recognition module 831 and display screen 841 is integrated and real The input of existing mobile phone and output function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display screen 841, proximity transducer can when mobile phone is moved in one's ear, close display screen 841 and/or Backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions the big of (generally three axles) acceleration It is small, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen switching, phase Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 860, loudspeaker 881, microphone 882 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 881, sound is converted to by loudspeaker 881 by road 860 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 882, is turned after being received by voicefrequency circuit 860 Voice data is changed to, then after voice data output processor 880 is handled, through RF circuits 810 to be sent to such as another mobile phone, Or voice data is exported to memory 820 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 870 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 8 is shown WiFi module 870, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 880 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module being stored in memory 820, and call and be stored in memory 820 Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 880 can wrap Include one or more processing units;Preferably, processor 880 can integrate application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone also includes the power supply 890 (such as battery) to all parts power supply, it is preferred that power supply can pass through power supply pipe Reason system and processor 880 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1, Fig. 2, Fig. 3, each step method flow can based on the mobile phone structure realize.
In embodiment shown in earlier figures 4, Fig. 5, Fig. 6, each unit function can based on the mobile phone structure realize.
Also referring to Fig. 9, Fig. 9 is the structural representation of another user terminal disclosed in the embodiment of the present invention.Fig. 9 institutes The terminal shown is mobile terminal, and the mobile terminal includes living things feature recognition component 910, screen 920 and application processor 930, it is to be appreciated that also including memory 940, Program code is stored in memory 940, when program code is run, Above-mentioned all parts perform following operate:
Living things feature recognition component 910, for when the screen for detecting terminal is lit, obtaining and operating the terminal The biological characteristic of user;
Application processor 930, for the biological characteristic of acquisition to be matched with described in determination with the biological characteristic to prestore The rank of user;It is additionally operable to determine target unlocking manner corresponding with the rank according to the user;
Screen 920, for corresponding with target unlocking manner unlock interface to be presented to cause the user described Validation information in unlock interface;
Application processor 930, it is additionally operable to receive the checking information that the user inputs in the unlock interface;
Screen 920, it is additionally operable to when the checking information passes through checking, user corresponding with the rank of the user is presented Operation interface;Wherein, the information presented in different user interfaces is different.
Optionally, the terminal also includes camera 950;
Camera 950, for when the rank of the user is casual user, user described in the terminal-pair to be taken pictures To obtain the picture for including the user's face feature;
Application processor 930, for the picture to be stored.
Optionally, application processor 930, it is additionally operable to, when the rank of the user is casual user, determine the user The destination object chosen, and the operation to destination object progress;According to the destination object and to the target pair The Operation Log of the operation generation casual user of elephant, and the Operation Log of the casual user is stored.
Optionally, application processor 930, it is additionally operable to, when the rank of the user is casual user, determine the user The file of deletion;The file of the deletion is backed up and hidden.
Optionally, application processor 930, it is additionally operable to when it is determined that the rank of the user is owner's rank, presents default The picture of the casual user of the terminal and the Operation Log of the casual user were operated in period for active user Check.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium include read-only storage (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), erasable programmable is read-only deposits Reservoir (Erasable Programmable Read Only Memory, EPROM), disposable programmable read-only storage (One- Time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only storage (Electrically-Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-Only Memory, CD-ROM) or other disk storages, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of data storage.
A kind of solution screen locking method and user terminal based on image disclosed in the embodiment of the present invention have been carried out in detail above Introduce, specific case used herein is set forth to the principle and embodiment of the present invention, the explanation of above example It is only intended to help the method and its core concept for understanding the present invention;Meanwhile for those of ordinary skill in the art, according to this The thought of invention, there will be changes in specific embodiments and applications, in summary, this specification content should It is interpreted as limitation of the present invention.

Claims (17)

  1. A kind of 1. method for identifying user, it is characterised in that methods described includes:
    When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;
    The biological characteristic of acquisition is matched to determine the rank of the user with the biological characteristic to prestore;
    It is determined that target unlocking manner corresponding with the rank according to the user;
    Unlock interface corresponding with the target unlocking manner is presented to cause the user inputs in the unlock interface to test Demonstrate,prove information;
    Receive the checking information that the user inputs in the unlock interface;
    When the checking information passes through checking, user interface corresponding with the rank of the user is presented;Wherein, not The information presented in same user interface is different.
  2. 2. according to the method for claim 1, it is characterised in that described that user behaviour corresponding with the rank of the user is presented After making interface, methods described also includes:
    When the rank of the user is casual user, user described in the terminal-pair is taken pictures includes the user to obtain The picture of facial characteristics, and the picture is stored.
  3. 3. according to the method for claim 2, it is characterised in that methods described also includes:
    When the rank of the user is casual user, the destination object that the user chooses is determined, and to the target pair As the operation of progress;
    The Operation Log of casual user is generated according to the destination object and the operation to the destination object, and faced described When user Operation Log stored.
  4. 4. according to the method for claim 3, it is characterised in that methods described also includes:
    When the rank of the user is casual user, the file that the user deletes is determined;
    The file of the deletion is backed up and hidden.
  5. 5. according to the method for claim 4, it is characterised in that methods described also includes:
    When it is determined that the rank of the user is owner's rank, the casual user that the terminal was operated in preset time period is presented Picture and the Operation Log of the casual user check for active user.
  6. 6. a kind of terminal, it is characterised in that the terminal includes:
    Acquiring unit, for when the screen for detecting terminal is lit, obtaining the biological characteristic for the user for operating the terminal;
    Matching unit, for the biological characteristic of acquisition to be matched to determine the level of the user with the biological characteristic to prestore Not;
    Determining unit, for determining target unlocking manner corresponding with the rank according to the user;
    Display unit, for corresponding with target unlocking manner unlock interface to be presented to cause the user in the unblock Validation information on interface;
    Receiving unit, the checking information inputted for receiving the user in the unlock interface;
    The display unit, for when the checking information passes through checking, user corresponding with the rank of the user to be presented Operation interface;Wherein, the information presented in different user interfaces is different.
  7. 7. terminal according to claim 6, it is characterised in that the terminal also includes photographing unit and memory cell;
    The photographing unit, for when the rank of the user is casual user, user described in the terminal-pair to be taken pictures To obtain the picture for including the user's face feature;
    Memory cell, for the picture to be stored.
  8. 8. terminal according to claim 7, it is characterised in that the terminal also includes generation unit;
    The determining unit, it is additionally operable to, when the rank of the user is casual user, determine the target pair that the user chooses As, and the operation to destination object progress;
    The generation unit, the behaviour of casual user is generated for the operation according to the destination object and to the destination object Make daily record;
    The memory cell, it is additionally operable to be stored the Operation Log of the casual user.
  9. 9. terminal according to claim 8, it is characterised in that the terminal also includes backup units;
    The determining unit, it is additionally operable to when the rank of the user is casual user, determine the file that the user deletes;
    The backup units, for being backed up and being hidden the file of the deletion.
  10. 10. terminal according to claim 9, it is characterised in that
    The display unit, for when it is determined that the rank of the user is owner's rank, presenting and being operated in preset time period The picture of the casual user of the terminal and the Operation Log of the casual user are checked for active user.
  11. A kind of 11. terminal, it is characterised in that including:
    It is stored with the memory of executable program code;
    The processor coupled with the memory;
    The processor calls the executable program code stored in the memory, performs such as claim 1 to right It is required that the method described in 5 any one.
  12. A kind of 12. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange, Wherein, the computer program causes terminal to perform the method as described in claim 1 to any one of claim 5.
  13. 13. a kind of mobile terminal, it is characterised in that the mobile terminal includes living things feature recognition component, at screen and application Device is managed, wherein:
    The living things feature recognition component, for when the screen for detecting terminal is lit, obtaining the use for operating the terminal The biological characteristic at family;
    The application processor, for the biological characteristic of acquisition to be matched to determine the user with the biological characteristic to prestore Rank;
    The application processor, it is additionally operable to determine target unlocking manner corresponding with the rank according to the user;
    The screen, for corresponding with target unlocking manner unlock interface to be presented to cause the user in the unblock Validation information on interface;
    The application processor, it is additionally operable to receive the checking information that the user inputs in the unlock interface;
    The screen, it is additionally operable to when the checking information passes through checking, user behaviour corresponding with the rank of the user is presented Make interface;Wherein, the information presented in different user interfaces is different.
  14. 14. terminal according to claim 13, it is characterised in that the terminal also includes camera;
    The camera, for when the rank of the user is casual user, user described in the terminal-pair taken pictures with Obtain the picture for including the user's face feature;
    The application processor, for the picture to be stored.
  15. 15. terminal according to claim 14, it is characterised in that
    The application processor, it is additionally operable to, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;Operation life according to the destination object and to the destination object Stored into the Operation Log of casual user, and by the Operation Log of the casual user.
  16. 16. terminal according to claim 15, it is characterised in that
    The application processor, it is additionally operable to when the rank of the user is casual user, determine the file that the user deletes; The file of the deletion is backed up and hidden.
  17. 17. terminal according to claim 16, it is characterised in that
    The application processor, it is additionally operable to when it is determined that the rank of the user is owner's rank, presents in preset time period and grasp Made the picture of the casual user of the terminal and the Operation Log of the casual user so that active user checks.
CN201710572701.6A 2017-07-13 2017-07-13 A kind of method, terminal and storage medium for identifying user Pending CN107391990A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710572701.6A CN107391990A (en) 2017-07-13 2017-07-13 A kind of method, terminal and storage medium for identifying user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710572701.6A CN107391990A (en) 2017-07-13 2017-07-13 A kind of method, terminal and storage medium for identifying user

Publications (1)

Publication Number Publication Date
CN107391990A true CN107391990A (en) 2017-11-24

Family

ID=60340586

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710572701.6A Pending CN107391990A (en) 2017-07-13 2017-07-13 A kind of method, terminal and storage medium for identifying user

Country Status (1)

Country Link
CN (1) CN107391990A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108197448A (en) * 2017-12-26 2018-06-22 奇酷互联网络科技(深圳)有限公司 Document display method, device, readable storage medium storing program for executing and terminal
CN108446550A (en) * 2018-03-28 2018-08-24 湖州华科信息咨询有限公司 A kind of mobile terminal safety unlocking method and a device of multi-level verification
CN108718359A (en) * 2018-04-25 2018-10-30 维沃移动通信有限公司 A kind of safe verification method, device and mobile terminal
CN109151175A (en) * 2018-07-25 2019-01-04 努比亚技术有限公司 A kind of mobile terminal safety control method, mobile terminal and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279914A (en) * 2011-07-13 2011-12-14 中国人民解放军海军计算技术研究所 Unified extensible firmware interface (UEFI) trusted supporting system and method for controlling same
CN104166844A (en) * 2014-08-13 2014-11-26 惠州Tcl移动通信有限公司 Login method and system through human face identification based on mobile terminal
CN104239107A (en) * 2014-09-23 2014-12-24 三星电子(中国)研发中心 Application customizing method and application customizing device
CN105447368A (en) * 2015-11-13 2016-03-30 广东欧珀移动通信有限公司 User terminal access right control method and user terminal
CN106681717A (en) * 2016-12-16 2017-05-17 珠海格力电器股份有限公司 Terminal application program management method and device and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102279914A (en) * 2011-07-13 2011-12-14 中国人民解放军海军计算技术研究所 Unified extensible firmware interface (UEFI) trusted supporting system and method for controlling same
CN104166844A (en) * 2014-08-13 2014-11-26 惠州Tcl移动通信有限公司 Login method and system through human face identification based on mobile terminal
CN104239107A (en) * 2014-09-23 2014-12-24 三星电子(中国)研发中心 Application customizing method and application customizing device
CN105447368A (en) * 2015-11-13 2016-03-30 广东欧珀移动通信有限公司 User terminal access right control method and user terminal
CN106681717A (en) * 2016-12-16 2017-05-17 珠海格力电器股份有限公司 Terminal application program management method and device and electronic equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108197448A (en) * 2017-12-26 2018-06-22 奇酷互联网络科技(深圳)有限公司 Document display method, device, readable storage medium storing program for executing and terminal
CN108446550A (en) * 2018-03-28 2018-08-24 湖州华科信息咨询有限公司 A kind of mobile terminal safety unlocking method and a device of multi-level verification
CN108718359A (en) * 2018-04-25 2018-10-30 维沃移动通信有限公司 A kind of safe verification method, device and mobile terminal
CN109151175A (en) * 2018-07-25 2019-01-04 努比亚技术有限公司 A kind of mobile terminal safety control method, mobile terminal and computer storage medium
CN109151175B (en) * 2018-07-25 2021-05-21 努比亚技术有限公司 Mobile terminal safety control method, mobile terminal and computer storage medium

Similar Documents

Publication Publication Date Title
CN106293751B (en) Method for displaying information on terminal equipment and terminal equipment
RU2618932C2 (en) Method, installation and device of unblocking process for terminal
CN107408171B (en) Selectively providing personal information and access to functionality on a lock screen based on biometric user authentication
CN104966005B (en) A kind of access control method, and terminal device
CN107451445A (en) A kind of method of unlocking screen, terminal and storage medium
US9940448B2 (en) Unlock processing method and device
CN103336925B (en) A kind of method and apparatus scanning acceleration
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN107391990A (en) A kind of method, terminal and storage medium for identifying user
CN106681717B (en) Terminal application program management method and device and electronic equipment
CN108604265A (en) The method and terminal device of outline management application program usage time
CN107580114A (en) Biometric discrimination method, mobile terminal and computer-readable recording medium
WO2018127048A1 (en) Data display method and device, and storage medium
CN106022071A (en) Fingerprint unlocking method and terminal
CN104573437B (en) Information authentication method, device and terminal
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
CN107704168A (en) A kind of application program launching method and mobile terminal
CN111459362A (en) Information display method, information display device, electronic apparatus, and storage medium
CN107609407A (en) Method and device for protecting information security in user terminal
CN108781234A (en) Function control method and terminal
CN108491713B (en) Safety reminding method and electronic equipment
CN108038360B (en) Operation mode switching method and mobile terminal
CN108804915A (en) Virus method for cleaning, storage device and electric terminal
CN109409044A (en) A kind of verifying interface display method and terminal
CN108984231A (en) A kind of login method and mobile terminal of application program account

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171124

RJ01 Rejection of invention patent application after publication