CN108229117A - Flexible screen terminal and its method of controlling security and computer readable storage medium - Google Patents

Flexible screen terminal and its method of controlling security and computer readable storage medium Download PDF

Info

Publication number
CN108229117A
CN108229117A CN201711231229.6A CN201711231229A CN108229117A CN 108229117 A CN108229117 A CN 108229117A CN 201711231229 A CN201711231229 A CN 201711231229A CN 108229117 A CN108229117 A CN 108229117A
Authority
CN
China
Prior art keywords
flexible screen
screen terminal
authentication information
user
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711231229.6A
Other languages
Chinese (zh)
Inventor
廖盟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201711231229.6A priority Critical patent/CN108229117A/en
Publication of CN108229117A publication Critical patent/CN108229117A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of flexible screen terminal security control method, terminal and computer readable storage mediums, the flexible screen terminal security control method by when detect triggered in flexible screen terminal need carry out authentication safety operation when, obtain the first authentication information of active user, and then can authentication be carried out to active user according to the first authentication information got, after authentication failure, flexible screen terminal bend need to be controlled to cover and refuse to perform the requested safety operation of active user by flexible screen.Solve it is not strong to the management and control dynamics of disabled user in the prior art, so as to cause to perplex or lose to user the problem of.The invention also discloses a kind of flexible screen terminal and computer readable storage mediums, by implementing said program, it largely reduces due to not carrying out stringent management and control to disabled user, so that disabled user can continue to operate, and cause user's puzzlement or user's loss, further improve the satisfaction of user experience.

Description

Flexible screen terminal and its method of controlling security and computer readable storage medium
Technical field
The present invention relates to field of terminal, whole more specifically to a kind of flexible screen terminal security control method, flexible screen End and computer readable storage medium.
Background technology
With the fast development of the terminals such as smart mobile phone, consumer is no longer only satisfied with the need to plain edition intelligent terminal It asks, flexible screen terminal is a trend of future terminal.For convenience of description, above-mentioned flexible screen terminal is by taking mobile phone as an example, many institute's weeks Know, many individual privacy informations built in mobile phone, user is not intended to disabled user to check or operate the mobile phone of oneself, but existing In technology, stringent management and control is not carried out to disabled user, when disabled user wants to carry out some safety operations, when its failure Afterwards, it still can continue operating handset with the purpose for the execution safety operation that hits pay dirk, and be checked after by safety operation Information of some secrets etc..For example, the friend Liu Hong of Zhang San, Zhang San people not its by the side of when, without its permission, several After secondary unlock, successfully unlocked the mobile phone of Zhang San, and checked the Message Record of Zhang Ming privately, for such case, to Three bring unnecessary puzzlement.Therefore, in the prior art, since the management and control dynamics to disabled user is not strong, cause to use because illegal The operation that continues at family brings puzzlement or loss to user, reduces satisfaction of users.
Invention content
The technical problem to be solved in the present invention is not strong to the management and control dynamics of disabled user in the prior art, causes because non- The problem of method user continues operation and brings puzzlement or loss to user.For the technical problem, a kind of flexible screen terminal is provided Method of controlling security, terminal and computer readable storage medium.
In order to solve the above technical problems, the present invention provides a kind of flexible screen terminal security control method, applied to flexible Flexible screen terminal, the flexible screen terminal security control method includes:
The safety operation for needing to carry out authentication whether is triggered in detection flexible screen terminal;
If so, then obtain the first authentication information of active user;
Authentication is carried out to the active user according to first authentication information of acquisition;
Such as authentification failure, control the flexible screen terminal bend and grasped so that flexible screen to be covered to and refused to perform the safety Make.
Optionally, the control flexible screen terminal bend is included so that flexible screen is covered:
The top and bottom of the flexible screen terminal is controlled to be bent doubling;
Or,
Control the left side of the flexible screen terminal and right lateral bending doubling.
Optionally, it after the authentification failure, further includes:
Obtain preset alarm mailing address;
Alert notice information is sent according to the preset alarm mailing address of acquisition.
Optionally, it before the transmission alert notice information according to the preset alarm mailing address of acquisition, further includes:
Obtain current location information;
Alert notice information is sent according to the preset alarm mailing address of acquisition to include:
After the location information is added to the alert notice information, it is sent to preset alarm mailing address.
Optionally, first authentication information includes at least one in physiological characteristic authentication information, password, gesture Kind.
Optionally, the safety operation is included in power-off operation, unlock operation, delivery operation, file export operation extremely Few one kind.
Optionally, it is described that authentication failure is being carried out to the active user according to first authentication information Afterwards, the flexible screen terminal bend is controlled before flexible screen is covered, to further include:
The second authentication information of the active user is obtained, second authentication information is the active user Physiological characteristic information;
Each physiological characteristic information in second authentication information and default kith and kin's physiological characteristic information library is carried out Matching;
Such as fit through, it is corresponding with access rights according to second authentication information and preset physiological characteristic information Relationship determines corresponding access rights;
Determined whether to perform the safety operation according to the access rights.
Optionally, it after the control flexible screen terminal bend is flexible screen to be covered, further includes:
Obtain the tiers e'tat authentication information of active user;
Authentication is carried out to the active user according to the tiers e'tat authentication information of acquisition;
If certification passes through, the flexible screen terminal is controlled to revert to the state before bending.
Further, the present invention also provides a kind of flexible screen terminal, the flexible screen terminal includes processor, memory And communication bus;
The communication bus is used to implement the connection communication between processor and memory;
The processor is used to perform one or more program stored in the memory, to realize as any of the above-described Described in flexible screen terminal security control method the step of.
Further, the present invention also provides a kind of computer readable storage medium, the computer readable storage mediums One or more program is stored with, one or more of programs can be performed by one or more processor, to realize Such as the step of flexible screen terminal security control method described in any one of the above embodiments.
Advantageous effect
Flexible screen terminal security control method proposed by the present invention, flexible screen terminal and computer readable storage medium, should Flexible screen terminal security control method needs the safety for carrying out authentication to grasp by that ought detect to trigger in flexible screen terminal When making, the first authentication information of active user is obtained, and then can be according to the first authentication information got to current User carries out authentication, after authentication failure, flexible screen terminal bend is controlled to cover flexible screen and refuse to perform The requested safety operation of active user.Namely in the present invention, by controlling flexible screen terminal bend so that flexible screen to be covered, The further operating of disabled user is effectively prevented, that is, further enhances the management and control to disabled user, is reduced because illegal User's continuing to operate to puzzlement or loss that user brings, largely improves the safety of end message, goes forward side by side One step improves the satisfaction of user experience.
Description of the drawings
Below in conjunction with accompanying drawings and embodiments, the invention will be further described, in attached drawing:
The hardware architecture diagram of Fig. 1 each optional mobile terminals of embodiment one to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic procedure schematic diagram of flexible screen terminal security control method that first embodiment of the invention provides;
Fig. 4 is the interface schematic diagram that a kind of entity key that first embodiment of the invention provides specifically is set;
Fig. 5 is a kind of feasible upper-end bent for providing of first embodiment of the invention to cover the structure diagram of screen;
Fig. 6 is a kind of feasible lower ends bent for providing of first embodiment of the invention to cover the structure diagram of screen;
Fig. 7 is the feasible lower ends bent of another kind that provides of first embodiment of the invention to cover the structural representation of screen Figure;
Fig. 8 is that a kind of feasible left side for providing of first embodiment of the invention and right side are bent to cover the knot of screen simultaneously Structure schematic diagram;
Fig. 9 is the basic procedure of acquisition preset alarm mailing address after the authentification failure that first embodiment of the invention provides Schematic diagram;
Figure 10 is the basic flow according to the second authentication information certification active user that first embodiment of the invention provides Journey schematic diagram;
Figure 11 is the basic flow according to tiers e'tat authentication information certification active user that first embodiment of the invention provides Journey schematic diagram;
Figure 12 is the basic flow of a kind of specific flexible screen terminal security control method that second embodiment of the invention provides Journey schematic diagram;
Figure 13 is the flexible screen terminal structure schematic diagram that third embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for representing that the suffix of such as " module ", " component " or " unit " of element is only Be conducive to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention can include such as mobile phone, tablet Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer The dynamic fixed terminals such as terminal and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special For moving except the element of purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or fewer components, Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receive and send messages or communication process in, signal sends and receivees, specifically, radio frequency list Uplink information can be sent to base station by member 101, after the downlink information that in addition can also send base station receives, be sent to movement The processor 110 of terminal is handled, and the downlink information that base station is sent to radio frequency unit 101 can be sent according to radio frequency unit 101 Uplink information generation or detect mobile terminal information update after actively to radio frequency unit 101 push, For example, after detecting that the geographical location residing for mobile terminal changes, base station can be to the radio frequency unit 101 of mobile terminal The message informing of geographical location variation is sent, radio frequency unit 101 can send out the message informing after the message informing is received The processor 110 for giving mobile terminal is handled, and the processor 110 of mobile terminal can control the message informing to be shown in movement eventually On the display panel 1061 at end;In general, radio frequency unit 101 include but not limited to antenna, at least one amplifier, transceiver, Coupler, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication with network and other set Standby communication, can specifically include:By radio communication with the server communication in network system, for example, mobile terminal can be with File resource is downloaded from server by radio communication, for example application program can be downloaded from server, in mobile terminal A certain application program is downloaded after completing, if the corresponding file resource update of the application program, the server in server It can be by radio communication to the message informing of mobile terminal push resource updates, user to be reminded to carry out more the application program Newly.Above-mentioned wireless communication can use any communication standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, it is general Be grouped wireless service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Cod eDivision Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division- Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and must be configured into for mobile terminal is not belonging to, it completely can be according to need It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 Formula, speech recognition mode, broadcast reception mode when under isotypes, it is that radio frequency unit 101 or WiFi module 102 are received or The audio data stored in memory 109 is converted into audio signal and exports as sound.Moreover, audio output unit 103 The relevant audio output of specific function performed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 can include loud speaker, buzzer etc..
A/V input units 104 are used to receive audio or video signal.A/V input units 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the image data of video obtained in image capture mode by image capture apparatus (such as camera) carry out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, details are not described herein.
Display unit 106 is used to show by information input by user or be supplied to the information of user.Display unit 106 can wrap Include display panel 1061, it should be noted that display panel 1061 has flexible characteristic, that is to say that display panel 1061 is Flexible screen, specifically, active matrix organic light-emitting diode (Active Matrix/Organic Light- may be used Emitting Diode, AMOLED), the forms such as passive organic electric exciting light-emitting diode (Passive matrix OLED) match Put display panel 1061.It should be further noted that the flexible screen in the present invention is same as the prior art, therefore do not do excessive It repeats.In addition, the concrete shape of flexible screen, material and concrete structure etc. are not limited in the present invention.
User input unit 107 can be used for receiving the number inputted or character information and generation and the use of mobile terminal The key signals input that family is set and function control is related.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses any suitable objects such as finger, stylus or attachment on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order that processor 110 is sent can be received and performed.It in addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc. It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the component independent as two to realize the function that outputs and inputs of mobile terminal, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.For example, when the message informing that a certain application program is received by radio frequency unit 101, processor 110 can control by The message informing is shown in a certain predeterminable area of display panel 1061, a certain area of the predeterminable area and touch panel 1071 Domain corresponds to, can be in corresponding region on display panel 1061 by carrying out touch control operation to 1071 a certain region of touch panel The message informing of display is controlled.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) can include wired or wireless head-band earphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for device of the connection with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part is stored in storage by running or performing the software program being stored in memory 109 and/or module and call Data in device 109 perform the various functions of mobile terminal and processing data, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
It should be understood that the flexible terminal with flexible screen described in Fig. 1 can be bent in whole or in part, and specific Existing any structure and control mode may be used in warp architecture and bending control mode, due to the discussion of itself and non-present invention Emphasis, details are not described herein.
For the ease of understanding the embodiment of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system The LTE system united as universal mobile communications technology, the LTE system include the UE (User Equipment, the use that communicate connection successively Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolve dPacket Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, after UE201 is connect with eNodeB2021, can be received To the PUSH message notice sent by eNodeB2021, eNodeB2021 may be coupled to EPC203, and eNodeB2021 can be carried For the access of UE201 to EPC203.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address is distributed and other functions, and PCRF2036 is business data flow and the strategy of IP bearing resources and charging control strategic decision-making Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., it does not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the present invention is proposed.
First embodiment
It is not strong to the management and control dynamics of disabled user in the prior art in order to solve, cause because disabled user continue operation due to User brings the problem of puzzlement or loss.The present embodiment provides a kind of flexible screen terminal security control method, this method is logical first It crosses in detection flexible screen terminal and whether triggers the safety operation for needing to carry out authentication, touched in flexible screen terminal when detecting It has sent out when needing to carry out the safety operation of authentication, has obtained the first authentication information of active user, and then can be according to obtaining The first authentication information got carries out authentication to active user, after authentication failure, controls flexible screen terminal It is bent to cover and refuse to perform the requested safety operation of active user by flexible screen.It specifically may refer to shown in Fig. 3, Fig. 3 For the basic flow chart of flexible screen terminal security control method provided in this embodiment, the flexible screen terminal security control method packet It includes:
S301:The safety operation for needing to carry out authentication whether is triggered in detection flexible screen terminal;
If so, perform S302;If it is not, then continue to execute S301.
In the present embodiment, safety operation is included in power-off operation, unlock operation, delivery operation, file export operation It is at least one.It is understood that power-off operation includes the shutdown of long-press power key, click button is shut down, by terminal The application of installation shut down etc., for example, be but not desired to give back when disabled user finds mobile phone, but when directly shutting down, at this In the case of kind, power-off operation is just the safety operation for treating authentication.It should be noted that user would generally in terminal some Important application is encrypted, for example, wechat, diary, short message, the secret that these encrypted applications at this time belong to user should With, it is undesirable to it is checked or is known by other people, therefore, when thering is unlock to operate these encryption applications, also need to carry out authentication. Also, it is understood that the application such as present Mobile banking, Alipay, wechat, Taobao, day cat all refers to online payment, this A little applications are all closely related with the number one of user, and safety is even more important, so, when these applications are related to delivery operation Also it needs to carry out authentication.In addition, for certain user, some files can be stored in terminal, and these files may relate to And the secret of user unit one belongs to, user wishes that only oneself can check or operate these files, at this time for file The relevant operations such as export also need to carry out authentication.In addition, it should be noted that, it is but not desired to return when disabled user finds mobile phone Also, but directly SIM is operated, carries out operation to SIM here and refer to the application installed by mobile phone or click screen In a certain button operate on it and also belong to safety operation.
It is worth noting that, only several relatively common safety operations recited herein, the present invention is not limited to upper Cited these types of safety operation is stated, as long as in fact, needle is important operation for a user should all give identity and recognize Card belongs to the scope of safety operation, all should be in the range of the present invention protects.
S302:Obtain the first authentication information of active user.
It is understood that when detect triggered in flexible screen terminal need carry out authentication safety operation after, It needs to obtain the first authentication information of active user.Here, to the first authentication information of active user into Row explanation.In the present embodiment, the first authentication information includes at least one in physiological characteristic authentication information, password, gesture Kind.It is understood that physiological characteristic authentication information includes but is not limited to fingerprint, iris, shape of face, palm shape, retina, human body Smell, the blood vessel of hand and DNA etc..Simultaneously, it should be noted that password here includes numerical ciphers, English password, special word Symbol password etc. arbitrarily combines the character string password formed by number, English, spcial character.Certainly, the first authentication is believed Breath further includes user-defined gesture, such as L-type, Z-type etc..
It is worth noting that, only several the first relatively common authentication informations recited herein, the present invention is simultaneously Above-mentioned cited the first authentication information of these types is not limited to, as long as in fact, the first identity of active user can be embodied Authentication information all should be in the range of the present invention protects.
S303:Authentication is carried out to active user according to the first authentication information of acquisition.
It should be noted that it needs to carry out authentication to it after the first authentication information for getting active user. In order to better understand the present invention, file export operation is included with safety operation here, while the first authentication information includes Physiological characteristic authentication information, and physiological characteristic authentication information is illustrated including fingerprint.It will be into for example, setting active user A Part export of composing a piece of writing operates, and the first authentication information for getting active user A is fingerprint a, then by fingerprint a with being stored in terminal Authentication information in fingerprint certification is compared.
S304:If authentification failure, flexible screen terminal bend is controlled to cover and refuse to perform safety operation by flexible screen.
It is understood that carrying out authentication failure to active user according to the first authentication information got Afterwards, flexible screen terminal bend need to be controlled, flexible screen is covered, prevents operating again for disabled user, while refuses to perform The safety operation of disabled user request.For example, upper example is accepted, if the authentication information stored in terminal is fingerprint b, hence it is evident that , authentication failure, then active user A is disabled user, and flexible screen terminal bend is hindered so that flexible screen is covered at this time The only operation again of disabled user A, and refuse to perform the file export operation of disabled user A requests.
It should be noted that file export operation, while the first authentication information are only included with safety operation here Including physiological characteristic authentication information, and physiological characteristic authentication information includes illustrating for fingerprint progress, in practical applications, needs It is adjusted accordingly according to application scenarios.
In the present embodiment, control flexible screen terminal bend includes at least following two situations so that flexible screen to be covered:
The first situation, the top and bottom bending doubling of control flexible screen terminal.It is understood that flexible screen terminal Top and bottom bending doubling when, doubling ratio in top and bottom can adjust accordingly as the case may be.It is for example, flexible The top and bottom of screen terminal respectively account for 50% and are carried out at the same time bending doubling or the upper end of flexible screen terminal accounts for 60%, and lower end accounts for 40% carries out bending doubling or the upper end of flexible screen terminal accounts for 30%, and lower end accounts for 70% and carries out bending doubling.It is noticeable It is that only several relatively common bending doubling modes recited herein, the present invention is not limited to above-mentioned cited bendings Doubling mode, as long as covering flexible screen disabled user is prevented to be operated again in the guarantor of the present invention in fact, can realize In the range of shield, it is not limited to which terminal is all covered.For example, it sets in terminal there are during entity Home key 401, while entity Home key 401 is located at flexible screen lower end,, at this time need not will be soft because entity Home key 501 can be used for unlocked by fingerprint referring to Fig. 4 Property screen terminal all cover, you can entity Home key 501 is exposed, only by the upper-end bent of flexible screen terminal to cover flexibility Screen, lower end is without bending, referring to Fig. 5.In another example, it is generally the case that the upper end of flexible screen terminal is provided with camera 601, takes the photograph It is unlocked available for face recognition as first 601, at this point, all being covered without by flexible screen terminal, you can by camera 601 Exposed, only by the lower ends bent of flexible screen terminal to cover flexible screen, upper end is without bending, referring to Fig. 6.It it is of course also possible to will The lower ends bent of flexible screen terminal is to cover entire terminal, and folding mode of the upper end without bending, i.e. camera 701 is not exposed, It for details, reference can be made to Fig. 7.It is worth noting that, in practical applications, can according to the specific button facilities of flexible screen terminal into The respective curved operation of row flexible screen terminal.
The second situation controls the left side of flexible screen terminal and right lateral bending doubling.It is understood that flexible screen terminal Left side and during right lateral bending doubling, left side and right side doubling ratio can adjust accordingly as the case may be.For example, left side 50% is respectively accounted for right side and is carried out at the same time bending doubling, referring to Fig. 8.It is understood that when flexible screen terminal back side middle portion Position be equipped with camera, at this point, left side and right side respectively account for 50% be carried out at the same time bending doubling may have certain shadow to camera It rings, then 30% can will be accounted on the left of flexible screen terminal, right side accounts for 70% left side for carrying out bending doubling or flexible screen terminal 80% is accounted for, right side accounts for 20% and carries out bending doubling.It is worth noting that, only several relatively common bendings recited herein Doubling mode, the present invention is not limited to above-mentioned cited bending doubling mode, as long as covering flexible screen in fact, can realize Disabled user to be prevented to be operated again within the scope of the present invention.
It should be noted that after authentification failure, it is further comprising the steps of, it for details, reference can be made to Fig. 9:
S901:Obtain preset alarm mailing address.
It is understood that the telephone number of preset alarm mailing address including contact person, email address, wechat account, QQ accounts etc..It will be clear that only several relatively common preset alarm mailing addresses recited herein, the present invention is simultaneously It is not limited to above-mentioned cited preset alarm mailing address.In order to better illustrate, included here with preset alarm mailing address Telephone number, the email address of contact person is illustrated, for example, setting user's A authentification failures, i.e. user A is disabled user, Telephone number b1, the email address b2 that preset Alarm Communication address is contact person B, the phone number of contact person C are got at this time Code c1, email address c2.In addition it is also necessary to explanation, preset alarm mailing address can also include terminal in itself.It is worth note Meaning is only illustrated here with what telephone number of the preset alarm mailing address including contact person, email address carried out, In practical applications, preset alarm mailing address can be done by developer or user according to actual conditions or corresponding application scenarios Corresponding adjustment.
S902:Alert notice information is sent according to the preset alarm mailing address of acquisition.
Example in undertaking, after user's A authentification failures, mobile phone sends alert notice information M to the short message of contact person B and mailbox In the b2 of location, while mobile phone can be also sent in the short message and email address c2 of alert notice information M to contact person C.It is noticeable It is that, when preset alarm mailing address includes terminal itself, alert notice information at this time is prompts the terminal user, and terminal is just Used by disabled user, for example, after setting user's A authentification failures, mobile phone sends out the sound of alarm or mobile phone send out " owner, I is used by disabled user, woulds you please ensure my safety " etc..
In addition it is also necessary to explanation, before sending alert notice information according to the preset alarm mailing address of acquisition, also Including:Current location information is obtained, after the location information got is added to alert notice information, is retransmited to default report Alert mailing address.It is understood that prevent mobile phone from losing, the current location information of mobile phone is obtained when necessary to facilitate user Getting back mobile phone improves the experience satisfaction of user.
In the present embodiment, after authentication failure is carried out to active user according to the first authentication information, control Flexible screen terminal bend is further comprising the steps of with before flexible screen is covered, referring specifically to Figure 10.
S1001:Obtain the second authentication information of active user.
It will be clear that after authentication failure is carried out to active user according to the first authentication information, may be used also To obtain the second authentication information of active user.It is understood that the second authentication information is the life of active user Characteristic information is managed, physiological characteristic information elaborates above-mentioned, is not repeated herein and repeats.
S1002:By each physiological characteristic information in the second authentication information and default kith and kin's physiological characteristic information library into Row matching;
It such as fits through, goes to S1003, otherwise, go to S1005.
It should be noted that default kith and kin's physiological characteristic information library is added according to actual needs by terminal user, In store terminal user kith and kin each physiological characteristic information.For example, terminal user A is the fingerprint of oneself parent and the face of girlfriend Type is added in kith and kin's physiological characteristic information library.
S1003:It is determined according to the second authentication information and preset physiological characteristic information with access rights correspondence Corresponding access rights.
It will be clear that terminal user can also set corresponding access rights according to preset physiological characteristic information. For example, accepting upper example, terminal user A sets its parent that can carry out operation a, operation b, operation c, sets its girlfriend that can be grasped Make a, operation c.
S1004:Determined whether to perform safety operation according to access rights.
Example in undertaking, if the girlfriend of terminal user A desires access to operation b, it will be apparent that, girlfriend is only possible to carry out pair A and c are operated, its girlfriend does not operate the permission of b at this time, so, terminal will be refused to perform its girlfriend operation b.
S1005:Control flexible screen terminal bend.
In the present embodiment, it is further comprising the steps of after control flexible screen terminal bend is flexible screen to be covered, specifically Referring to Figure 11.
S1101:Obtain the tiers e'tat authentication information of active user.
It is understood that after controlling flexible screen terminal bend flexible screen to be covered, can also obtain again current The tiers e'tat authentication information of user.
S1102:Authentication is carried out to active user according to the tiers e'tat authentication information of acquisition.
It will be evident that authentication can be carried out to active user according to the tiers e'tat authentication information of acquisition, need what is illustrated That tiers e'tat authentication information can be the physiological characteristic information of terminal user in itself, or terminal user setting its The physiological characteristic information of kith and kin.
S1103:If certification passes through, control flexible screen terminal reverts to the state before bending.
It is understood that pass through when the tiers e'tat authentication information according to acquisition carries out authentication to active user Afterwards, it decides that active user at this time is eligible users, then can be reverted to flexible screen terminal before being bent with using terminal State.
Flexible screen terminal security control method provided in this embodiment is needed by that ought detect to trigger in flexible screen terminal When carrying out the safety operation of authentication, obtain the first authentication information of active user, and then can be according to getting First authentication information to active user carry out authentication, when authentication failure after, control flexible screen terminal bend with Flexible screen is covered and refuses to perform the requested safety operation of active user.Namely in the present invention, by controlling flexible screen Terminal bend effectively prevents disabled user's further operating, that is, further enhances to illegally using so that flexible screen to be covered The management and control at family reduces the puzzlement or loss that continue to bring to user during operation because disabled user, largely improves The safety of end message and the satisfaction of user experience.
Second embodiment
The present embodiment is on the basis of first embodiment, by taking a kind of specific flexible screen terminal security control method as an example Present invention work is further illustrated, specifically may refer to Figure 12.
If the safety operation for needing to carry out authentication in flexible screen terminal is power-off operation, file export operation, is paid Operation, if the first authentication information includes physiological characteristic authentication information, the second authentication information includes fingerprint, iris.
S1201:The safety operation for needing to carry out authentication whether is triggered in detection flexible screen terminal;
If so, go to S1202;If it is not, then continue to execute S1201.
Delivery operation is triggered if detecting, goes to S1202.
S1202:Obtain the first authentication information of active user.
Example in undertaking, further, if the physiological characteristic authentication information for obtaining active user is iris a.
S1203:Authentication is carried out to active user according to the first authentication information of acquisition;
If authentification failure goes to S1204, if certification success, goes to S1209.
Example in undertaking, further, by the physiological characteristic authentication information iris a1 of the above-mentioned active user got and end Iris information in the physiological characteristic authentication information stored on end is compared, if the physiological characteristic authentication information stored in terminal In iris for a2, a3, then the first authentication information authentification failure of active user at this time, goes to S1204.
S1204:Obtain the second authentication information of active user.
Example in undertaking, further, if getting the second authentication information fingerprint b1 of active user.
S1205:By each physiological characteristic information in the second authentication information and default kith and kin's physiological characteristic information library into Row matching;
If fitting through, S1206 is gone to, otherwise, goes to S1207.
Example in undertaking, further, if the physiological characteristic information fingerprint stored in default kith and kin's physiological characteristic information library is B1, b2, then the second authentication information certification success of active user at this time, goes to S1206.
S1206:It is determined according to the second authentication information and preset physiological characteristic information with access rights correspondence Corresponding access rights.
Example in undertaking, further, if the corresponding addressable permissions of the second authentication information fingerprint b1 of active user For power-off operation, file export operation.
S1207:Flexible screen terminal bend is controlled to cover and refuse to perform safety operation by flexible screen.
S1208:Determined whether to perform safety operation according to access rights.
Example in undertaking further, if active user does not have the permission of delivery operation, goes to S1210.
S1209:Perform safety operation.
S1210:Refusal performs safety operation.
Example in undertaking, further, active user do not have the permission of delivery operation, therefore refuse to perform the payment behaviour Make.
Flexible screen terminal security control method provided in this embodiment is needed by that ought detect to trigger in flexible screen terminal When carrying out the safety operation of authentication, obtain the first authentication information of active user, and then can be according to getting First authentication information to active user carry out authentication, when authentication failure after, control flexible screen terminal bend with Flexible screen is covered and refuses to perform the requested safety operation of active user.Namely in the present invention, by controlling flexible screen Terminal bend effectively prevents disabled user's further operating, that is, further enhances to illegally using so that flexible screen to be covered The management and control at family reduces the puzzlement or loss that continue to bring to user during operation because disabled user, largely improves The safety of end message and the satisfaction of user experience.
3rd embodiment
It is shown in Figure 13 the present embodiment provides a kind of terminal, terminal provided in this embodiment include processor 1301, Memory 1302 and communication bus 1303.
Wherein, the communication bus 1303 in the present embodiment is used to implement the connection between processor 1301 and memory 1302 Communication, processor 1301 is then for performing one or more first program stored in memory 1302, to realize following walk Suddenly:
The safety operation for needing to carry out authentication whether is triggered in detection flexible screen terminal;
If so, then obtain the first authentication information of active user;
Authentication is carried out to active user according to the first authentication information of acquisition;
Such as authentification failure, flexible screen terminal bend is controlled to cover and refuse to perform safety operation by flexible screen.
In the present embodiment, safety operation is included in power-off operation, unlock operation, delivery operation, file export operation It is at least one.It is worth noting that, only several relatively common safety operations recited herein, the present invention is not limited to upper Cited these types of safety operation is stated, as long as in fact, needle is important operation for a user should all give identity and recognize Card, that is, belong to safety operation, all should be in the range of the present invention protects.
It is understood that when processor 1301 detects the peace for being triggered in flexible screen terminal and needing to carry out authentication After full operation, need to obtain the first authentication information of active user.Here, the first identity to active user is recognized Card information illustrates.In the present embodiment, the first authentication information is included in physiological characteristic authentication information, password, gesture At least one.It is worth noting that, only several the first relatively common authentication informations recited herein, the present invention Above-mentioned cited the first authentication information of these types is not limited to, as long as in fact, the first body of active user can be embodied Part authentication information all should be in the range of the present invention protects.
It should be noted that processor 1301 carries out body after the first authentication information for getting active user to it Part certification, after authentification failure, processor 1301 controls flexible screen terminal bend to cover flexible screen and refuse to perform safety Operation.
In the present embodiment, processor 1301 controls flexible screen terminal bend so that flexible screen masking is included at least following two Kind situation:
The first situation, processor 1301 control the top and bottom bending doubling of flexible screen terminal.It is understood that During the top and bottom bending doubling of flexible screen terminal, doubling ratio in top and bottom can do corresponding tune as the case may be It is whole.For example, the top and bottom of flexible screen terminal, which respectively account for 50%, carries out bending doubling or the upper end of flexible screen terminal accounts for 60%, lower end accounts for 40% upper end for carrying out bending doubling or flexible screen terminal and accounts for 30%, and lower end accounts for 70% and carries out bending pair Folding.
The second situation, processor 1301 control the left side of flexible screen terminal and right lateral bending doubling.It is understood that When the left side of flexible screen terminal and right lateral bending doubling, left side and right side doubling ratio can do corresponding tune as the case may be It is whole.For example, position is equipped with camera among the back side of flexible screen terminal, referring to Fig. 7, at this point, left side and right side respectively account for 50% into Row bending doubling may have a certain impact to camera, then can will account for 30% on the left of flexible screen terminal, right side accounts for 70% carries out accounting for 80% on the left of bending doubling or flexible screen terminal, and right side accounts for 20% and carries out bending doubling.
It is worth noting that, only several relatively common bending doubling modes recited herein, of the invention and unlimited In above-mentioned cited bending doubling mode, as long as flexible screen is covered disabled user is prevented to carry out again in fact, can realize Operation is within the scope of the present invention.
It will be clear that after authentification failure, processor 1301 also obtains preset alarm mailing address, and according to acquisition Preset alarm mailing address send alert notice information.It is understood that preset alarm mailing address includes contact person's Telephone number, email address, wechat account, QQ accounts etc..
Furthermore, it is necessary to explanation, processor 1301 sends alert notice according to the preset alarm mailing address of acquisition to be believed Before breath, further include:Current location information is obtained, after the location information got is added to alert notice information, then is sent out It send to preset alarm mailing address.It is understood that prevent mobile phone from losing, the current location information of mobile phone is obtained when necessary To facilitate user's getting back mobile phone, the experience satisfaction of user is improved.
In the present embodiment, after authentication failure is carried out to active user according to the first authentication information, control Flexible screen terminal bend with before flexible screen is covered, processor 1301 also obtains the second authentication information of active user, Second authentication information with each physiological characteristic information in default kith and kin's physiological characteristic information library is matched, is such as matched logical It crosses, corresponding access right is determined with access rights correspondence according to the second authentication information and preset physiological characteristic information Limit, and then can be determined whether to perform safety operation according to access rights.
It will be clear that after authentication failure is carried out to active user according to the first authentication information, may be used also To obtain the second authentication information of active user.It should be noted that default kith and kin's physiological characteristic information library is used by terminal Family is added according to actual needs, each physiological characteristic information of inner storage terminal user kith and kin.Meanwhile terminal user may be used also To set corresponding access rights according to preset physiological characteristic information, and determine whether execution associated safety according to access rights Operation.
In the present embodiment, after control flexible screen terminal bend is flexible screen to be covered, processor 1301 can also obtain The tiers e'tat authentication information of active user is taken, and identity is carried out to active user according to the tiers e'tat authentication information of acquisition and is recognized Card, if certification passes through, control flexible screen terminal reverts to the state before bending.
It is worth noting that, illustrate in order not to burden, the institute in incomplete illustrated embodiments one, two in the present embodiment There is example, it is understood that, all examples in embodiment one, two are suitable for the present embodiment.
The present embodiment also provides a kind of computer readable storage medium, computer-readable recording medium storage there are one or Multiple programs, one or more program can be performed by one or more processor, to realize that above-mentioned flexible screen terminal such as is pacified The step of full control method.
Flexible screen terminal provided in this embodiment and computer readable storage medium are detected by working as in flexible screen terminal When triggering the safety operation for needing progress authentication, the first authentication information of active user is obtained, and then can basis The first authentication information got carries out authentication to active user, and after authentication failure, control flexible screen is whole End bending is refused to perform the requested safety operation of active user so that flexible screen to be covered.It solves in the prior art to non- Method user's management and control dynamics is not strong, and then disabled user is caused to can continue to operate, the problem of bringing puzzlement to user or lose.This The flexible screen terminal that embodiment provides also carries out the second authentication to active user, can in itself be liked according to user, sets it The access rights of kith and kin, so compared to the prior art, flexible screen terminal provided in this embodiment not only realizes reinforcement to non- The management and control of method user additionally provides the operation of more hommization, further improves the satisfaction of user experience.
Fourth embodiment
The present embodiment provides a kind of processor 1301 and realizes flexible screen terminal security control on the basis of 3rd embodiment The detailed process of system realizes that process is as follows:
If the safety operation for needing to carry out authentication in flexible screen terminal is power-off operation, unlock operates, delivery operation, If the first authentication information includes password, the second authentication information includes fingerprint, iris, and tiers e'tat authentication information includes Shape of face.
Step 1:Processor 1301 detects the safety operation for whether being triggered in flexible screen terminal and needing to carry out authentication;
If so, go to step 2;If it is not, then continue to execute step 1.
If processor 1301, which detects, triggers power-off operation, then step 2 is gone to.
Step 2:Processor 1301 obtains the first authentication information of active user.
Example in undertaking, further, if the first authentication information that processor 1301 obtains active user is password a.
Step 3:Processor 1301 carries out authentication according to the first authentication information of acquisition to active user;
If authentification failure goes to step 4, if certification success, goes to step 8.
Example in undertaking, further, processor 1301 is by the first authentication information of the above-mentioned active user got Password a is compared with the password stored in terminal, if the password stored in terminal is a1, then the first body of active user at this time Part authentication information authentification failure, goes to step 4.
Step 4:Processor 1301 obtains the second authentication information of active user.
Example in undertaking, further, if the second authentication information fingerprint that processor 1301 gets active user is b。
Step 5:Processor 1301 is by each physiology in the second authentication information and default kith and kin's physiological characteristic information library Characteristic information is matched;
If fitting through, step 6 is gone to, if matching does not pass through, goes to step 9.
Example in undertaking, further, if the physiological characteristic information fingerprint stored in default kith and kin's physiological characteristic information library is The second authentication information authentification failure of b1, b2, the then active user of the judgement of processor 1301 at this time, go to step 9.
Step 6:It is determined according to the second authentication information and preset physiological characteristic information with access rights correspondence Corresponding access rights.
Step 7:Determined whether to perform safety operation according to access rights.
Step 8:Perform safety operation.
Step 9:Processor 1301 controls flexible screen terminal bend to cover and refuse to perform safety operation by flexible screen.
Example in undertaking, it is further, soft to cover if the top and bottom of flexible screen terminal are bent with respectively accounting for 50% Property screen prevents active user from continuing to operate, and refuse the power-off operation of active user.
Step 10:Processor 1301 obtains current location information and preset alarm mailing address.
Example in undertaking, further, if the current location information that processor 1301 obtains is D, preset alarm mailing address For M.
Step 11:Current location information is added in alert notice information by processor 1301 is sent to preset alarm In mailing address.
The current location information D got is added to alert notice information by example in undertaking, further, processor 1301 In and be sent to preset alarm mailing address M.
Step 12:Processor 1301 obtains the tiers e'tat authentication information of active user.
Example in undertaking, further, if the tiers e'tat authentication information that processor 1301 gets active user is shape of face c。
Step 13:Processor 1301 carries out authentication according to the tiers e'tat authentication information of acquisition to active user;
If certification passes through, step 14 is gone to, otherwise, goes to step 15.
Example in undertaking, further, if the tiers e'tat authentication information stored in terminal is shape of face c1, processor 1301 Authentication is carried out to active user according to the tiers e'tat authentication information shape of face c got, it will be apparent that, authentification failure, turns at this time To step 15.
Step 14:Control flexible screen terminal reverts to the state before bending.
Step 15:Terminate.
Terminal provided in this embodiment, by working as the peace for detecting and being triggered in flexible screen terminal and needing to carry out authentication During full operation, the first authentication information of active user is obtained, and then can be according to the first authentication information pair got Active user carries out authentication, after authentication failure, controls flexible screen terminal bend that flexible screen is covered and refused Perform the requested safety operation of active user.It solves not strong to disabled user's management and control dynamics in the prior art, and then causes Disabled user can continue to operate, the problem of bringing puzzlement to user or lose.Flexible screen terminal provided in this embodiment is also right Active user carries out the second authentication, can in itself be liked according to user, sets the access rights of its kith and kin, so with existing skill Art is compared, and flexible screen terminal provided in this embodiment not only realizes the management and control strengthened to disabled user, additionally provides more people The operation of property further improves the satisfaction of user experience.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or device institute Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal (can be mobile phone, computer services Device, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
The embodiment of the present invention is described above in conjunction with attached drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned specific embodiment is only schematical rather than restricted, those of ordinary skill in the art Under the enlightenment of the present invention, present inventive concept and scope of the claimed protection are not being departed from, can also made very much Form, these are belonged within the protection of the present invention.

Claims (10)

1. a kind of flexible screen terminal security control method, which is characterized in that applied to flexible flexible screen terminal, the flexibility Screen terminal security control method includes:
The safety operation for needing to carry out authentication whether is triggered in detection flexible screen terminal;
If so, then obtain the first authentication information of active user;
Authentication is carried out to the active user according to first authentication information of acquisition;
Such as authentification failure, the flexible screen terminal bend is controlled to perform the safety operation to cover and refuse by flexible screen.
2. flexible screen terminal security control method as described in claim 1, described to control the flexible screen terminal bend to incite somebody to action Flexible screen masking includes:
The top and bottom of the flexible screen terminal is controlled to be bent doubling;
Or,
Control the left side of the flexible screen terminal and right lateral bending doubling.
3. flexible screen terminal security control method as described in claim 1, after the authentification failure, further include:
Obtain preset alarm mailing address;
Alert notice information is sent according to the preset alarm mailing address of acquisition.
4. flexible screen terminal security control method as claimed in claim 3, according to the preset alarm mailing address of acquisition Before sending alert notice information, further include:
Obtain current location information;
Alert notice information is sent according to the preset alarm mailing address of acquisition to include:
After the location information is added to the alert notice information, it is sent to preset alarm mailing address.
5. flexible screen terminal security control method as described in claim 1, it is special that first authentication information includes physiology Levy at least one of authentication information, password, gesture.
6. flexible screen terminal security control method as described in claim 1, the safety operation includes power-off operation, unlock behaviour At least one of work, delivery operation, file export operation.
7. the flexible screen terminal security control method as described in any one of claim 1-6, recognizes according to first identity After information is demonstrate,proved to active user progress authentication failure, control the flexible screen terminal bend that flexible screen is covered it Before, it further includes:
The second authentication information of the active user is obtained, second authentication information is the life of the active user Manage characteristic information;
Second authentication information is matched with each physiological characteristic information in default kith and kin's physiological characteristic information library;
It such as fits through, according to second authentication information and preset physiological characteristic information and access rights correspondence Determine corresponding access rights;
Determined whether to perform the safety operation according to the access rights.
8. the flexible screen terminal security control method as described in any one of claim 1-6, the control flexible screen is whole After end bending is flexible screen to be covered, further include:
Obtain the tiers e'tat authentication information of active user;
Authentication is carried out to the active user according to the tiers e'tat authentication information of acquisition;
If certification passes through, the flexible screen terminal is controlled to revert to the state before bending.
9. a kind of flexible screen terminal, which is characterized in that the flexible screen terminal includes processor, memory and communication bus;
The communication bus is used to implement the connection communication between processor and memory;
The processor is used to perform one or more program stored in the memory, to realize such as claim 1-8 Any one of described in flexible screen terminal security control method the step of.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or Multiple programs, one or more of programs can be performed by one or more processor, to realize as in claim 1-8 The step of any one of them flexible screen terminal security control method.
CN201711231229.6A 2017-11-29 2017-11-29 Flexible screen terminal and its method of controlling security and computer readable storage medium Pending CN108229117A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711231229.6A CN108229117A (en) 2017-11-29 2017-11-29 Flexible screen terminal and its method of controlling security and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711231229.6A CN108229117A (en) 2017-11-29 2017-11-29 Flexible screen terminal and its method of controlling security and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108229117A true CN108229117A (en) 2018-06-29

Family

ID=62653687

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711231229.6A Pending CN108229117A (en) 2017-11-29 2017-11-29 Flexible screen terminal and its method of controlling security and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108229117A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110176188A (en) * 2019-06-26 2019-08-27 昆山国显光电有限公司 A kind of interior folding display device
CN110362979A (en) * 2019-06-05 2019-10-22 努比亚技术有限公司 A kind of method for secret protection, terminal and computer readable storage medium
WO2022160789A1 (en) * 2021-02-01 2022-08-04 ***股份有限公司 Information processing method and apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140074824A (en) * 2012-12-10 2014-06-18 삼성전자주식회사 mobile device of bangle type, and methods for controlling and diplaying ui thereof
CN105302238A (en) * 2014-07-28 2016-02-03 Lg电子株式会社 Portable electronic device and control method thereof
CN106203045A (en) * 2016-07-08 2016-12-07 广东欧珀移动通信有限公司 A kind of control method of electronic device and electronic equipment
CN106650467A (en) * 2016-09-22 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Method, mobile terminal and system for data encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140074824A (en) * 2012-12-10 2014-06-18 삼성전자주식회사 mobile device of bangle type, and methods for controlling and diplaying ui thereof
CN105302238A (en) * 2014-07-28 2016-02-03 Lg电子株式会社 Portable electronic device and control method thereof
CN106203045A (en) * 2016-07-08 2016-12-07 广东欧珀移动通信有限公司 A kind of control method of electronic device and electronic equipment
CN106650467A (en) * 2016-09-22 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Method, mobile terminal and system for data encryption

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴燕波,向大为,麦永浩,侯训杰: "智能手机的信息安全风险及防护对策研究", 《信息安全研究》 *
罗永宏等: "实践方法", 《信息安全与技术》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110362979A (en) * 2019-06-05 2019-10-22 努比亚技术有限公司 A kind of method for secret protection, terminal and computer readable storage medium
CN110176188A (en) * 2019-06-26 2019-08-27 昆山国显光电有限公司 A kind of interior folding display device
CN110176188B (en) * 2019-06-26 2023-03-14 昆山国显光电有限公司 Internal folding display device
WO2022160789A1 (en) * 2021-02-01 2022-08-04 ***股份有限公司 Information processing method and apparatus

Similar Documents

Publication Publication Date Title
CN110084047A (en) A kind of access right control method, terminal and computer readable storage medium
CN108227833A (en) Control method, terminal and the computer readable storage medium of flexible screen terminal
CN109800602B (en) Privacy protection method, mobile terminal and computer readable storage medium
CN109656371A (en) Mobile terminal eye care method, device, mobile terminal and storage medium
CN108881594A (en) Safety identification control method, flexible screen terminal and computer readable storage medium
CN108062489A (en) A kind of glance prevention method, terminal and computer readable storage medium
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN110134301A (en) A kind of application function operating method, terminal and computer readable storage medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN108833690A (en) authority control method, terminal and computer readable storage medium
CN110191465A (en) Authority control method, mobile terminal and computer readable storage medium
CN108196762A (en) A kind of terminal control method, terminal and computer readable storage medium
CN110032887A (en) A kind of picture method for secret protection, terminal and computer readable storage medium
CN109543474A (en) A kind of method for controlling mobile terminal and mobile terminal
CN108229117A (en) Flexible screen terminal and its method of controlling security and computer readable storage medium
CN108196774A (en) A kind of message consults method, flexible screen terminal and computer readable storage medium
CN108241808A (en) identification code display control method, terminal and computer readable storage medium
CN108108082A (en) A kind of method of information processing, terminal and computer storage media
CN110052024A (en) Method of adjustment, adjustment device, mobile terminal and the storage medium of game vibration
CN109462693A (en) A kind of information processing method, terminal and computer readable storage medium
CN109276881A (en) A kind of game control method, equipment
CN109683797A (en) A kind of viewing area control method, equipment and computer readable storage medium
CN109375846A (en) Spirogram target display methods and device, mobile terminal and readable storage medium storing program for executing
CN109101301A (en) A kind of display control method, mobile terminal and computer readable storage medium
CN108182582A (en) A kind of method of payment, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629