WO2016180234A1 - 一种安全环境构建方法和装置 - Google Patents

一种安全环境构建方法和装置 Download PDF

Info

Publication number
WO2016180234A1
WO2016180234A1 PCT/CN2016/080355 CN2016080355W WO2016180234A1 WO 2016180234 A1 WO2016180234 A1 WO 2016180234A1 CN 2016080355 W CN2016080355 W CN 2016080355W WO 2016180234 A1 WO2016180234 A1 WO 2016180234A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
terminal
touch event
fingerprint information
screen
Prior art date
Application number
PCT/CN2016/080355
Other languages
English (en)
French (fr)
Inventor
张伟
李磊
张春
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016180234A1 publication Critical patent/WO2016180234A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a method and apparatus for constructing a security environment.
  • the user can set the fingerprint password to prevent the password from leaking.
  • the fingerprint collection device integrated on the mobile phone needs to collect the fingerprint, which is cumbersome.
  • password security services including pattern passwords, character passwords, and fingerprint passwords
  • all of these password security services provide "one-time" security services when unlocked.
  • the unlocked users there is no guarantee that they will be permanent users. You may encounter such a situation: after the phone is unlocked, suddenly there is a rush to put down the phone to handle the matter. At this time, the phone will be in a safe vacuum period before the phone reaches the automatic lock screen time, which is highly likely to be illegal. The user obtains the right to use the mobile phone.
  • This method can not only provide the mobile phone lock screen service, but also remove the security vacuum period of the mobile phone to ensure the absolute security of the mobile phone application environment.
  • the existing solution is to use the pattern password, the digital password or the specific fingerprint device to perform irregular verification on the user when the user uses the mobile phone, but the verification method makes the user feel very disgusted.
  • the application environment security protection scheme in the related art is a “one-time” security verification based on a pattern password, a character password, and a specific device fingerprint password, that is, once the verification is passed, the user's security policy is not identified twice or from time to time; Even if there is a secondary verification strategy, the pattern password, the character password, and the specific device fingerprint password are used to interact with the user. This method does not detect in time whether the user after the verification passes changes, and thus cannot guarantee the mobile application environment. And absolute privacy of personal privacy.
  • the invention provides a method and a device for constructing a security environment, which are used to solve the problem that a security scheme in the related art has a security vulnerability and thus has a security risk.
  • a security environment construction method including:
  • the fingerprint information of the user is collected from time to time through the terminal screen
  • the touch event is responded to.
  • the terminal screen when the terminal is in the security mode, if the terminal screen is in the unlocked state, when the user touches the touch event of the terminal screen, when the user touches, the terminal screen is used.
  • the fingerprint information of the user is collected from time to time, and when the collected fingerprint information matches the pre-stored fingerprint information, the touch event is responded.
  • a touch event of the user to the terminal screen is detected
  • Detecting whether the touch event is a touch event for a protection item pre-selected by the user Detecting whether the touch event is a touch event for a protection item pre-selected by the user.
  • the fingerprint information of the user is collected through the terminal screen.
  • the types of the protection items include: system software, third-party software installed by a user, and user files.
  • the touch event is not responded, and the lock screen processing is performed.
  • a security environment construction apparatus including:
  • the detecting module is configured to detect a touch event of the user to the terminal screen when the terminal screen is in an unlocked state, and trigger a fingerprint collection and verification module;
  • the fingerprint collection and verification module is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
  • An execution module configured to respond to the touch event.
  • the detecting module is configured to: when the terminal is in the safe mode, if the terminal screen is in the unlocked state, when the touch event of the user to the terminal screen is detected, the detecting device is triggered.
  • the fingerprint acquisition and verification module is configured to: when the terminal is in the safe mode, if the terminal screen is in the unlocked state, when the touch event of the user to the terminal screen is detected, the detecting device is triggered.
  • the detecting module is configured to detect a touch event of the user on the screen of the terminal when the screen of the terminal is in an unlocked state, and detect whether the touch event is pre-selected for the user.
  • the touch event of the fixed protection item in the case of YES, triggers the fingerprint collection and verification module.
  • the types of the protection items include: system software, third-party software installed by a user, and user files.
  • the execution module is further configured to not respond to the touch event when the collected fingerprint information does not match the pre-stored fingerprint information, and perform a lock screen process.
  • Another embodiment of the present invention provides a computer storage medium, where the computer storage medium stores execution instructions.
  • the execution instructions are used to perform the method in the above embodiments.
  • the user fingerprint is obtained, and the verification is completed in the background, and the verification is correct, and the system can correctly respond to the user operation, thereby realizing the terminal application environment without the user's perception.
  • the full-time lock removes the terminal security vacuum period and ensures the security of the terminal information to the greatest extent.
  • FIG. 1 is a flowchart of a method for constructing a security environment according to Embodiment 1 of the present invention
  • FIG. 2 is a flowchart of a method for constructing a security environment according to an application example 1 of the present invention
  • FIG. 3 is a flowchart of a security environment construction method provided by application example 2 of the present invention.
  • FIG. 4 is a structural block diagram of a security environment construction apparatus according to Embodiment 2 of the present invention.
  • An embodiment of the present invention provides a security environment construction method, which is applied to a terminal. As shown in FIG. 1 , the method may include:
  • Step S101 When the terminal screen is in an unlocked state, detecting a touch event of the user on the terminal screen;
  • Step S102 when the user touches, collect the fingerprint information of the user from time to time through the terminal screen
  • Step S103 When the collected fingerprint information matches the pre-stored fingerprint information, respond to the touch event.
  • the user obtains the fingerprint of the user through the touch operation of the user, and performs verification in the background, and the verification is correct, and the system can correctly respond to the user operation, thereby realizing that the user is not aware.
  • a full-time lock of the terminal application environment is constructed to ensure the security of the terminal information to the greatest extent.
  • triggering modes that can trigger the execution of the method in this embodiment are listed below.
  • the following triggering modes are merely enumerated, not exhaustive, and those skilled in the art can according to their own needs. Make flexible settings.
  • Manner 1 The method described in this embodiment is used as a function item that can be turned off and on. The user can flexibly enable or disable the function corresponding to the method in this embodiment.
  • Manner 2 The method described in this embodiment is implemented in a security system environment; for example, in the process of starting the user, whether the user enters the normal system environment or the security system environment, when entering the security system environment (ie, the terminal) Running in safe mode), then the method described in this embodiment is automatically enabled.
  • step S101 is implemented as follows: when the terminal screen is in the unlocked state, the touch event of the user to the terminal screen is detected, and it is detected whether the touch event is a touch event for the protection item selected by the user in advance. In the case of YES, steps S102 and S103 are performed.
  • the touch event for the protection item pre-selected by the user includes clicking to open the protection item and all touch events during the operation after the protection item is turned on. That is, the protection item is locked in full time.
  • the types of protection items include: system software, third-party software installed by users, and user files.
  • the user fingerprint is collected through the screen to increase the fingerprint matching success rate. As long as one fingerprint information matches the pre-stored fingerprint information, it is determined that the matching is successful, and the touch operation is performed. Respond.
  • the touch event is not responded, and the lock screen processing is performed.
  • This application example describes a process of time-checking a user's touch operation using a method of time-finding fingerprint verification.
  • fingerprint information of a legitimate user needs to be collected in advance. Because the user has different habits and which finger touches the screen, the fingerprint information of all the fingers of the user is preferably collected to increase the matching success rate.
  • the security environment construction method provided by this application example includes:
  • S201 The mobile phone enters the security system environment opened up.
  • S202 Start the fingerprint collection and verification module and run in the background; wherein the fingerprint collection and verification module initiates two synchronized concurrent threads, one acquires a fingerprint and one matches a fingerprint.
  • step S205 When the fingerprint information in S204 has at least one match, step S206 is performed; otherwise, step S207 is performed.
  • step S206 the system normally responds to the user touch operation, and then continues to loop S203, S204, and S205.
  • step S207 when the information does not match, the user is not responded to and the screen is locked.
  • This application example describes the process of verifying the touch operation of each individual application that needs to be protected by using the method of time fingerprint verification. This process is different from the time verification of the entire system. This process is only used when the user clicks the application with a finger. Icon, collection and verification when launching a single app or content for security protection.
  • the security environment construction method provided by this application example includes:
  • S301 The mobile phone enters the security system environment opened up.
  • S302 Start the fingerprint collection and verification module and run in the background; wherein the fingerprint collection and verification module initiates two synchronized concurrent threads, one acquires a fingerprint and one matches a fingerprint.
  • step S306 When the fingerprint information in S304 has at least one match, step S306 is performed; otherwise, step S307 is performed.
  • step S306 the system normally responds to the user operation and starts the application.
  • the loops S303, S304, and S305 are continued to protect the scene after the application is started.
  • Step S307 when the information does not match, the user is not allowed to start the operation of the application and locks the screen.
  • the fingerprint acquisition and verification module is realized. It is through the verification system running in the background, without interacting with the user (that is, in the case that the user is not aware of it), using the touch screen of the mobile phone when the user operates, when the finger touches the screen to start to leave the screen So far, collect the user's fingerprint from time to time, and compare the collected result with the pre-stored standard data. If the two match, the user is a legitimate user and can use the mobile phone system normally; if the two do not match, the user is determined to have changed. For illegal users, the mobile phone system will not respond The user requests and locks the screen.
  • An embodiment of the present invention provides a security environment construction apparatus, which is applied to a terminal, as shown in FIG. 4, and includes:
  • the detecting module 410 is configured to detect a touch event of the user to the terminal screen when the terminal screen is in the unlocked state, and trigger a fingerprint collection and verification module;
  • the fingerprint collection and verification module 420 is configured to collect the fingerprint information of the user from time to time through the terminal screen when the user touches, and trigger the execution module when the collected fingerprint information matches the pre-stored fingerprint information;
  • the execution module 430 is configured to respond to the touch event.
  • the detecting module 410 is configured to trigger the fingerprint collection and calibration when the terminal touches the terminal screen when the terminal is in the unlocked state when the terminal is in the safe mode.
  • Module 420 is configured to trigger the fingerprint collection and calibration when the terminal touches the terminal screen when the terminal is in the unlocked state when the terminal is in the safe mode.
  • the detecting module 410 is configured to detect a touch event of the user to the terminal screen when the terminal screen is in the unlocked state, and detect whether the touch event is pre-selected for the user.
  • the touch event of the protection item in the case of YES, triggers the fingerprint acquisition and verification module 420.
  • the types of protection items include: system software, third-party software installed by users, and user files.
  • the executing module 430 is further configured to: when the collected fingerprint information does not match the pre-stored fingerprint information, does not respond to the touch event, and performs a lock screen process.
  • Embodiments of the present invention also provide a storage medium.
  • an execution instruction is stored in the storage medium, and the execution instruction is used to execute the foregoing method.
  • the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), and a Random Access Memory (RAM).
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • the present invention collects the fingerprint of the current user based on the touch operation of the user during the user's use of the terminal, and verifies the fingerprint, verifies the correctness, and responds correctly to the user operation, thereby realizing that the user is not aware.
  • a full-time lock of the terminal application environment is constructed to ensure the security of the terminal information to the greatest extent.
  • the security environment construction method and apparatus provided by the embodiments of the present invention have the following beneficial effects: in the user touch operation, the user fingerprint is obtained, and the verification is completed in the background, the verification is correct, and the system can correctly respond to the user.
  • the operation realizes the full-time lock of the terminal application environment without the user's perception, and removes the terminal security vacuum period, thereby ensuring the security of the terminal information to the greatest extent.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Image Input (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)

Abstract

本发明公开了一种安全环境构建方法和装置,所述方法包括:在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;在用户触控时,通过终端屏幕时时采集用户的指纹信息;当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。本发明所述方案,在用户触控操作中,获取用户指纹,并在后台完成校验,校验正确,***可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,去除了终端安全真空期,最大程度的保障了终端信息的安全。

Description

一种安全环境构建方法和装置 技术领域
本发明涉及移动通信领域,尤其涉及一种安全环境构建方法和装置。
背景技术
绝大多数智能手机终端用户目前都采用字符密码或图案密码来保证手机***的安全,但手机图案密码或数字密码存在泄露的风险。
用户可以通过设定指纹密码来达到防止密码泄露的目的,但是,需要手机上集成的专门指纹采集设备对指纹进行采集,操作比较繁琐。
并且,所有的这些密码安全服务(包括图案密码、字符密码和指纹密码),都是在解锁时提供“一次性”的安全服务,至于解锁后的使用用户,无法保证其永久是合法用户,我们可能会遇到这样的情况:手机解锁后,突然有急事而放下手机,去处理事情,这时,在手机到达自动锁屏时间之前,手机会处于一种安全真空期,是极有可能被非法用户取得手机使用权的。
这样就需要一种保证手机安全的方法,这种方法既能提供手机锁屏服务,又能去除手机安全真空期进而保证手机应用环境的绝对安全。为了达到该目的,目前已有的方案是,在用户使用手机时,利用图案密码、数字密码或特定指纹设备对用户进行不定时校验,但这种校验方式会让用户感到十分反感。
可见,相关技术中的应用环境安全保护方案是建立在图案密码、字符密码以及特定设备指纹密码的“一次性”安全验证,即一次验证通过,便不再二次或时时辨别用户的安全策略;即使有二次验证策略,也是采用图案密码、字符密码以及特定设备指纹密码与用户交互进行的方式,这种方式并不能及时察觉一次验证通过后的使用用户是否发生变化,从而不能保证手机应用环境和个人隐私的绝对安全。
发明内容
本发明提供一种安全环境构建方法和装置,用以解决相关技术中的安全方案有安全漏洞,进而存在安全隐患的问题。
依据本发明的一个方面,提供一种安全环境构建方法,包括:
在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;
在用户触控时,通过终端屏幕时时采集用户的指纹信息;
当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。
可选地,本发明所述方法中,当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。
可选地,本发明所述方法中,所述检测到用户对终端屏幕的触控事件,在用户触控时,通过终端屏幕时时采集用户的指纹信息,包括:
检测到用户对终端屏幕的触控事件;
检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,在用户触控时,通过终端屏幕时时采集用户的指纹信息。
可选地,本发明所述方法中,所述保护项的类型包括:***软件、用户安装的第三方软件和用户文件。
可选地,本发明所述方法中,当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。
依据本发明的另一个方面,提供一种安全环境构建装置,包括:
检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,触发指纹采集与校验模块;
指纹采集与校验模块,设置为在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,触发执行模块;
执行模块,设置为对所述触控事件进行响应。
可选地,本发明所述装置中,所述检测模块,设置为当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,触发所述指纹采集与校验模块。
可选地,本发明所述装置中,所述检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,触发所述指纹采集与校验模块。
可选地,本发明所述装置中,所述保护项的类型包括:***软件、用户安装的第三方软件和用户文件。
可选地,本发明所述装置中,所述执行模块,还设置为当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。
本发明另一实施例提供了一种计算机存储介质,所述计算机存储介质存储有执行指令, 所述执行指令用于执行上述实施例中的方法。
本发明有益效果如下:
本发明所述方案,在用户触控操作中,获取用户指纹,并在后台完成校验,校验正确,***可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,去除了终端安全真空期,最大程度的保障了终端信息的安全。
附图说明
为了更清楚地说明本发明实施例或相关技术中的技术方案,下面将对实施例或相关技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例一提供的一种安全环境构建方法的流程图;
图2为本发明应用示例一提供的一种安全环境构建方法的流程图;
图3为本发明应用示例二提供的一种安全环境构建方法的流程图;
图4为本发明实施例二提供的一种安全环境构建装置的结构框图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
实施例一
本发明实施例提供一种安全环境构建方法,应用于终端,如图1所示,所述方法可以包括:
步骤S101,在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;
步骤S102,在用户触控时,通过终端屏幕时时采集用户的指纹信息;
步骤S103,当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。
综上可知,本发明在用户使用终端过程中,通过用户的触控操作,获取用户的指纹,并在后台完成校验,校验正确,***可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,最大程度的保障了终端信息的安全。
为了使本发明的目的、技术方案和优点更加清楚,下面给出几个具体及优选实施方式,用以细化和优化本发明所述方法的功能。需要说明的是,在不冲突的情况下,如下特征可以互相任意组合。
为了使本发明的方案实施起来更加可控,以下列举两个可以触发执行本实施例所述方法的触发方式,当然,以下触发方式只是列举,并非穷举,本领域技术人员可以根据自己的需求进行灵活设定。
方式一:将本实施例所述方法作为一种可以关闭及开启的功能项,用户通过自身需求,灵活的开启或关闭本实施例所述方法对应的功能。
方式二:将本实施例所述方法在一种安全***环境下实施;例如,在用户开机的过程中,可以选定是进入普通***环境还是安全***环境,当进入安全***环境时(即终端运行在安全模式下),那么就自动使能本实施例所述方法。
在本发明的一个优选实施例中,用户还可以根据自己的需求,针对于某些需要保护的应用或内容来实施本实施例所述方法。此时,步骤S101按如下方式实施:在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测该触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,执行步骤S102和S103。
其中,针对于用户预先选定的保护项的触控事件包含点击开启该保护项以及该保护项开启后运行期间的所有触控事件。即对该保护项进行全时锁。其中,保护项的类型包括:***软件、用户安装的第三方软件和用户文件等。
在本发明实施例中,在用户触控时,通过屏幕时时的采集用户指纹是为了增加指纹匹配成功率,只要有一个指纹信息与预存的指纹信息匹配,就判定为匹配成功,对触控操作予以响应。
可选地,本发明实施例中,当采集的指纹信息与预存的指纹信息均不匹配时,对所述触摸事件不予响应,并进行锁屏处理。
为了更清楚的阐述本发明,下面结合方法的流程图和具体应用示例对本发明进行详细描述。
应用示例一:
本应用示例描述了采用时时指纹校验的方法对用户的触控操作进行时时校验的过程。
在实施本发明所述方法前,需要预先采集合法用户的指纹信息,由于用户习惯不同,用哪个手指触碰屏幕不定,所以优选地采集用户所有手指的指纹信息,以增加匹配成功率。
如图2所示,本应用示例提供的安全环境构建方法,包括:
S201:手机进入所开辟的安全***环境。
S202:启动指纹采集与校验模块并在后台运行;其中,指纹采集与校验模块发起两个同步的并发线程,一个采集指纹,一个匹配指纹。
S203:监听用户触控操作。
S204:当用户触摸屏幕,有触控操作时,采集用户指纹信息并同时进行匹配,当用户手指离开屏幕,停止指纹的采集与匹配。
S205:当S204中指纹信息有至少一次匹配时,执行步骤S206;否则,执行步骤S207。
步骤S206,***正常响应用户触控操作,然后继续循环S203、S204、S205。
步骤S207,当信息都不匹配时,不予响应用户操作并锁屏。
应用示例二:
本应用示例描述了采用时时指纹校验的方法对需要保护的每单个应用的触控操作进行校验的过程,此过程区别于对整个***的时时校验,此过程只在用户用手指点击应用图标,启动单个以进行安全防护的app应用或内容时,才进行采集和校验。
如图3所示,本应用示例提供的安全环境构建方法,包括:
S301:手机进入所开辟的安全***环境。
S302:启动指纹时时采集与校验模块并在后台运行;其中,指纹采集与校验模块发起两个同步的并发线程,一个采集指纹,一个匹配指纹。
S303:监听用户触控操作。
S304:当用户点击应用图标时,采集用户指纹信息并同时进行匹配,并在用户手指离开屏幕,停止指纹的采集与匹配。
S305:当S304中指纹信息有至少一次匹配时,执行步骤S306;否则,执行步骤S307。
步骤S306,***正常响应用户操作,启动应用。优选地,在应用启动后,继续循环S303、S304、S305,以对应用启动后的场景进行保护。
步骤S307,当信息都不匹配时,不予响应用户启动应用的操作并锁屏。
综上所述,可知在手机正常运行后(未设传统密码的手机唤醒后或设定传统密码的手机解锁后),当用户在安全***环境模式下时,指纹时时采集与校验模块的实现是通过在后台运行的校验***,在不与用户交互的情况下(也就是在用户察觉不到的情况下),利用手机触摸屏在用户进行操作的时候,在手指触摸到屏幕开始到离开屏幕为止,去时时采集用户指纹,并将采集结果与预存的标准数据进行对比,如两者匹配,则用户是合法用户,可以正常使用手机***;如果两者不匹配,则判定用户已经发生变化,为非法用户,手机***将不予响应 用户请求并锁屏。
实施例二
本发明实施例提供一种安全环境构建装置,应用于终端,如图4所示,包括:
检测模块410,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,触发指纹采集与校验模块;
指纹采集与校验模块420,设置为在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,触发执行模块;
执行模块430,设置为对所述触控事件进行响应。
基于上述结构框架及实施原理,下面给出在上述结构下的几个具体及优选实施方式,用以细化和优化本发明所述装置的功能,以使本发明方案的实施更方便,准确。具体涉及如下内容:
在本发明的一个实施例中,检测模块410,设置为当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,触发指纹采集与校验模块420。
在本发明的另一个实施例中,检测模块410,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,触发指纹采集与校验模块420。
其中,保护项的类型包括:***软件、用户安装的第三方软件和用户文件等。
可选地,本发明实施例中,执行模块430,还设置为当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。
本发明的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质中存储有执行指令,该执行指令用于执行上述的方法。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(Read-Only Memory,简称为ROM)、随机存取存储器(Random Access Memory,简称为RAM)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
综上可知,本发明在用户使用终端过程中,基于用户的触控操作,时时采集当前用户的指纹,并对指纹进行校验,校验正确,正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,最大程度的保障了终端信息的安全。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是其与其他实施例的不同之处。尤其对于装置实施例而言,由于其基本相似与方法实施例,所以,描述的比较简单,相关之处参见方法实施例的部 分说明即可。
虽然通过实施例描述了本申请,本领域的技术人员知道,本申请有许多变形和变化而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。
工业实用性
如上所述,本发明实施例提供的一种安全环境构建方法和装置具有以下有益效果:在用户触控操作中,获取用户指纹,并在后台完成校验,校验正确,***可以正确响应用户操作,实现了在用户无感知的情况下,构建起终端应用环境的全时锁,去除了终端安全真空期,最大程度的保障了终端信息的安全。

Claims (11)

  1. 一种安全环境构建方法,应用于终端,包括:
    在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件;
    在用户触控时,通过终端屏幕时时采集用户的指纹信息;
    当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。
  2. 如权利要求1所述的方法,其中,所述方法包括:
    当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,对所述触控事件进行响应。
  3. 如权利要求1或2所述的方法,其中,所述检测到用户对终端屏幕的触控事件,在用户触控时,通过终端屏幕时时采集用户的指纹信息,包括:
    检测到用户对终端屏幕的触控事件;
    检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,在用户触控时,通过终端屏幕时时采集用户的指纹信息。
  4. 如权利要求3所述的方法,其中,所述保护项的类型包括:***软件、用户安装的第三方软件和用户文件。
  5. 如权利要求1或2或4所述的方法,其中,当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。
  6. 一种安全环境构建装置,应用于终端,包括:
    检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,触发指纹采集与校验模块;
    指纹采集与校验模块,设置为在用户触控时,通过终端屏幕时时采集用户的指纹信息,当采集的指纹信息与预存的指纹信息有匹配时,触发执行模块;
    执行模块,设置为对所述触控事件进行响应。
  7. 如权利要求6所述的装置,其中,所述检测模块,设置为当终端运行在安全模式下时,若终端屏幕处于解锁状态,则在检测到用户对终端屏幕的触控事件时,触发所述指纹采集与校验模块。
  8. 如权利要求6或7所述的装置,其中,所述检测模块,设置为在终端屏幕处于解锁状态时,检测到用户对终端屏幕的触控事件,检测所述触控事件是否是针对于用户预先选定的保护项的触控事件,在是的情况下,触发所述指纹采集与校验模块。
  9. 如权利要求8所述的装置,其中,所述保护项的类型包括:***软件、用户安装的第三 方软件和用户文件。
  10. 如权利要求6或7或9所述的装置,其中,所述执行模块,还设置为当采集的指纹信息与预存的指纹信息均不匹配时,对所述触控事件不予响应,并进行锁屏处理。
  11. 一种计算机存储介质,所述计算机存储介质存储有执行指令,所述执行指令用于执行权利要求1至5中任一项所述的方法。
PCT/CN2016/080355 2015-10-21 2016-04-27 一种安全环境构建方法和装置 WO2016180234A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510686318.4 2015-10-21
CN201510686318.4A CN106611113A (zh) 2015-10-21 2015-10-21 一种安全环境构建方法和装置

Publications (1)

Publication Number Publication Date
WO2016180234A1 true WO2016180234A1 (zh) 2016-11-17

Family

ID=57247702

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/080355 WO2016180234A1 (zh) 2015-10-21 2016-04-27 一种安全环境构建方法和装置

Country Status (2)

Country Link
CN (1) CN106611113A (zh)
WO (1) WO2016180234A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259360A (zh) * 2020-02-14 2020-06-09 珠海格力电器股份有限公司 终端设备的触摸屏状态控制方法、装置及终端设备

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108762835A (zh) * 2018-05-17 2018-11-06 Oppo广东移动通信有限公司 应用运行方法、装置、存储介质及电子装置
CN113468490B (zh) * 2020-03-30 2024-05-03 阿里巴巴集团控股有限公司 终端设备的锁屏方法、装置和设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101809581A (zh) * 2007-09-24 2010-08-18 苹果公司 电子设备中的嵌入式验证***
CN104765552A (zh) * 2015-04-28 2015-07-08 小米科技有限责任公司 权限管理方法和装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104049901A (zh) * 2014-07-03 2014-09-17 南昌欧菲生物识别技术有限公司 移动终端及其操作触控按键的方法
CN104618577B (zh) * 2014-12-30 2018-05-29 广东欧珀移动通信有限公司 一种按键请求的响应方法及装置

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101809581A (zh) * 2007-09-24 2010-08-18 苹果公司 电子设备中的嵌入式验证***
CN104765552A (zh) * 2015-04-28 2015-07-08 小米科技有限责任公司 权限管理方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259360A (zh) * 2020-02-14 2020-06-09 珠海格力电器股份有限公司 终端设备的触摸屏状态控制方法、装置及终端设备

Also Published As

Publication number Publication date
CN106611113A (zh) 2017-05-03

Similar Documents

Publication Publication Date Title
JP6239788B2 (ja) 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体
TWI676910B (zh) 顯示人機界面的方法、裝置及系統
JP6096301B2 (ja) ファームウェアにおける盗難防止
US20170193212A1 (en) Screen Interface Unlocking Method And Screen Interface Unlocking Device
WO2016015448A1 (zh) 一种多***进入方法、装置及终端
US20160366588A1 (en) User mode control method and system based on iris recognition technology for mobile terminal
WO2015014128A1 (zh) 穿戴式设备的认证方法及穿戴式设备
WO2013067486A1 (en) Secure boot administration in a unified extensible firmware interface (uefi)- compliant computing device
WO2017036345A1 (zh) 一种信息输入方法和装置
US9560527B2 (en) Version protection method and apparatus for mobile terminal
US20150047019A1 (en) Information processing method and electronic device
US20170169213A1 (en) Electronic device and method for running applications in different security environments
WO2017166689A1 (zh) 一种隐私保护的方法及装置
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
WO2017067507A1 (zh) 一种设备使用权限的确定方法和装置
WO2017016032A1 (zh) 指纹验证方法、指纹验证装置和终端
WO2016127448A1 (zh) ***切换方法、***切换装置和终端
KR20230064623A (ko) 안전한 개인용 메모리가 있는 모바일 장치
WO2018000509A1 (zh) 安全操作方法、操作装置及终端
WO2016171992A1 (en) Detecting and preventing illicit use of device
WO2016180234A1 (zh) 一种安全环境构建方法和装置
CN105138881A (zh) 锁屏方法及装置
EP3336734B1 (en) Fingerprint information secure call method, apparatus, and mobile terminal
WO2016078429A1 (zh) 一种身份识别的方法和装置
WO2010083747A1 (zh) 一种触摸屏终端及其鉴权方法和***

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16792084

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16792084

Country of ref document: EP

Kind code of ref document: A1