WO2017177502A1 - 一种控制终端工作状态的方法和装置 - Google Patents

一种控制终端工作状态的方法和装置 Download PDF

Info

Publication number
WO2017177502A1
WO2017177502A1 PCT/CN2016/082237 CN2016082237W WO2017177502A1 WO 2017177502 A1 WO2017177502 A1 WO 2017177502A1 CN 2016082237 W CN2016082237 W CN 2016082237W WO 2017177502 A1 WO2017177502 A1 WO 2017177502A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
state
working state
biometric
terminal
Prior art date
Application number
PCT/CN2016/082237
Other languages
English (en)
French (fr)
Inventor
张晓亮
刘辉
冯磊
孙卫山
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017177502A1 publication Critical patent/WO2017177502A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to, but is not limited to, the field of communications technologies, and in particular, to a method and apparatus for controlling the working state of a terminal.
  • fingerprint recognition is mainly used for unlocking in the terminal.
  • the terminal When the terminal is in the lock screen state, the user's finger touches the fingerprint recognition sensor, and the fingerprint recognition sensor performs fingerprint recognition once.
  • the fingerprint recognition is successful, the fingerprint is unlocked and enters the main interface. Therefore, when the terminal is in the lock screen state, the other party cannot unlock the terminal, and thus the information in the terminal cannot be obtained.
  • the user unlocks the terminal and others use the terminal the information in the terminal can be viewed at will, resulting in the risk of leakage of the confidential information in the terminal, and the security of the information cannot be guaranteed.
  • the main purpose of the embodiments of the present invention is to provide a method and apparatus for controlling the working state of a terminal, which aims to improve information security and convenience of operation.
  • a method for controlling the working state of a terminal comprising:
  • control working state is the first state; when the recognition result is the recognition failure, the control working state is the second state.
  • the performing the biometric recognition to obtain the recognition result comprises:
  • the biometric information collected in this time is compared with the biometric information stored in the storage unit, and it is determined whether the biometric information collected this time and the pre-stored biometric information match.
  • the method further includes:
  • the processed information is encrypted or decrypted.
  • the processed information is not encrypted or decrypted.
  • Encrypting or decrypting the processed information includes: decrypting the encrypted information when the terminal receives the encrypted information; and encrypting the information that needs to be sent out when the terminal sends the information outward.
  • the encrypting or decrypting of the processed information includes: when the terminal receives the encrypted information, the encrypted information is not decrypted; when the terminal sends the information outward, the information that needs to be sent out is not encrypted.
  • the method further includes:
  • the operator is granted the first authority.
  • the biometric information includes: fingerprint information, eye pattern information, iris information, sclera information, facial feature information, or voiceprint information.
  • the method further includes:
  • the status indicator is marked in real time based on the recognition result obtained by each biometric identification.
  • the state identifier is read, and the recognition result is obtained according to the state identifier.
  • the recognition result is that the recognition is successful
  • the working state is determined to be the first state
  • the recognition result is the recognition failure
  • the working state is determined to be the second state.
  • a device for controlling the working state of a terminal comprising:
  • a biometric identification module configured to continuously perform biometric recognition to obtain a recognition result
  • the processing module is configured to: when the recognition result is that the recognition is successful, the control working state is the first state; when the recognition result is the recognition failure, the control working state is the second state.
  • the biometric identification module includes an acquisition unit, a storage unit, a determination unit, and a comparison unit:
  • the collecting unit is configured to continuously collect biometric information.
  • the determining unit is configured to determine whether biometric information is collected this time after the biometric information is collected. When the biometric information is not collected, the current identification fails; when the biometric information is collected, The biometric information collected this time is sent to the comparison unit.
  • the comparison unit is configured to compare the biometric information collected in the current time with the biometric information stored in the storage unit to determine whether the biometric information collected in the current time matches the pre-stored biometric information; When the biometric information collected this time matches the pre-stored biometric information, it is determined that the current recognition is successful; when the biometric information collected this time does not match the pre-stored biometric information, it is determined that the current recognition fails.
  • the device further includes an encryption and decryption module, and the processing module is configured to:
  • the encryption and decryption module is activated to encrypt or decrypt the processed information.
  • the encryption and decryption module is turned off without encrypting or decrypting the processed information.
  • the encryption or decryption of the processed information by the encryption and decryption module includes: decrypting the encrypted information when the terminal receives the encrypted information; and encrypting the information that needs to be sent out when the terminal sends the information outward;
  • the encryption and decryption module does not encrypt or decrypt the processed information, and includes: when the terminal receives the encrypted information, the encrypted information is not decrypted; when the terminal sends the information outward, the information that needs to be sent out is not encrypted.
  • processing module is configured to:
  • the operator is granted the first authority.
  • the biometric information includes: fingerprint information, eye pattern information, iris information, and Gong Membrane information, facial feature information, and voiceprint information.
  • the biometric identification module includes a notification unit
  • the processing module includes a state determination unit
  • the device further includes a status register.
  • the notification unit is configured to mark the status identifier of the status register according to the recognition result obtained by each biometric identification in real time.
  • the status determining unit is configured to: read a status identifier of the status register, obtain a recognition result according to the status identifier, and when the recognition result is that the recognition is successful, determine that the working status is the first state; when the recognition result is that the recognition fails , determine the working state as the second state.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the method of controlling the operational state of the terminal.
  • the method for controlling the working state of the terminal according to the present invention realizes real-time control and fast switching of the working state of the terminal by continuously performing biometric identification. Users can control their working status by providing or not providing their own biometric information, thus implementing different functions and operating rights.
  • the terminal is unlocked and used by another person, the working state is switched because the terminal cannot acquire the biometric information of the user, so the other person cannot view the confidential information of the user. Thereby ensuring the security of the information and ensuring the convenience of operation.
  • FIG. 1 is a flowchart of a first embodiment of a method for controlling an operating state of a terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of performing biometric identification by a terminal in an embodiment of the present invention
  • FIG. 3 is a flowchart of a second embodiment of a method for controlling an operating state of a terminal according to an embodiment of the present invention
  • FIG. 4 is a flow chart of fingerprint recognition by a fingerprint recognition sensor according to an embodiment of the present invention.
  • FIG. 5 is a flowchart of a third embodiment of a method for controlling an operating state of a terminal according to an embodiment of the present invention.
  • FIG. 6 is a schematic block diagram of a first embodiment of an apparatus for controlling an operating state of a terminal according to an embodiment of the present invention
  • FIG. 7 is a schematic block diagram of a biometric identification module of an apparatus for controlling a working state of a terminal according to an embodiment of the present invention.
  • FIG. 8 is a schematic block diagram of a processing module of an apparatus for controlling an operating state of a terminal according to an embodiment of the present invention
  • FIG. 9 is a schematic block diagram of a second embodiment of an apparatus for controlling an operating state of a terminal according to an embodiment of the present invention.
  • FIG. 10 is a schematic block diagram of a third embodiment of an apparatus for controlling an operating state of a terminal according to an embodiment of the present invention.
  • FIG. 11 is a schematic block diagram of a fourth embodiment of an apparatus for controlling an operating state of a terminal according to an embodiment of the present invention.
  • the method for controlling the working state of the terminal in the embodiment of the present invention is generally: detecting a preset operation applied to the human-machine interface of the terminal, for example, a continuous pressing operation or a touch operation on the human-machine interface, that is, in a person A pressing operation or a touch operation performed on the machine interface may be continued for a predetermined time value, or the preset operation may also be an identification operation of the human body feature; no specific limitation is imposed on the preset operation.
  • determining that the user who performs the operation is a user with specific authority, for example, an administrator, a machine owner, etc., then shifting the working state of the terminal to a safe working state, that is, Any content in the terminal, including confidential information and non-confidential information, may be displayed to the user in a working state, and in this state, when the user sends the content outward, the content may be automatically encrypted, and The encrypted content received by the terminal is automatically decrypted.
  • a safe working state that is, Any content in the terminal, including confidential information and non-confidential information
  • the terminal determines that the user who performs the operation is a user who does not have a specific authority, for example, a visitor, etc. Then, the working state of the terminal is switched to the non-secure working state, that is, the confidential information in the terminal will be hidden or encrypted, the visitor will not be able to see the confidential information in the terminal, and only a job of browsing non-confidential information can be browsed. Status, and in this state, the content is not encrypted when the user sends the content out, and the encrypted content is not automatically decrypted.
  • the solution of the embodiment of the present invention is: performing biometric identification to obtain the recognition result; when the recognition result is successful, the control working state is the first state; when the recognition result is the recognition failure, the control working state is the first Two states.
  • real-time control and fast switching of the working state are realized by continuing biometric recognition.
  • the user can control the working state by providing or not providing his or her own biometric information, thereby implementing different functions and operating rights.
  • the first state described above is the safe working state in the concept of the present application
  • the second state machine is the non-safe working state in the concept of the present application.
  • the biometric information may be fingerprint information, eye pattern information, iris information, scleral information, facial feature information, voiceprint information, and the like.
  • fingerprint information the user can touch the fingerprint recognition sensor by long press, or touch with a preset frequency, or touch the sensor for a long time, that is, to maintain the above-mentioned long press, or
  • the fingerprint recognition sensor is touched at a preset frequency or touched for a long time
  • the working state of the terminal is maintained in the first state, if the user does not maintain the above-mentioned long press, or touches at a preset frequency, or touches the fingerprint recognition sensor for a long time.
  • the solution of the embodiment of the present invention realizes flexible transition of the working state of the terminal by identifying the preset operation, thereby realizing different functions and operating rights.
  • the method for controlling the working state of the terminal is mainly applied to mobile terminals such as mobile phones and tablets, and can also be applied to computer terminal devices such as notebook computers, desktop computers, and terminal computers.
  • the method includes the following steps S11-S13:
  • step S11 Perform biometric identification to obtain the recognition result. It is judged whether the recognition is successful, when the recognition is successful, step S12 is performed; when the recognition fails, step S13 is performed.
  • the distance is illustrated by the distance.
  • the fingerprint is initially set to enter the first working state when the user touches the human-machine interface for a long time, then the user is always in the preset state.
  • the hold state of the operation that is, confirming that the user's finger is always in the state of touching the human-machine interface, requires the terminal to continuously detect the touch operation of the finger.
  • the terminal may continue biometric recognition at a preset frequency and continuously obtain the recognition result.
  • the frequency of biometric recognition can be set as needed. For example, biometric recognition can be performed every 0.5 seconds, biometric recognition is performed every 1 second, biometric recognition is performed every 5 seconds, and even every Perform biometrics in 10 seconds, and so on.
  • the biometric information may be fingerprint information, eye pattern information, iris information, scleral information, facial feature information, voiceprint information, and the like.
  • the terminal can perform fingerprint recognition through the fingerprint recognition sensor, perform eye pattern recognition, scleral recognition, iris recognition or face recognition through the camera, and perform voiceprint recognition through the voice device.
  • the process of performing biometric identification for the terminal includes the following steps S111-S114:
  • step S111 Collect biometric information. It is determined whether the biometric information is collected this time. When the biometric information is collected, step S112 is performed; when the biometric information is not collected, step S114 is performed.
  • step S112. Compare the biometric information collected in this time with the pre-stored biometric information. It is determined whether the collected biometric information matches the pre-stored biometric information. When the two match, step S113 is performed; when the two do not match, step S114 is performed.
  • the recognition fails.
  • step S12 When the recognition is successful, step S12 is performed; when the recognition fails, step S13 is performed.
  • the control working state is a first state.
  • the terminal When the recognition is successful, if the current working state is the first state, the terminal maintains the current working state; if the current working state is the second state, the terminal switches the working state from the second state to the first state.
  • the terminal encrypts or decrypts the processed information.
  • the terminal encrypts or decrypts the processed information, including:
  • the terminal When the terminal receives the encrypted information, it automatically decrypts the encrypted information; when the terminal sends the information outward, it automatically encrypts the information that needs to be sent out.
  • the terminal grants the operator the first authority, such as the administrator authority, the highest authority, and the like.
  • the control working state is a second state.
  • the terminal When the identification is unsuccessful, if the current working state is the second state, the terminal maintains the current working state; if the current working state is the first state, the terminal switches the working state from the first state to the second state.
  • the working state is the second state
  • the current working state of the terminal is maintained, and the terminal does not encrypt or decrypt the processed information.
  • the terminal does not encrypt or decrypt the processed information, including:
  • the encrypted information is not decrypted; when the terminal sends the information outward, the information that needs to be sent out is not encrypted.
  • the terminal grants the operator a second right, such as a guest right.
  • the method for controlling the working state of the terminal in the embodiment of the present invention realizes real-time control and fast switching of the working state of the terminal by continuously performing biometric identification. Users can control their working status by providing or not providing their own biometric information, thus implementing different functions and operating rights.
  • the terminal is unlocked and used by another person, the working state is switched because the terminal cannot acquire the biometric information of the user, so the other person cannot view the confidential information of the user. Thereby ensuring the security of the information and ensuring the convenience of operation.
  • the method of the embodiment of the present invention will be described in detail by taking the biometric information as the fingerprint information as an example.
  • a second embodiment of a method for controlling an operating state of a terminal in an embodiment of the present invention includes steps S21-S26:
  • the fingerprint recognition sensor continuously performs fingerprint recognition at a preset frequency, and notifies the processing module of the fingerprint recognition result obtained by each fingerprint recognition in real time.
  • the Sensor Hub (or coprocessor) technology can be used to keep the fingerprint sensor in a continuous awake state to reduce power consumption.
  • the fingerprint recognition sensor when the fingerprint recognition sensor is triggered (or awakened) by sensing the touch operation, the fingerprint recognition is continuously performed at the preset frequency until the fingerprint information is not collected, and the fingerprint recognition operation is stopped; When it is triggered by the touch operation, the next round of fingerprint recognition is performed, and the loop is performed accordingly.
  • each round of fingerprint recognition operation performs fingerprint recognition at least twice. For example, when the user touches the fingerprint recognition sensor and immediately releases it, the fingerprint recognition sensor only needs to perform fingerprint recognition twice to stop the current fingerprint recognition operation. . By adopting such a method of fingerprint recognition, the fingerprint recognition sensor only needs to work intermittently without continuous work, thereby reducing energy consumption.
  • the frequency of fingerprint recognition can be set as needed. For example, fingerprint recognition can be performed every 0.5 seconds, fingerprint recognition is performed every 1 second, fingerprint recognition is performed every 5 seconds, and even every 10 seconds. Fingerprint recognition, and more.
  • the fingerprint recognition sensor When the fingerprint recognition sensor performs fingerprint recognition, the fingerprint information is continuously collected at a preset frequency, and each time the fingerprint information is collected, a judgment and comparison is performed, and the fingerprint recognition result is obtained. As shown in FIG. 4, the process of performing fingerprint recognition for the fingerprint recognition sensor includes the following steps S211-S214:
  • step S211 Collect fingerprint information. It is determined whether the fingerprint information is collected this time. When the fingerprint information is collected, step S212 is performed; when the fingerprint information is not collected, step S214 is performed.
  • step S212 Compare the fingerprint information collected in this time with the pre-stored fingerprint information. It is determined whether the collected fingerprint information matches the pre-stored fingerprint information. When the two match, step S213 is performed; when the two do not match, step S214 is performed.
  • the fingerprint recognition sensor is the user's finger
  • the fingerprint information collected by the fingerprint recognition sensor matches the pre-stored user's fingerprint information, and the fingerprint recognition is successful.
  • the fingerprint recognition sensor When the fingerprint recognition sensor is not touched by the finger or the finger of the fingerprint recognition sensor is not the user's finger, the fingerprint recognition sensor cannot collect the fingerprint information or the collected fingerprint information does not match the fingerprint information of the pre-stored user, and the fingerprint recognition fails.
  • the processing module is notified of the current fingerprint recognition result in real time.
  • the fingerprint recognition sensor can directly send the fingerprint recognition result to the processing module.
  • the fingerprint recognition sensor can notify the fingerprint recognition result by sending a pulse signal to the processing module, and different fingerprint recognition results correspond to different pulse signals.
  • the fingerprint recognition sensor may notify the processing module of the fingerprint recognition result by modifying the status identifier of the status register: the fingerprint recognition sensor marks the status identifier of the status register according to the fingerprint recognition result obtained by each fingerprint identification in real time, and the processing module
  • the preset frequency reads the status identifier of the status register, and obtains the fingerprint identification result according to the status identifier.
  • the frequency at which the processing module reads the status identifier is preferably the same as the frequency at which the fingerprint recognition sensor performs fingerprint recognition, and may of course be different.
  • the fingerprint recognition sensor marks the status of the status register as a safe status (eg, the data of the modified status register is 1); when the fingerprint recognition fails, the fingerprint identification sensor marks the status of the status register as normal. Status (such as modifying the status register data to 0).
  • the processing module reads the status identifier of the status register. When the status identifier is in the security status, the fingerprint identification is successful. When the status identifier is in the normal status, the fingerprint identification fails.
  • the embodiment of the present invention defines a state identifier as a security state and a normal state, and those skilled in the art It can be understood that the status identifier can also be defined as other names for equivalent replacement, for example, the first state and the second state, and the like, and the same is within the protection scope of the embodiment of the present invention.
  • step S22 The processing module acquires a fingerprint identification result. It is determined whether the fingerprint identification is successful. When the fingerprint recognition is successful, step S23 is performed; when the fingerprint recognition fails, step S25 is performed.
  • the processing module controls the working state to be a safe state.
  • the embodiment of the present invention defines the working state as a safe state and a normal state, that is, the above-mentioned safe working state and non-safe working state.
  • the processing module determines that the working state is a safe state; if the current working state of the terminal is a safe state, the current working state is maintained; if the current working state of the terminal is a normal state, the switching to the safe state.
  • working state can also be defined as other names for equivalent replacement, for example, the first state and the second state, and the like, and the same is within the protection scope of the embodiment of the present invention.
  • the processing module runs in a safe state, and the encryption and decryption module is enabled to encrypt or decrypt the processed information.
  • the processing module starts the encryption and decryption module.
  • the processing module sends the information input by the user to the encryption and decryption module for encryption, and then stores the encrypted information locally or externally; when the user invokes the information, the processing module sends the information invoked by the user.
  • the encryption and decryption module is decrypted, and then the decrypted information is output.
  • the information called can be encrypted information obtained externally or locally. Calling information refers to opening, playing, viewing, reading, writing, modifying, deleting, starting, or parsing related files or programs.
  • the content of the information includes text, numbers, symbols, sounds, images, videos, and the like, such as text files, video files, audio files, image files, live chat information, mail information, and the like.
  • the processing module controls the working state to be a normal state.
  • the processing module determines that the working state is a normal state; if the current working state of the terminal is a normal state, the current working state is maintained; if the current working state of the terminal is a safe state, the switching to the normal state.
  • the processing module runs in a normal state, and the encryption and decryption module is turned off, and the processed information is not encrypted or decrypted.
  • the processing module closes the encryption and decryption module.
  • the processing module does not perform the encryption operation; at the same time, the processing module does not perform the decryption operation for the encrypted information. That is to say, in the normal state, the user cannot call the encrypted information, nor can the encrypted information be encrypted.
  • the method for controlling the working state of the terminal in the embodiment of the invention realizes real-time control and fast switching of the working state by continuously performing fingerprint recognition.
  • the user can touch the fingerprint recognition sensor by long press, or touch with a preset frequency, or touch the sensor for a long time as a trigger operation signal for quickly switching the working state of the terminal, that is, while maintaining the long press or touching at a preset frequency, Or when the fingerprint recognition sensor is touched for a long time, the working state of the terminal is maintained in the first state. If the user does not maintain the long press, or touches at a preset frequency, or touches the fingerprint recognition sensor for a long time, the terminal is The working state is maintained in the second state.
  • the solution of the embodiment of the present invention realizes flexible transition of the working state of the terminal by identifying the preset operation, thereby realizing different functions and operating rights.
  • the state switching occurs because the user's finger no longer touches the fingerprint recognition sensor, so others cannot view the user's confidential information. Thereby ensuring the security of the information and ensuring the convenience of operation.
  • the method for controlling the working state of the terminal in the embodiment of the invention realizes the function of rapidly increasing and canceling the encryption and decryption by continuously performing fingerprint recognition.
  • confidential information such as bank card information, private information, image information, etc.
  • the fingerprint recognition sensor can be quickly switched to the safe state by touching the finger, and the terminal immediately
  • the confidential information is encrypted and then sent.
  • the encrypted information When the encrypted information is received, the encrypted information must be correctly read by the user's finger touching the fingerprint recognition sensor to switch to the secure state.
  • the fast encryption and decryption of confidential information is realized, and the security of information and the convenience of operation are improved.
  • a third embodiment of a method for controlling the working state of a terminal according to an embodiment of the present invention is provided.
  • the method includes steps S31-S36:
  • the fingerprint recognition sensor continuously performs fingerprint recognition at a preset frequency, and notifies the processing module of the fingerprint recognition result obtained by each fingerprint recognition in real time.
  • step S32 The processing module obtains a fingerprint identification result. It is judged whether the fingerprint identification is successful. When the fingerprint recognition is successful, step S33 is performed; when the fingerprint recognition fails, step S35 is performed.
  • steps S31 and S32 are the same as steps S21 and S22 in the first embodiment, and details are not described herein again.
  • the processing module controls the working state to be a safe state.
  • the processing module determines that the working state is a safe state; if the terminal is currently The working state is a safe state, and the current working state is maintained; if the current working state of the terminal is a normal state, the state is switched to a safe state.
  • the processing module runs in a safe state, and grants the operator the first authority.
  • two operation rights of the first authority and the second authority are defined for the terminal.
  • the first authority is equivalent to the administrator authority obtained by logging in through the administrator account, and is the highest operation authority, for example, all the information in the terminal can be invoked;
  • the second authority is equivalent to the visitor authority obtained by logging in through the guest account, and is the next level.
  • Operation rights for example, can only call general information in the terminal.
  • the processing module grants the current operator the first authority, and the current operator can invoke all the information in the terminal as an administrator, for example, can perform operations such as reading, modifying, and deleting all files in the terminal. .
  • the processing module controls the working state to be a normal state.
  • the processing module determines that the working state is a normal state; if the current working state of the terminal is a normal state, the current working state is maintained; if the current working state of the terminal is a safe state, the switching to the normal state.
  • the processing module runs in a normal state, and grants the operator the second authority.
  • the processing module grants the current operator the second authority, and the current operator can only call the ordinary information in the terminal as a guest identity, for example, can only read, modify, delete, etc. the ordinary file in the terminal. Operation, or can only perform read operations on ordinary files.
  • the method for controlling the working state of the terminal in the embodiment of the invention realizes the rapid conversion of the operation authority by continuously performing fingerprint recognition.
  • the user touches the fingerprint recognition sensor the user switches to the safe state, the operator obtains the highest operation authority, and can operate the confidential information;
  • the user no longer touches the fingerprint recognition sensor the user switches to the normal state, and the operator obtains the second-level operation authority. , can not operate confidential information.
  • the convenience of operation and the security of information are guaranteed.
  • the foregoing second and third embodiments describe the method of the embodiment of the present invention by taking the biometric information as the fingerprint information as an example.
  • the biometric information is the eye pattern information, the iris information, the sclera information, the facial feature information, and the voiceprint information.
  • the implementation method is similar to the fingerprint information, and the details are not listed here.
  • the device includes a biometric identification module 10, a processing module 20, a status register 30, and an encryption and decryption module 40, wherein:
  • the biometric identification module 10 is configured to continuously perform biometric recognition to obtain a recognition result.
  • the biometric identification module 10 continuously collects biometric information for biometric recognition at a preset frequency, and notifies the processing module 20 of the recognition result obtained by each biometric identification in real time.
  • the frequency at which the biometric identification module 10 performs biometric identification can be set as needed.
  • the processing module 20 is configured to control the working state according to the recognition result.
  • the control working state is the first state; when the recognition result is the recognition failure, the control working state is the second state.
  • Status register 30 Set to store the status identification.
  • Encryption and decryption module 40 set to encrypt or decrypt information.
  • the biometric information may be fingerprint information, eye pattern information, iris information, scleral information, facial feature information, voiceprint information, and the like.
  • the biometric identification module 10 can perform fingerprint recognition through a fingerprint recognition sensor, perform eye mark recognition, scleral recognition, iris recognition or face recognition through a camera, and perform voiceprint recognition through a voice device.
  • the Sensor Hub (or coprocessor) technology can be used to keep the biometric module 10 in a continuous awake state to reduce power consumption.
  • the biometric identification module 10 when the biometric identification module 10 is triggered (or awakened) by sensing the touch operation by the fingerprint recognition sensor, the fingerprint recognition is continuously performed at a preset frequency until no collection is performed. When the fingerprint information is reached, the fingerprint recognition operation of the current round is stopped; when the touch operation is triggered again, the next round of fingerprint recognition is performed, and the loop is performed accordingly.
  • the biometric identification module 10 only needs to work intermittently without continuous work, thereby reducing energy consumption.
  • the biometric identification module 10 includes an acquisition unit 101, a storage unit 102, a determination unit 103, a comparison unit 104, and a notification unit 105, wherein:
  • the collecting unit 101 is configured to collect fingerprint information.
  • the fingerprint information is continuously collected at a preset frequency, and the collected data is sent to the judging unit 103 every time the fingerprint information is collected.
  • the storage unit 102 is configured to store biometric information of the user collected by the collection unit 101 as a reference value for subsequent biometric identification.
  • the determining unit 103 is configured to: after the collecting unit 101 performs the biometric information collection, receive the data sent by the collecting unit 101, and determine whether the biometric information is collected this time; When the biometric information is collected, the current identification failure is determined, and the current recognition result is sent to the notification unit 105. When the biometric information is collected, the biometric information collected this time is sent to the comparison unit 104.
  • the matching unit 104 is configured to compare the biometric information collected in this time with the biometric information stored in the storage unit 102 to determine whether the two match; when the two match, the current identification is successful; If the match does not match, it is determined that the recognition failed. At the same time, the current recognition result is sent to the notification unit 105.
  • the notification unit 105 is configured to notify the processing module 20 of the recognition result obtained by the biometric identification in real time, that is, the frequency notified by the notification unit 105 is the same as the frequency of the biometric identification, and each time the biometric recognition is performed, the processing is performed. Module 20 notifies the recognition result once.
  • the notification unit 105 notifies the processing module 20 of the recognition result by modifying the state identifier of the status register 30, and the notification unit 105 marks the status identifier of the status register 30 according to the recognition result obtained by each biometric identification in real time.
  • the processing module 20 is caused to acquire the recognition result by reading the status identifier. For example, when the recognition is successful, the notification unit 105 marks the status of the status register as a secure status (eg, the data of the modified status register 30 is 1); when the recognition fails, the notification unit 105 marks the status of the status register 30 as normal. Status (eg, the data in the modified status register 30 is 0).
  • the processing module 20 includes a central processing unit 201 and a status determining unit 202, wherein:
  • the state determining unit 202 is configured to read the state identifier of the state register 30, obtain the recognition result according to the state identifier, and determine the corresponding working state according to the recognition result.
  • the frequency at which the state determination unit 202 reads the state identification is preferably the same as the frequency at which the biometric identification module 10 performs biometric identification, and may of course be different.
  • the state determining unit 202 reads the state identifier of the state register 30, and when the state identifier is the security state, it is known that the recognition is successful; when the state identifier is the normal state, the recognition fails.
  • the embodiment of the present invention defines an operating state as a first state (or a safe state) and a second state (or a normal state).
  • the state determining unit 202 determines that the working state is the first state; if the current working state of the terminal is the first state, maintaining the current working state; if the current working state of the terminal is the second state, switching to the first state A state, and the encryption and decryption module 40 is started.
  • the state determining unit 202 determines that the working state is the second state; if the terminal If the current working state is the second state, the current working state is maintained; if the current working state of the terminal is the first state, the mode is switched to the second state, and the encryption and decryption module 40 is turned off.
  • the central processing unit 201 is configured to encrypt or decrypt the processed information by using the encryption/decryption module 40 when the working state is the first state; when the working state is the second state, the processed information is not encrypted or decrypted.
  • the central processing unit 201 sends the information input by the user to the encryption and decryption module 40 for encryption, and then stores the encrypted information locally or outwardly; when the user invokes the information, The central processing unit 201 sends the information called by the user to the encryption/decryption module 40 for decryption, and then outputs the decrypted information.
  • the information called can be encrypted information obtained externally or locally. Calling information refers to opening, playing, viewing, reading, writing, modifying, deleting, starting, or parsing related files or programs.
  • the central processor 201 does not perform an encryption operation on the information input by the user; meanwhile, the decryption operation is not performed by the central processing unit for the encrypted information. That is to say, in the second state, the user cannot call the encrypted information, nor can the encrypted information be encrypted.
  • the content of the information includes text, numbers, symbols, sounds, images, videos, and the like, such as text files, video files, audio files, image files, live chat information, mail information, and the like.
  • the device for controlling the working state of the terminal realizes real-time control and fast switching of the working state of the terminal by continuously performing biometric identification. Users can control their working status by providing or not providing their own biometric information, thus implementing different functions and operating rights.
  • the terminal is unlocked and used by another person, the working state is switched because the terminal cannot acquire the biometric information of the user, so the other person cannot view the confidential information of the user. Thereby ensuring the security of the information and ensuring the convenience of operation.
  • the user can touch the fingerprint recognition sensor by long press, or touch with a preset frequency, or touch the sensor for a long time as a trigger operation signal for quickly switching the working state of the terminal, that is, while maintaining the above
  • the working state of the terminal is maintained in the first state, if the user does not maintain the long press, or touches at a preset frequency, or for a long time.
  • the fingerprint recognition sensor is touched, the working state of the terminal is maintained in the second state.
  • the device for controlling the working state of the terminal in the embodiment of the invention can quickly increase and cancel the encryption and decryption functions by continuously performing fingerprint recognition.
  • confidential information such as bank card information, private information, image information, etc.
  • the fingerprint recognition sensor can be quickly switched to the safe state by touching the finger, and the terminal immediately
  • the confidential information is encrypted and then sent.
  • the encrypted information When the encrypted information is received, the encrypted information must be correctly read by the user's finger touching the fingerprint recognition sensor to switch to the secure state.
  • the fast encryption and decryption of confidential information is realized, and the security of information and the convenience of operation are improved.
  • FIG. 9 a second embodiment of the apparatus for controlling the working state of the terminal in the embodiment of the present invention is proposed.
  • the difference between this embodiment and the first embodiment is that the status register 30 is omitted.
  • the manner in which the biometric identification module 10 notifies the processing module 20 of the recognition result is to directly send the recognition result to the processing module 20: the notification unit 105 of the biometric identification module 10 sends the information carrying the recognition result to the processing module 20, and processes The state determining unit 202 of the module 20 receives the information carrying the recognition result, and acquires the recognition result.
  • the notification unit 105 may notify the recognition result by transmitting a pulse signal to the state determination unit 202, and the different recognition results correspond to different pulse signals.
  • This notification mode reduces the read operation of the notification unit 105 and the state determination unit 202, and can reduce the system load to some extent.
  • a third embodiment of the apparatus for controlling the working state of the terminal in the embodiment of the present invention is provided.
  • the difference between this embodiment and the first embodiment is that the encryption and decryption module 40 is omitted.
  • the first authority is equivalent to the administrator authority, and is the highest operation authority, for example, all the information in the terminal can be invoked;
  • the second authority is equivalent to the guest authority, and is the second-level operation authority, for example, the general information in the terminal can only be called.
  • the processing module 20 is configured to: when the recognition is successful, control the working state to be the first state, run in the first state, and grant the operator the first authority; when the recognition fails, the control working state is the second state. Running in the second state grants the operator a second privilege.
  • the central processor 201 of the processing module 20 grants the current operator the first authority, and the current operator can invoke all the information in the terminal as an administrator, such as All files in the terminal perform operations such as reading, modifying, and deleting.
  • the central processing unit 201 of the processing module 20 grants the current operator the second authority, and the current operator can only invoke the general information in the terminal as a guest, such as only performing ordinary files in the terminal. Read, modify, delete, etc., or can only perform read operations on ordinary files.
  • the device for controlling the working state of the terminal in the embodiment of the invention realizes the rapid conversion of the operation authority by continuously performing biometric identification.
  • biometric information such as a touch fingerprint recognition sensor
  • the working state is controlled to the first state, the operator obtains the highest operating authority, and the confidential information can be operated; when the user no longer provides biometric information (such as a touch fingerprinting sensor)
  • the control state is the second state, the operator obtains the second-level operation authority and cannot operate the confidential information. The convenience of operation and the security of information are guaranteed.
  • a fourth embodiment of the apparatus for controlling the working state of the terminal in the embodiment of the present invention is proposed.
  • the difference between this embodiment and the third embodiment is that the status register 30 is omitted.
  • the manner in which the biometric identification module 10 notifies the processing module 20 of the recognition result is to directly send the recognition result to the processing module 20: the notification unit 105 of the biometric identification module 10 sends the information carrying the recognition result to the processing module 20, and processes The state determining unit 202 of the module 20 receives the information carrying the recognition result, and acquires the recognition result.
  • the notification unit 105 may notify the recognition result by transmitting a pulse signal to the state determination unit 202, and the different recognition results correspond to different pulse signals.
  • This notification mode reduces the read operation of the notification unit 105 and the state determination unit 202, and can reduce the system load to some extent.
  • the apparatus for controlling the working state of the terminal provided by the foregoing embodiment is the same as the method embodiment for controlling the working state of the terminal, and the implementation process thereof is described in detail in the method embodiment, and the technical features in the method embodiment are in the device embodiment. The corresponding applies in the middle, and will not be described here.
  • the device for controlling the working state of the terminal in the embodiment of the present invention is mainly applied to mobile terminals such as mobile phones and tablets, and can also be applied to computer terminal devices such as notebook computers, desktop computers, and terminal computers.
  • the technical solution of the present invention may be in the form of a software product in essence or in part contributing to the prior art.
  • the computer software product is stored in a storage medium (such as ROM/RAM, disk, CD), and includes a plurality of instructions for making a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device). Etc.) Performing the methods described in various embodiments of the invention.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the method of controlling the operational state of the terminal.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the scheme of the embodiment of the invention realizes real-time control and fast switching of the working state of the terminal by continuously performing biometric identification. Users can control their working status by providing or not providing their own biometric information, thus implementing different functions and operating rights.
  • the terminal is unlocked and used by another person, the working state is switched because the terminal cannot acquire the biometric information of the user, so the other person cannot view the confidential information of the user. Thereby ensuring the security of the information and ensuring the convenience of operation.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

本申请公开了一种控制终端工作状态的方法和装置,所述方法包括:持续进行生物特征识别获得识别结果;当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。

Description

一种控制终端工作状态的方法和装置 技术领域
本申请涉及但不限于通信技术领域,尤其涉及一种控制终端工作状态的方法和装置。
背景技术
随着指纹识别技术的逐渐成熟,指纹识别功能已开始广泛应用于终端设备,特别是手机、平板等移动终端。由于指纹是独一无二的生物特征属性,因此安全性较高。目前,指纹识别在终端中主要用于解锁,当终端处于锁屏状态时,用户手指触摸一下指纹识别传感器,指纹识别传感器进行一次指纹识别,当指纹识别成功后则解锁进入主界面。因此,当终端处于锁屏状态时,他人无法解锁终端,进而无法获取终端中的信息。然而,当用户对终端解锁后,他人使用该终端时,则可以随意查看终端中的信息,导致终端中的保密信息有泄露的风险,不能保证信息的安全。
虽然可以通过在终端上设置管理员(Administrator)帐户和访客(Guest)账户的方式来限制访客的操作权限,进而保证保密信息的安全。然而,在进行操作权限的切换时,需要退出当前登录的管理员或访客帐户,重新以访客或管理员帐户登录,因此操作极其不便。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例的主要目的在于提供一种控制终端工作状态的方法和装置,旨在提高信息的安全性和操作的便捷性。
一种控制终端工作状态的方法,包括:
持续进行生物特征识别获得识别结果。
当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。
可选地,所述持续进行生物特征识别获得识别结果包括:
持续采集生物特征信息,每进行一次生物特征信息采集后,判断本次是 否采集到生物特征信息。
当没有采集到生物特征信息时,判定本次识别失败。
当采集到生物特征信息时,将本次采集到的生物特征信息与所述存储单元中存储的生物特征信息进行比对,判断本次采集到的生物特征信息与预存的生物特征信息是否匹配。
当本次采集到的生物特征信息与预存的生物特征信息匹配时,判定本次识别成功;当本次采集到的生物特征信息与预存的生物特征信息不匹配时,判定本次识别失败。
可选地,所述方法还包括:
当工作状态为第一状态时,对处理的信息进行加密或解密。
当工作状态为第二状态时,不对处理的信息进行加密或解密。
可选地,
对处理的信息进行加密或解密包括:当所述终端接收到加密信息时,为所述加密信息解密;当所述终端向外发送信息时,为需要向外发送的信息加密。
不对处理的信息进行加密或解密包括:当所述终端接收到加密信息时,不为所述加密信息解密;当所述终端向外发送信息时,不为需要向外发送的信息加密。
可选地,所述方法还包括:
当工作状态为第一状态时,授予操作者第一权限。
当工作状态为第二状态时,授予操作者第二权限。
可选地,所述生物特征信息包括:指纹信息、眼纹信息、虹膜信息、巩膜信息、面部特征信息或声纹信息。
可选地,所述方法还包括:
实时根据每次生物特征识别获得的识别结果标记状态标识。
读取所述状态标识,根据所述状态标识获取识别结果,当识别结果为识别成功时,确定工作状态为第一状态;当识别结果为识别失败时,确定工作状态为第二状态。
一种控制终端工作状态的装置,包括:
生物特征识别模块,设置为持续进行生物特征识别获得识别结果;
处理模块,设置为当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。
可选地,所述生物特征识别模块包括采集单元、存储单元、判断单元和比对单元:
所述采集单元,设置为持续采集生物特征信息。
所述判断单元,设置为每进行一次生物特征信息采集后,判断本次是否采集到生物特征信息;当没有采集到生物特征信息时,判定本次识别失败;当采集到生物特征信息时,将本次采集到的生物特征信息发送给所述比对单元。
所述比对单元,设置为将本次采集到的生物特征信息与所述存储单元中存储的生物特征信息进行比对判断本次采集到的生物特征信息与预存的生物特征信息是否匹配;当本次采集到的生物特征信息与预存的生物特征信息匹配时,判定本次识别成功;当本次采集到的生物特征信息与预存的生物特征信息不匹配时,判定本次识别失败。
可选地,所述装置还包括加解密模块,所述处理模块设置为:
当工作状态为第一状态时,启动所述加解密模块对处理的信息进行加密或解密。
当工作状态为第二状态时,关闭所述加解密模块不对处理的信息进行加密或解密。
可选地,
加解密模块对处理的信息进行加密或解密包括:当终端接收到加密信息时,为所述加密信息解密;当终端向外发送信息时,为需要向外发送的信息加密;
加解密模块不对处理的信息进行加密或解密包括:当终端接收到加密信息时,不为所述加密信息解密;当终端向外发送信息时,不为需要向外发送的信息加密。
可选地,所述处理模块设置为:
当工作状态为第一状态时,授予操作者第一权限。
当工作状态为第二状态时,授予操作者第二权限。
可选地,所述生物特征信息包括:指纹信息、眼纹信息、虹膜信息、巩 膜信息、面部特征信息和声纹信息。
可选地,所述生物特征识别模块包括通知单元,所述处理模块包括状态确定单元,所述装置还包括状态寄存器。
所述通知单元设置为:实时根据每次生物特征识别获得的识别结果标记所述状态寄存器的状态标识。
所述状态确定单元设置为:读取所述状态寄存器的状态标识,根据所述状态标识获取识别结果,当识别结果为识别成功时,确定工作状态为第一状态;当识别结果为识别失败时,确定工作状态为第二状态。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的控制终端工作状态的方法。
本发明实施例所提供的一种本发明控制终端工作状态的方法,通过持续进行生物特征识别,实现了对终端的工作状态的实时控制和快速切换。用户可以通过提供或不予提供自己的生物特征信息来控制工作状态,进而实现不同的功能和操作权限。当终端解锁后被他人使用时,由于终端不能获取用户的生物特征信息而发生了工作状态切换,因此他人不能查看用户的保密信息。从而既保证了信息的安全性,又保证了操作的便捷性。
附图概述
图1是本发明实施例中控制终端工作状态的方法第一实施例的流程图;
图2是本发明实施例中终端进行生物特征识别的流程图;
图3是本发明实施例中控制终端工作状态的方法第二实施例的流程图;
图4是本发明实施例中指纹识别传感器进行指纹识别的流程图;
图5是本发明实施例中控制终端工作状态的方法第三实施例的流程图;
图6是本发明实施例中控制终端工作状态的装置第一实施例的模块示意图;
图7是本发明实施例控制终端工作状态的装置的生物特征识别模块的模块示意图;
图8是本发明实施例控制终端工作状态的装置的处理模块的模块示意图;
图9是本发明实施例控制终端工作状态的装置的第二实施例的模块示意图;
图10是本发明实施例控制终端工作状态的装置的第三实施例的模块示意图;
图11是本发明实施例控制终端工作状态的装置的第四实施例的模块示意图。
本发明的实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例控制终端工作状态的方法,其总的构思为:检测施加在终端人机界面上的预设操作,例如,对人机界面的一个持续的按压操作或触摸操作,即,在人机界面上实施的一个按压操作或触摸操作需持续一个预定的时间值,或者,该预设操作还可以是人体特征的识别操作;对于该预设操作不做具体限制。在检测到人机界面上的这个预设操作后,判定实施该操作的用户为具有特定权限的用户,例如,管理员,机主等,则将终端的工作状态转换到安全工作状态下,即,终端中的任何内容,包括保密信息和非保密信息都可以向该用户展示的一种工作状态,并且,在该状态下,当用户向外发送内容时可以自动为发送内容进行加密,并且对于该终端接收到的加密内容自动解密。反之,当终端未检测到该预设操作时,或者当终端检测到的操作不是上述的预设操作时,终端将会判定实施该操作的用户为不具有特定权限的用户,例如,访客等,则将终端的工作状态转换到非安全工作状态下,即,终端中的保密信息将会隐藏,或加密,该游客将无法看到终端中的保密信息,仅可以浏览非保密信息的一种工作状态,并且在该状态下,当用户向外发送内容时不会对发送内容进行加密,对于接收到的加密内容也不会自动解密。
基于上述构思,本发明实施例的方案为:持续进行生物特征识别获得识别结果;当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。从而,通过持续进行生物特征识别,实现了工作状态的实时控制和快速切换。换句话说,用户可以通过提供或不予提供自己的生物特征信息来控制工作状态,进而实现不同的功能和操作权限。
在本发明实施例中,上述的第一状态即本申请构思中的安全工作状态,第二状态机本申请构思中的非安全工作状态。
其中,生物特征信息可以是指纹信息、眼纹信息、虹膜信息、巩膜信息、面部特征信息、声纹信息等。以指纹信息为例,用户可以通过长按、或以预设频率触摸、或长时间触摸指纹识别传感器作为对终端的工作状态进行快速切换的触发操作信号,即,在保持上述的长按、或以预设频率触摸、或长时间触摸指纹识别传感器时,则将终端的工作状态保持在第一状态,如果用户不保持上述的长按、或以预设频率触摸、或长时间触摸指纹识别传感器时,则将终端的工作状态保持在第二状态,本发明实施例方案通过对预设操作的识别,实现了终端工作状态的灵活转变,从而实现了不同的功能和操作权限。
本发明控制终端工作状态的方法,主要应用于手机、平板等移动终端,也可以应用于笔记本电脑、台式电脑、终端机等计算机终端设备。
以下将通过实施例进行详细说明。
参见图1,提出本发明实施例控制终端工作状态的方法第一实施例,所述方法包括以下步骤S11-S13:
S11、持续进行生物特征识别获得识别结果。判断是否识别成功,当识别成功时,执行步骤S12;当识别失败时,执行步骤S13。
下面通过距离进行说明,在本发明实施例中,例如,对于指纹来说,如果最初设置为当用户长时间触摸人机界面时,则终端进入第一工作状态,那么为了确保用户一直处于预设操作的保持状态,即,确认用户手指一直处于触摸人机界面的状态,则需要终端对该手指的触摸操作进行持续检测。
可选地,终端可以以预设频率持续进行生物特征识别,并持续获得识别结果。进行生物特征识别的频率可以根据需要设定,例如,可以设定每隔0.5秒进行一次生物特征识别,每隔1秒进行一次生物特征识别,每隔5秒进行一次生物特征识别,甚至每隔10秒进行一次生物特征识别,等等。
生物特征信息可以是指纹信息、眼纹信息、虹膜信息、巩膜信息、面部特征信息、声纹信息等。终端可以通过指纹识别传感器进行指纹识别,通过摄像头进行眼纹识别、巩膜识别、虹膜识别或人脸识别,通过语音装置进行声纹识别。
终端进行生物特征识别时,以预设频率持续采集生物特征信息,每采集一次生物特征信息后便进行一次判断和比对,获得本次的识别结果。如图2所示,为终端进行一次生物特征识别的过程,包括以下步骤S111-S114:
S111、采集生物特征信息。判断本次是否采集到生物特征信息,当采集到生物特征信息时,执行步骤S112;当没有采集到生物特征信息时,执行步骤S114。
S112、将本次采集到的生物特征信息与预存的生物特征信息进行比对。判断采集到的生物特征信息与预存的生物特征信息是否匹配,当二者匹配时,执行步骤S113;当二者不匹配时,执行步骤S114。
S113、判定本次识别成功。
当终端采集到的生物特征信息与预存的用户的生物特征信息相匹配,识别成功。
S114、判定本次识别失败。
当终端没有采集到生物特征信息或采集到的生物特征信息与预存的用户的生物特征信息不匹配,识别失败。
当识别成功时,执行步骤S12;当识别失败时,执行步骤S13。
S12、控制工作状态为第一状态。
,当识别成功时,如果当前的工作状态为第一状态,终端则保持当前的工作状态;如果当前的工作状态为第二状态,终端则将工作状态从第二状态切换为第一状态。
可选地,当工作状态为第一状态时,终端对处理的信息进行加密或解密。
可选地,终端对处理的信息进行加密或解密包括:
当该终端接收到加密信息时,自动为所述加密信息解密;当该终端向外发送信息时,自动为需要向外发送的信息加密。
可选地,当工作状态为第一状态时,终端授予操作者第一权限,如管理员权限、最高权限等。
S13、控制工作状态为第二状态。
当识别不成功时,如果当前的工作状态为第二状态,终端则保持当前的工作状态;如果当前的工作状态为第一状态,终端则将工作状态从第一状态切换为第二状态。
可选地,当工作状态为第二状态时,保持所述终端的当前工作状态,终端不对处理的信息进行加密或解密。
可选地,终端不对处理的信息进行加密或解密包括:
当该终端接收到加密信息时,不为所述加密信息解密;当该终端向外发送信息时,不为需要向外发送的信息加密。
可选地,当工作状态为第二状态时,终端授予操作者第二权限,如访客权限等。
本发明实施例控制终端工作状态的方法,通过持续进行生物特征识别,实现了对终端的工作状态的实时控制和快速切换。用户可以通过提供或不予提供自己的生物特征信息来控制工作状态,进而实现不同的功能和操作权限。当终端解锁后被他人使用时,由于终端不能获取用户的生物特征信息而发生了工作状态切换,因此他人不能查看用户的保密信息。从而既保证了信息的安全性,又保证了操作的便捷性。
以下以生物特征信息为指纹信息为例,对本发明实施例的方法进行详细说明。
参见图3,提出本发明实施例中控制终端工作状态的方法第二实施例,所述方法包括步骤S21-S26:
S21、指纹识别传感器以预设频率持续进行指纹识别,并实时向处理模块通知每次指纹识别获得的指纹识别结果。
可选地,可以采用Sensor Hub(或协处理器)技术保持指纹识别传感器处于持续唤醒状态,以降低能耗。
可选地,当指纹识别传感器感应到触摸操作而被触发(或唤醒)时,立即以预设频率持续进行指纹识别,直到没有采集到指纹信息时,才停止本轮指纹识别操作;当再次感应到触摸操作而被触发时,再进行下一轮指纹识别,依此循环进行。此种情形下,每轮指纹识别操作至少进行两次指纹识别,如当用户触摸一下指纹识别传感器后立即放开时,指纹识别传感器就只需进行两次指纹识别后则停止本轮指纹识别操作。通过采取这种轮番指纹识别的方式,使得指纹识别传感器只需间隙性工作而无需持续工作,降低了能耗。
进行指纹识别的频率可以根据需要设定,例如,可以设定每隔0.5秒进行一次指纹识别,每隔1秒进行一次指纹识别,每隔5秒进行一次指纹识别,甚至每隔10秒进行一次指纹识别,等等。
指纹识别传感器进行指纹识别时,以预设频率持续采集指纹信息,每采集一次指纹信息后便进行一次判断和比对,获得本次的指纹识别结果。如图 4所示,为指纹识别传感器进行一次指纹识别的过程,包括以下步骤S211-S214:
S211、采集指纹信息。判断本次是否采集到指纹信息,当采集到指纹信息时,执行步骤S212;当没有采集到指纹信息时,执行步骤S214。
S212、将本次采集到的指纹信息与预存的指纹信息进行比对。判断采集到的指纹信息与预存的指纹信息是否匹配,当二者匹配时,执行步骤S213;当二者不匹配时,执行步骤S214。
S213、判定本次指纹识别成功。
当触摸指纹识别传感器的是用户的手指时,则指纹识别传感器采集到的指纹信息与预存的用户的指纹信息相匹配,指纹识别成功。
S214、判定本次指纹识别失败。
当没有手指触摸指纹识别传感器或触摸指纹识别传感器的不是用户的手指时,指纹识别传感器则不能采集到指纹信息或采集到的指纹信息与预存的用户的指纹信息不匹配,指纹识别失败。
指纹识别传感器每进行一次指纹识别,都实时向处理模块通知本次的指纹识别结果。
可选地,指纹识别传感器可以直接向处理模块发送指纹识别结果。例如,指纹识别传感器可以通过向处理模块发送脉冲信号的方式通知指纹识别结果,不同的指纹识别结果对应不同的脉冲信号。
可选地,指纹识别传感器可以通过修改状态寄存器的状态标识的方式来向处理模块通知指纹识别结果:指纹识别传感器实时根据每次指纹识别获得的指纹识别结果标记状态寄存器的状态标识,处理模块以预设频率读取状态寄存器的状态标识,根据状态标识获取指纹识别结果。处理模块读取状态标识的频率优选与指纹识别传感器进行指纹识别的频率相同,当然也可以不同。
例如,当指纹识别成功时,指纹识别传感器则标记状态寄存器的状态标识为安全状态(如修改状态寄存器的数据为1);当指纹识别失败时,指纹识别传感器则标记状态寄存器的状态标识为普通状态(如修改状态寄存器的数据为0)。处理模块读取状态寄存器的状态标识,当状态标识为安全状态时,得知指纹识别成功;当状态标识为普通状态时,得知指纹识别失败。
本发明实施例将状态标识定义为安全状态和普通状态,本领域技术人员 可以理解,也可以将状态标识定义为其它名称进行等同替换,例如定义为第一状态和第二状态等,同理均在本发明实施例的保护范围内。
S22、处理模块获取指纹识别结果。判断指纹识别是否成功,当指纹识别成功时,执行步骤S23;当指纹识别失败时,执行步骤S25。
S23、处理模块控制工作状态为安全状态。
本发明实施例将工作状态定义为安全状态和普通状态,即上述的安全工作状态和非安全工作状态。当指纹识别成功时,处理模块确定工作状态为安全状态;如果终端当前的工作状态是安全状态,则保持当前的工作状态;如果终端当前的工作状态是为普通状态,则切换为安全状态。
本领域技术人员可以理解,也可以将工作状态定义为其它名称进行等同替换,例如定义为第一状态和第二状态等,同理均在本发明实施例的保护范围内。
S24、处理模块在安全状态下运行,启用加解密模块对处理的信息进行加密或解密。
在安全状态下,处理模块启动加解密模块。当用户输入信息时,处理模块将用户输入的信息发送给加解密模块进行加密,然后将加密后的信息存储于本地或向外发送;当用户调用信息时,处理模块则将用户调用的信息发送给加解密模块进行解密,然后输出解密后的信息。调用的信息可以是从外部获取的或本地存储的加密信息。调用信息是指打开、播放、查看、读取、写入、修改、删除、启动或解析相关文件或程序。
所述信息的内容包括文字、数字、符号、声音、图像、视频等,如文本文件、视频文件、音频文件、图像文件、实时聊天信息、邮件信息等。
S25、处理模块控制工作状态为普通状态。
当指纹识别失败时,处理模块确定工作状态为普通状态;如果终端当前的工作状态是普通状态,则保持当前的工作状态;如果终端当前的工作状态是安全状态,则切换为普通状态。
S26、处理模块在普通状态下运行,关闭加解密模块,不对处理的信息进行加密或解密。
在普通状态下,处理模块关闭了加解密模块。对于用户输入的信息,处理模块不进行加密操作;同时,对于加密信息,处理模块也不进行解密操作。 也就是说,在普通状态下,用户不能调用加密信息,也不能对输入的信息加密。
本发明实施例控制终端工作状态的方法,通过持续进行指纹识别,实现了工作状态的实时控制和快速切换。用户可以通过长按、或以预设频率触摸、或长时间触摸指纹识别传感器作为对终端的工作状态进行快速切换的触发操作信号,即,在保持上述的长按、或以预设频率触摸、或长时间触摸指纹识别传感器时,则将终端的工作状态保持在第一状态,如果用户不保持上述的长按、或以预设频率触摸、或长时间触摸指纹识别传感器时,则将终端的工作状态保持在第二状态,本发明实施例方案通过对预设操作的识别,实现了终端工作状态的灵活转变,从而实现了不同的功能和操作权限。当终端解锁后被他人使用时,由于用户手指不再触摸指纹识别传感器而发生了状态切换,因此他人不能查看用户的保密信息。从而既保证了信息的安全性,又保证了操作的便捷性。
本发明实施例控制终端工作状态的方法,通过持续进行指纹识别实现了快速增加和取消加密和解密功能。当用户给朋友发送银行卡信息、私密信息、图像信息等保密信息时,希望只有对方能够看到,其他人不能正常打开,则可以通过手指触摸指纹识别传感器快速切换为安全状态,终端则立即对保密信息进行加密后再发送。当接收到加密信息时,则必须通过用户手指触摸指纹识别传感器切换为安全状态后才能正确读取该加密信息。实现了对保密信息的快速加密和解密,提高了信息的安全性和操作的便捷性。
参见图5,提出本发明实施例控制终端工作状态的方法第三实施例,所述方法包括步骤S31-S36:
S31、指纹识别传感器以预设频率持续进行指纹识别,并实时向处理模块通知每次指纹识别获得的指纹识别结果。
S32、处理模块获取指纹识别结果。判断指纹识别是否成功,当指纹识别成功时,执行步骤S33;当指纹识别失败时,执行步骤S35。
本实施例中,步骤S31和S32分别与第一实施例中的步骤S21和S22相同,在此不再赘述。
S33、处理模块控制工作状态为安全状态。
当指纹识别成功时,处理模块确定工作状态为安全状态;如果终端当前 的工作状态是安全状态,则保持当前的工作状态;如果终端当前的工作状态是为普通状态,则切换为安全状态。
S34、处理模块在安全状态下运行,授予操作者第一权限。
本发明实施例中,为终端定义了第一权限和第二权限两种操作权限。其中,第一权限相当于通过管理员帐户登录获得的管理员权限,是最高操作权限,例如可以调用终端中的所有信息;第二权限相当于通过访客帐户登录获得的访客权限,是次一级操作权限,例如只能调用终端中的普通信息。
在安全状态下,处理模块授予当前的操作者第一权限,则当前的操作者可以以管理员身份调用终端中的所有信息,如可以对终端中的所有文件执行读取、修改、删除等操作。
S35、处理模块控制工作状态为普通状态。
当指纹识别失败时,处理模块确定工作状态为普通状态;如果终端当前的工作状态是普通状态,则保持当前的工作状态;如果终端当前的工作状态是为安全状态,则切换为普通状态。
S36、处理模块在普通状态下运行,授予操作者第二权限。
在普通状态下,处理模块授予当前的操作者第二权限,则当前的操作者只能以访客身份调用终端中的普通信息,如只能对终端中的普通文件执行读取、修改、删除等操作,或者只能对普通文件执行读取操作。
本发明实施例控制终端工作状态的方法,通过持续进行指纹识别实现了操作权限的快速转换。当用户触摸指纹识别传感器时,则切换为安全状态,操作者获得最高操作权限,可以操作保密信息;当用户不再触摸指纹识别传感器时,则切换为普通状态,操作者获得次一级操作权限,不能操作保密信息。保证了操作的便捷性和信息的安全性。
前述第二和第三实施例以生物特征信息为指纹信息为例对本发明实施例的方法进行详细了说明,当生物特征信息为眼纹信息、虹膜信息、巩膜信息、面部特征信息、声纹信息等生物唯一识别信息时,其实现方法与指纹信息相类似,在此不再一一列举赘述。
参见图6,提出本发明控制终端工作状态的装置第一实施例,所述装置包括生物特征识别模块10、处理模块20、状态寄存器30和加解密模块40,其中:
生物特征识别模块10:设置为持续进行生物特征识别获得识别结果。
可选地,生物特征识别模块10以预设频率持续采集生物特征信息进行生物特征识别,并实时向处理模块20通知每次生物特征识别获得的识别结果。生物特征识别模块10进行生物特征识别的频率可以根据需要设定。
处理模块20:设置为根据识别结果控制工作状态。当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。
状态寄存器30:设置为存储状态标识。
加解密模块40:设置为对信息进行加密或解密。
其中,生物特征信息可以是指纹信息、眼纹信息、虹膜信息、巩膜信息、面部特征信息、声纹信息等。生物特征识别模块10可以通过指纹识别传感器进行指纹识别,通过摄像头进行眼纹识别、巩膜识别、虹膜识别或人脸识别,通过语音装置进行声纹识别。
可选地,可以采用Sensor Hub(或协处理器)技术保持生物特征识别模块10处于持续唤醒状态,以降低能耗。
可选地,以生物特征信息为指纹信息为例,当生物特征识别模块10通过指纹识别传感器感应到触摸操作而被触发(或唤醒)时,立即以预设频率持续进行指纹识别,直到没有采集到指纹信息时,才停止本轮指纹识别操作;当再次感应到触摸操作而被触发时,再进行下一轮指纹识别,依此循环进行。通过采取这种轮番指纹识别的方式,使得生物特征识别模块10只需间隙性工作而无需持续工作,降低了能耗。
如图5所示,生物特征识别模块10包括采集单元101、存储单元102、判断单元103、比对单元104和通知单元105,其中:
采集单元101:设置为采集指纹信息。当进行生物特征识别时,以预设频率持续采集指纹信息,每采集一次指纹信息,就将采集的数据发送给判断单元103。
存储单元102:设置为存储采集单元101采集的用户的生物特征信息,以作为后续生物特征识别的参考值。
判断单元103:设置为当采集单元101每进行一次生物特征信息采集后,接收采集单元101发送的数据,判断本次是否采集到生物特征信息;当没有 采集到生物特征信息时,判定本次识别失败,并将本次识别结果发送给通知单元105;当采集到生物特征信息时,将本次采集到的生物特征信息发送给比对单元104。
比对单元104:设置为将本次采集到的生物特征信息与存储单元102中存储的生物特征信息进行比对,判断二者是否匹配;当二者匹配时,判定本次识别成功;当二者不匹配时,判定本次识别失败。同时,将本次识别结果发送给通知单元105。
通知单元105:设置为实时向处理模块20通知每次生物特征识别获得的识别结果,也就是说,通知单元105通知的频率与生物特征识别的频率相同,每进行一次生物特征识别,就向处理模块20通知一次识别结果。
本实施例中,通知单元105通过修改状态寄存器30的状态标识的方式来向处理模块20通知识别结果,通知单元105实时根据每次生物特征识别获得的识别结果标记状态寄存器30的状态标识,以使处理模块20通过读取该状态标识来获取识别结果。例如,当识别成功时,通知单元105则标记状态寄存器的状态标识为安全状态(如修改状态寄存器30的数据为1);当识别失败时,通知单元105则标记状态寄存器30的状态标识为普通状态(如修改状态寄存器30的数据为0)。
如图6所示,处理模块20包括中央处理器201和状态确定单元202,其中:
状态确定单元202:设置为读取状态寄存器30的状态标识,根据状态标识获取识别结果,根据识别结果确定对应的工作状态。状态确定单元202读取状态标识的频率优选与生物特征识别模块10进行生物特征识别的频率相同,当然也可以不同。
例如,状态确定单元202读取状态寄存器30的状态标识,当状态标识为安全状态时,得知识别成功;当状态标识为普通状态时,得知识别失败。
本发明实施例将工作状态定义为第一状态(或安全状态)和第二状态(或普通状态)。当识别成功时,状态确定单元202确定工作状态为第一状态;如果终端当前的工作状态是第一状态,则保持当前的工作状态;如果终端当前的工作状态是第二状态,则切换为第一状态,并启动加解密模块40。
当识别失败时,状态确定单元202确定工作状态为第二状态;如果终端 当前的工作状态是第二状态,则保持当前的工作状态;如果终端当前的工作状态是第一状态,则切换为第二状态,并关闭加解密模块40。
中央处理器201:设置为当工作状态为第一状态时,利用加解密模块40对处理的信息进行加密或解密;当工作状态为第二状态时,不对处理的信息进行加密或解密。
在第一状态下,当用户输入信息时,中央处理器201将用户输入的信息发送给加解密模块40进行加密,然后将加密后的信息存储于本地或向外发送;当用户调用信息时,中央处理器201则将用户调用的信息发送给加解密模块40进行解密,然后输出解密后的信息。调用的信息可以是从外部获取的或本地存储的加密信息。调用信息是指打开、播放、查看、读取、写入、修改、删除、启动或解析相关文件或程序。
在第二状态下,对于用户输入的信息,中央处理器201不进行加密操作;同时,对于加密信息,中央处理器也不进行解密操作。也就是说,在第二状态下,用户不能调用加密信息,也不能对输入的信息加密。
所述信息的内容包括文字、数字、符号、声音、图像、视频等,如文本文件、视频文件、音频文件、图像文件、实时聊天信息、邮件信息等。
本发明实施例所提供的一种控制终端工作状态的装置,通过持续进行生物特征识别,实现了对终端的工作状态的实时控制和快速切换。用户可以通过提供或不予提供自己的生物特征信息来控制工作状态,进而实现不同的功能和操作权限。当终端解锁后被他人使用时,由于终端不能获取用户的生物特征信息而发生了工作状态切换,因此他人不能查看用户的保密信息。从而既保证了信息的安全性,又保证了操作的便捷性。
以生物特征信息为指纹信息为例,用户可以通过长按、或以预设频率触摸、或长时间触摸指纹识别传感器作为对终端的工作状态进行快速切换的触发操作信号,即,在保持上述的长按、或以预设频率触摸、或长时间触摸指纹识别传感器时,则将终端的工作状态保持在第一状态,如果用户不保持上述的长按、或以预设频率触摸、或长时间触摸指纹识别传感器时,则将终端的工作状态保持在第二状态,本发明实施例方案通过对预设操作的识别,实现了终端工作状态的灵活转变,从而实现了不同的功能和操作权限。当终端解锁后被他人使用时,由于用户手指不再触摸指纹识别传感器而发生了状态 切换,因此他人不能查看用户的保密信息。从而既保证了信息的安全性,又保证了操作的便捷性。
本发明实施例控制终端工作状态的装置,可以通过持续进行指纹识别实现快速增加和取消加密和解密功能。当用户给朋友发送银行卡信息、私密信息、图像信息等保密信息时,希望只有对方能够看到,其他人不能正常打开,则可以通过手指触摸指纹识别传感器快速切换为安全状态,终端则立即对保密信息进行加密后再发送。当接收到加密信息时,则必须通过用户手指触摸指纹识别传感器切换为安全状态后才能正确读取该加密信息。实现了对保密信息的快速加密和解密,提高了信息的安全性和操作的便捷性。
参见图9,提出本发明实施例中控制终端工作状态的装置第二实施例,本实施例与第一实施例的区别是省略了状态寄存器30。
本实施例中,生物特征识别模块10向处理模块20通知识别结果的方式是直接向处理模块20发送识别结果:生物特征识别模块10的通知单元105向处理模块20发送携带识别结果的信息,处理模块20的状态确定单元202接收该携带识别结果的信息,获取识别结果。例如,通知单元105可以通过向状态确定单元202发送脉冲信号的方式通知识别结果,不同的识别结果对应不同的脉冲信号。
这种通知方式减少了通知单元105和状态确定单元202的读取操作,可以在一定程度上减少***负载。
参见图10,提出本发明实施例中控制终端工作状态的装置第三实施例,本实施例与第一实施例的区别是省略了加解密模块40。
本实施例中,为终端定义了第一权限和第二权限两种操作权限。其中,第一权限相当于管理员权限,是最高操作权限,例如可以调用终端中的所有信息;第二权限相当于访客权限,是次一级操作权限,例如只能调用终端中的普通信息。
本实施例中,处理模块20设置为:当识别成功时,控制工作状态为第一状态,在第一状态下运行,授予操作者第一权限;当识别失败时,控制工作状态为第二状态,在第二状态下运行,授予操作者第二权限。
在第一状态下,处理模块20的中央处理器201授予当前的操作者第一权限,则当前的操作者可以以管理员身份调用终端中的所有信息,如可以对终 端中的所有文件执行读取、修改、删除等操作。
在第二状态下,处理模块20的中央处理器201授予当前的操作者第二权限,则当前的操作者只能以访客身份调用终端中的普通信息,如只能对终端中的普通文件执行读取、修改、删除等操作,或者只能对普通文件执行读取操作。
本发明实施例控制终端工作状态的装置,通过持续进行生物特征识别实现了操作权限的快速转换。当用户提供生物特征信息(如触摸指纹识别传感器)时,则控制工作状态为第一状态,操作者获得最高操作权限,可以操作保密信息;当用户不再提供生物特征信息(如触摸指纹识别传感器)时,则控制工作状态为第二状态,操作者获得次一级操作权限,不能操作保密信息。保证了操作的便捷性和信息的安全性。
参见图11,提出本发明实施例中控制终端工作状态的装置第四实施例,本实施例与第三实施例的区别是省略了状态寄存器30。
本实施例中,生物特征识别模块10向处理模块20通知识别结果的方式是直接向处理模块20发送识别结果:生物特征识别模块10的通知单元105向处理模块20发送携带识别结果的信息,处理模块20的状态确定单元202接收该携带识别结果的信息,获取识别结果。例如,通知单元105可以通过向状态确定单元202发送脉冲信号的方式通知识别结果,不同的识别结果对应不同的脉冲信号。
这种通知方式减少了通知单元105和状态确定单元202的读取操作,可以在一定程度上减少***负载。
需要说明的是:上述实施例提供的控制终端工作状态的装置与控制终端工作状态的方法实施例属于同一构思,其实现过程详见方法实施例,且方法实施例中的技术特征在装置实施例中均对应适用,这里不再赘述。
本发明实施例中控制终端工作状态的装置,主要应用于手机、平板等移动终端,也可以应用于笔记本电脑、台式电脑、终端机等计算机终端设备。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体 现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的控制终端工作状态的方法。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如***、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。
上述实施例中的装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
工业实用性
本发明实施例方案通过持续进行生物特征识别,实现了对终端的工作状态的实时控制和快速切换。用户可以通过提供或不予提供自己的生物特征信息来控制工作状态,进而实现不同的功能和操作权限。当终端解锁后被他人使用时,由于终端不能获取用户的生物特征信息而发生了工作状态切换,因此他人不能查看用户的保密信息。从而既保证了信息的安全性,又保证了操作的便捷性。

Claims (15)

  1. 一种控制终端工作状态的方法,包括:
    持续进行生物特征识别获得识别结果;
    当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。
  2. 根据权利要求1所述的控制终端工作状态的方法,其中,所述持续进行生物特征识别获得识别结果包括:
    持续采集生物特征信息,每进行一次生物特征信息采集后,判断本次是否采集到生物特征信息;
    当没有采集到生物特征信息时,判定本次识别失败;
    当采集到生物特征信息时,将本次采集到的生物特征信息与所述存储单元中存储的生物特征信息进行比对,判断本次采集到的生物特征信息与预存的生物特征信息是否匹配;
    当本次采集到的生物特征信息与预存的生物特征信息匹配时,判定本次识别成功;当本次采集到的生物特征信息与预存的生物特征信息不匹配时,判定本次识别失败。
  3. 根据权利要求2所述的控制终端工作状态的方法,所述方法还包括:
    当工作状态为第一状态时,对处理的信息进行加密或解密;
    当工作状态为第二状态时,不对处理的信息进行加密或解密。
  4. 根据权利要求3所述的控制终端工作状态的方法,其中,
    所述对处理的信息进行加密或解密包括:当所述终端接收到加密信息时,为所述加密信息解密;当所述终端向外发送信息时,为需要向外发送的信息加密;
    所述不对处理的信息进行加密或解密包括:当所述终端接收到加密信息时,不为所述加密信息解密;当所述终端向外发送信息时,不为需要向外发送的信息加密。
  5. 根据权利要求1或2所述的控制终端工作状态的方法,所述方法还包括:
    当工作状态为第一状态时,授予操作者第一权限;
    当工作状态为第二状态时,授予操作者第二权限。
  6. 根据权利要求2所述的控制终端工作状态的方法,其中,所述生物特征信息包括:指纹信息、眼纹信息、虹膜信息、巩膜信息、面部特征信息和声纹信息。
  7. 根据权利要求1-6任一项所述的控制终端工作状态的方法,所述方法还包括:
    实时根据每次生物特征识别获得的识别结果标记状态标识;
    读取所述状态标识,根据所述状态标识获取识别结果,当识别结果为识别成功时,确定工作状态为第一状态;当识别结果为识别失败时,确定工作状态为第二状态。
  8. 一种控制终端工作状态的装置,包括:
    生物特征识别模块,设置为持续进行生物特征识别获得识别结果;
    处理模块,设置为当识别结果为识别成功时,控制工作状态为第一状态;当识别结果为识别失败时,控制工作状态为第二状态。
  9. 根据权利要求8所述的控制终端工作状态的装置,其中,所述生物特征识别模块包括采集单元、存储单元、判断单元和比对单元;
    所述采集单元,设置为持续采集生物特征信息;
    所述判断单元,设置为每进行一次生物特征信息采集后,判断本次是否采集到生物特征信息;当没有采集到生物特征信息时,判定本次识别失败;当采集到生物特征信息时,将本次采集到的生物特征信息发送给所述比对单元;
    所述比对单元,设置为将本次采集到的生物特征信息与所述存储单元中存储的生物特征信息进行比对,判断本次采集到的生物特征信息与预存的生物特征信息是否匹配;当本次采集到的生物特征信息与预存的生物特征信息匹配时,判定本次识别成功;当本次采集到的生物特征信息与预存的生物特征信息不匹配时,判定本次识别失败。
  10. 根据权利要求8所述的控制终端工作状态的装置,所述装置还包括加解密模块,所述处理模块设置为:
    当工作状态为第一状态时,启动所述加解密模块对处理的信息进行加密或解密;
    当工作状态为第二状态时,关闭所述加解密模块不对处理的信息进行加密或解密。
  11. 根据权利要求9所述的控制终端工作状态的装置,其中,
    所述加解密模块对处理的信息进行加密或解密包括:当所述终端接收到加密信息时,为所述加密信息解密;当所述终端向外发送信息时,为需要向外发送的信息加密;
    所述加解密模块不对处理的信息进行加密或解密包括:当所述终端接收到加密信息时,不为所述加密信息解密;当所述终端向外发送信息时,不为需要向外发送的信息加密。
  12. 根据权利要求8所述的控制终端工作状态的装置,所述处理模块还设置为:
    当工作状态为第一状态时,授予操作者第一权限;
    当工作状态为第二状态时,授予操作者第二权限。
  13. 根据权利要求8所述的控制终端工作状态的方法,其中,所述生物特征信息包括:指纹信息、眼纹信息、虹膜信息、巩膜信息、面部特征信息和声纹信息。
  14. 根据权利要求8-13任一项所述的控制终端工作状态的装置,其中,所述生物特征识别模块包括通知单元,所述处理模块包括状态确定单元,所述装置还包括状态寄存器;
    所述通知单元设置为:实时根据每次生物特征识别获得的识别结果标记所述状态寄存器的状态标识;
    所述状态确定单元设置为:读取所述状态寄存器的状态标识,根据所述状态标识获取识别结果,当识别结果为识别成功时,确定工作状态为第一状态;当识别结果为识别失败时,确定工作状态为第二状态。
  15. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现权利要求1至7任意一项所述的控制终端工作状态的方法。
PCT/CN2016/082237 2016-04-14 2016-05-16 一种控制终端工作状态的方法和装置 WO2017177502A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610232067.7A CN107301339A (zh) 2016-04-14 2016-04-14 控制终端工作状态的方法和装置
CN201610232067.7 2016-04-14

Publications (1)

Publication Number Publication Date
WO2017177502A1 true WO2017177502A1 (zh) 2017-10-19

Family

ID=60042368

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/082237 WO2017177502A1 (zh) 2016-04-14 2016-05-16 一种控制终端工作状态的方法和装置

Country Status (2)

Country Link
CN (1) CN107301339A (zh)
WO (1) WO2017177502A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108735205A (zh) * 2018-04-17 2018-11-02 上海康斐信息技术有限公司 一种智能音箱的控制方法及智能音箱
CN110443025A (zh) * 2019-07-23 2019-11-12 青岛海尔科技有限公司 用于切换操作权限的方法及装置、家电设备
CN110443024A (zh) * 2019-07-23 2019-11-12 青岛海尔科技有限公司 用于切换操作权限的方法及装置、家电设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752113A (zh) * 2011-04-21 2012-10-24 进展产业株式会社 便携式信息终端的认证装置及其认证方法
CN103366107A (zh) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 一种保护应用程序访问权限的方法、装置及手机
US20150127552A1 (en) * 2006-03-21 2015-05-07 Radiofy Llc Systems and Methods for RFID Security

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150127552A1 (en) * 2006-03-21 2015-05-07 Radiofy Llc Systems and Methods for RFID Security
CN102752113A (zh) * 2011-04-21 2012-10-24 进展产业株式会社 便携式信息终端的认证装置及其认证方法
CN103366107A (zh) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 一种保护应用程序访问权限的方法、装置及手机

Also Published As

Publication number Publication date
CN107301339A (zh) 2017-10-27

Similar Documents

Publication Publication Date Title
US11057378B2 (en) Device and method of setting or removing security on content
KR102132507B1 (ko) 생체 인식 데이터에 기초한 리소스 관리 기법
JP6649411B2 (ja) モバイルデバイスのタッチスクリーンディスプレイをイネーブルするための方法および装置
CN104765552B (zh) 权限管理方法和装置
EP3355224B1 (en) Methods for digitally signing an electronic file, and authenticating method
CN104850827B (zh) 指纹识别方法及装置
TW201540038A (zh) 用於遷移金鑰之方法及設備
CN107395610B (zh) 一种通讯认证方法、第一终端及第二终端
CN104239815A (zh) 基于虹膜识别的电子文档加密解密装置及方法
WO2019101096A1 (zh) 安全验证的方法、装置及移动终端
US20210150044A1 (en) Cryptographic Key Management
WO2017177502A1 (zh) 一种控制终端工作状态的方法和装置
Mayrhofer et al. Adversary models for mobile device authentication
KR101052294B1 (ko) 콘텐츠 보안 장치 및 콘텐츠 보안 방법
CN106951757A (zh) 一种操作应用程序的方法和装置
KR20120042684A (ko) 지문 정보를 통한 데이터 송/수신 장치 및 시스템
Schaffer Expanding continuous authentication with mobile devices
JP2012038127A (ja) 情報処理装置並びに通信システム
CN103902865A (zh) 一种信息处理的方法及电子设备
KR20130086194A (ko) 지문 정보를 통한 데이터 송/수신 장치 및 시스템
KR102303258B1 (ko) 생체인식을 이용한 프로그램 접근제어 관리 방법
Lovell et al. Secure face recognition for mobile applications
TW200828069A (en) Control module and method of identity recognition
Sun et al. A Data Security Protection Mechanism Based on Transparent Biometric Authentication for Mobile Intelligent Terminals
Acar Privacy-aware Security Applications in the Era of Internet of Things

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16898317

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16898317

Country of ref document: EP

Kind code of ref document: A1