Key instruction processing method and terminal

An instruction processing and terminal technology, applied in the security field, can solve the problems of user economic loss, remote monitoring, positioning and alarm failure, and no protection measures for keys, and achieve the effect of preventing malicious operations.

Inactive Publication Date: 2016-08-10
SHENZHEN GIONEE COMM EQUIP
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, most of the buttons on the terminal currently have no protective measures, which directly affects the security of the terminal
Take the power button of a mobile phone as an example. The power button can be used to shut down the phone. When the phone is stolen or lost, others can maliciously shut down the phone through the power button. After the phone is turne

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key instruction processing method and terminal
  • Key instruction processing method and terminal
  • Key instruction processing method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0021] The shutdown method provided by the embodiment of the present invention is implemented in a terminal, and the terminal includes electronic devices such as smart phones, tablet computers, digital audio and video players, e-readers, handheld game consoles, or vehicle-mounted electronic devices. Wherein, a fingerprint sensor and a pressure sensor are arranged in the keys of the terminal.

[0022] figure 1 It is a schematic flow chart of a key inst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a key instruction processing method. The method is applied to a terminal. A fingerprint sensor and a pressure sensor are arranged in a key of the terminal. The method comprises the following steps of: acquiring fingerprint information through the fingerprint sensor in the key while inducing touch operation of a user for the key, and simultaneously, detecting a pressure value through the pressure sensor in the key; judging whether pre-set conditions are satisfied or not, wherein the pre-set conditions are as follows: the acquired fingerprint information is matched with pre-set fingerprint information; and the detected pressure value is greater than a pre-set pressure threshold value; and, if the pre-set conditions are satisfied, executing operation corresponding to the key. Correspondingly, the embodiment of the invention further discloses the terminal. By adopting the embodiment of the invention, the key can be prevented from being operated maliciously.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a key command processing method and a terminal. Background technique [0002] With the continuous popularization of terminals such as mobile phones and tablet computers, the security protection of terminals has been paid more and more attention. Among them, preventing others from arbitrarily manipulating the terminal is the key to security protection, and the most direct way for others to control the terminal is to operate the keys on the terminal. [0003] However, most of the keys on the terminal currently have no protective measures, which directly affects the security of the terminal. Take the power button of a mobile phone as an example. The power button can be used to shut down the phone. When the phone is stolen or lost, others can maliciously shut down the phone through the power button. After the phone is turned off, all its applications will stop running, res...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/83G06F21/88
CPCG06F21/83G06F21/88
Inventor 刘立荣
Owner SHENZHEN GIONEE COMM EQUIP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products