Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal and terminal operation method

An operation method and terminal technology, which can be used in the input/output process of data processing, instruments, digital data authentication, etc., and can solve problems such as cumbersome operation instructions.

Inactive Publication Date: 2017-02-01
XIAN ZHONGXING NEW SOFTWARE
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The combination of fingerprint recognition and operation instructions usually obtains user instructions by identifying different swipe directions of the same or different fingerprints, and executes and calls corresponding functions; this requires users to memorize different matching rules and corresponding functions It is necessary to pre-set the corresponding fingerprint sliding direction, which will cause some very direct operations to require additional sliding to correspond to the pre-set matching rules; Only by adding the sliding direction can it correspond to it, which will cause cumbersome problems of operating instructions to realize the corresponding functions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and terminal operation method
  • Terminal and terminal operation method
  • Terminal and terminal operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Based on the above basic idea, see figure 1 , which shows a terminal operation method provided by an embodiment of the present invention, the method may include:

[0057] S101: The terminal receives an operation instruction, and determines the current operating scene it is in according to the current operating state and preset scene conditions;

[0058] S102: If the current operating scenario of the terminal is a security scenario, the terminal acquires fingerprint information; and performs authentication according to the fingerprint information;

[0059] Understandably, if the current running scenario of the terminal is not a security scenario, the terminal directly responds to the operation instruction.

[0060] S103: After the terminal is successfully authenticated, respond to the operation instruction.

[0061]It can be understood that when the terminal authentication fails, the terminal refuses to respond to the operation instruction; further, the terminal may pr...

Embodiment 2

[0078] Based on the same technical idea of ​​the foregoing embodiments, see figure 2 , which shows a specific process of a terminal operation method provided by an embodiment of the present invention, and the process may include:

[0079] S201: The power button of the terminal receives a pressing instruction;

[0080] S202: When the terminal determines that it is currently in a display-off state, determine that it is in a wake-up scene;

[0081] S203: The terminal acquires fingerprint information through the fingerprint acquisition device arranged at the power button, and compares the acquired fingerprint information with the pre-stored fingerprint template;

[0082] S204: When the acquired fingerprint information is successfully compared with the fingerprint template, the terminal wakes up.

[0083] S205: When the comparison between the acquired fingerprint information and the fingerprint template fails, the terminal keeps displaying off.

[0084] This embodiment briefly ...

Embodiment 3

[0086] Based on the same technical idea of ​​the foregoing embodiments, see image 3 , which shows a specific flow of another terminal operation method provided by an embodiment of the present invention, and the flow may include:

[0087] S301: The terminal sets a valid timer for indicating a valid lifetime of fingerprint identification;

[0088] S302: The terminal receives the operation instruction, and determines whether the effective timer is in the timeout state; when the effective timer is in the timeout state, go to step S303; otherwise, go to step S305;

[0089] S303: The terminal acquires fingerprint information, and performs authentication according to the fingerprint information;

[0090] S304: After the authentication is successful, the terminal responds to the operation command, and restarts the valid timer for timing;

[0091] S305: The terminal directly responds to the operation instruction.

[0092] Understandably, when the valid timer is started for the firs...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a terminal and a terminal operation method. The method can comprise the following steps of: a terminal receives an operation instruction, and determines the current operation scene of the terminal according to a current operation state and a preset scene condition; and if the current operation scene of the terminal is a safety scene, the terminal obtains fingerprint information; according to the fingerprint information, authentication is carried out; and after the terminal succeeds in authentication, the operation instruction is responded.

Description

technical field [0001] The present invention relates to terminal security technology, in particular to a terminal and a terminal operation method. Background technique [0002] At present, the application of fingerprint recognition technology in electronic products is still limited to various security scenarios, such as unlocking, important information hiding, application permissions and other occasions that require identity verification. operate further. The combination of fingerprint recognition and operation instructions usually obtains user instructions by identifying different swipe directions of the same or different fingerprints, and executes and calls corresponding functions; this requires users to memorize different matching rules and corresponding functions It is necessary to pre-set the corresponding fingerprint sliding direction, which will cause some very direct operations to require additional sliding to correspond to the pre-set matching rules; Adding the sl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/51
CPCG06F21/32G06F21/51G06F3/0488
Inventor 杨翠红薛涛
Owner XIAN ZHONGXING NEW SOFTWARE