Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood that, as used herein, the terms "first," "second," and the like may be used herein to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another. For example, a first terminal may be termed a second terminal, and, similarly, a second terminal may be termed a first terminal, without departing from the scope of the present application. The first terminal and the second terminal are both terminals, but they are not the same terminal.
FIG. 1 is a diagram illustrating an application environment for a method for application login in one embodiment. As shown in fig. 1, the application environment includes aterminal 110. Theterminal 110 is installed with a security management application, which is used for acquiring fingerprint information acquired by the fingerprint module when detecting that the short message authentication code needs to be input when the login application program needs to be logged in, comparing the acquired fingerprint information with pre-stored fingerprint information, if the acquired fingerprint information is matched with the pre-stored fingerprint information, extracting the short message authentication code from the identified short message corresponding to the application program, and copying the short message authentication code to the position of the short message authentication code which needs to be input when the login application program needs to be logged in. The application program submits the copied short message verification code for verification, and acquires the input application program login account and password for verification login. Theterminal 110 may be a desktop computer, a tablet computer, a smartphone, a personal digital assistant, a wearable device, and the like.
In another application environment, a server of the security management application may be included, and the fingerprint information is verified by the server.
Fig. 2A is a schematic diagram of an internal structure of the terminal in one embodiment. As shown in fig. 2A, the terminal includes a processor, a nonvolatile storage medium, an internal memory, a network interface, a display screen, and an input device, which are connected through a system bus. Wherein the non-volatile storage medium of the terminal stores an operating system and computer readable instructions. The computer readable instructions, when executed by a processor, implement a method for application login. The processor is used for providing calculation and control capability and supporting the operation of the whole terminal. The internal memory in the terminal provides an environment for the execution of computer-readable instructions in the non-volatile storage medium. The network interface is used for communicating with a server. The display screen of the terminal can be a liquid crystal display screen or an electronic ink display screen, and the input device can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the terminal, or an external keyboard, a touch pad or a mouse. The terminal can be a mobile phone, a tablet computer, a personal digital assistant or a wearable device. Those skilled in the art will appreciate that the configuration shown in fig. 2A is a block diagram of only a portion of the configuration relevant to the present application, and does not constitute a limitation on the terminal to which the present application is applied, and a particular terminal may include more or less components than those shown in the drawings, or may combine certain components, or have a different arrangement of components.
Fig. 2B is a schematic diagram of an internal structure of the server in one embodiment. As shown in fig. 2B, the server includes a processor, a non-volatile storage medium, an internal memory, and a network interface connected by a system bus. Wherein the non-volatile storage medium of the server stores an operating system and computer readable instructions. The computer readable instructions, when executed by a processor, implement a method for application login authentication. The processor of the server is used for providing calculation and control capacity and supporting the operation of the whole server. The network interface of the server is used for communicating with an external terminal through a network connection, such as receiving a fingerprint verification request sent by the terminal and returning a fingerprint verification passing result to the terminal. The server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers. Those skilled in the art will appreciate that the architecture shown in fig. 2B is merely a block diagram of some of the structures associated with the present solution and does not constitute a limitation on the servers to which the present solution applies, and that a particular server may include more or less components than those shown, or combine certain components, or have a different arrangement of components. It is understood that both the terminal and the server can be computer devices.
FIG. 3 illustrates a method for application login in one embodiment. As shown in fig. 3, a method for logging in an application program, described in terms of a terminal, includes:
step 302, when detecting that the short message verification code needs to be input when the login application program is logged in, acquiring input fingerprint information, and comparing the input fingerprint information with pre-stored fingerprint information, wherein the pre-stored fingerprint information is pre-stored fingerprint information corresponding to the security management application account.
In one embodiment, a user registers a security management application account on a terminal, logs in a security management application through the security management application account, inputs fingerprint information, selects an application program to be managed, and correspondingly stores the security management application account, the acquired fingerprint information and the application program to be managed on a server of the security management application. The security management application account is used for uniquely identifying the identity of the user in the security management application. The security management application account can be a mobile phone number, an email box, an instant messaging account, or an account consisting of one or more of numbers, letters and characters.
When a user logs in on a terminal by using the same security management application account, an application program set to be managed corresponding to the security management application account can be acquired from a server. The application program to be managed is stored in the application program set to be managed. Storing the application to be managed may store an application identification of the application to be managed. The application identification is used to uniquely identify the application. The application identification may be an application name or application number, etc. The application to be managed may be an instant messaging application, a payment-type application, a security-type application, or the like. Instant messaging applications may be like WeChat, QQ, etc. The payment application program can be WeChat, Paibao, internet bank APP and the like.
The method comprises the steps of running a safety management application program on a terminal, detecting the application program logged in the terminal in real time or at regular time through the safety management application program, and judging whether the logged application program needs to input a short message verification code for verification. The logged application program can be compared with the application program to be managed, and if the logged application program is in the application program to be managed, the logged application program is the application program which needs to be managed and needs to be authenticated by inputting the short message authentication code. In one embodiment, the logged-in application identifier may be obtained, and whether the logged-in application identifier is in the set of application identifiers to be managed is determined.
And 304, acquiring a short message corresponding to the application program.
In one embodiment, the safety management application on the terminal identifies the logged application program identifier, and searches the short message corresponding to the application program identifier from the short message box according to the application program identifier. Specifically, each piece of information in the short message box can be searched to obtain a short message containing the application program identifier and the verification code content, and the short message closest to the current moment and containing the application program identifier and the verification code content is identified.
Step 306, if the input fingerprint information is matched with the pre-stored fingerprint information, extracting a short message verification code from the short message, copying the extracted short message verification code to a position where the short message verification code needs to be input when logging in the application program, wherein the extracted short message verification code is used for indicating the application program to perform login verification.
In one embodiment, the security management application or the server on the terminal compares whether the input fingerprint information is matched with the pre-stored fingerprint information, if so, extracts the short message verification code from the acquired short message corresponding to the application program, and copies the extracted short message verification code to the position where the short message verification code needs to be input when logging in the application program. And the application program on the terminal submits the input short message verification code to a server side where the application program is located for login verification, the short message verification code passes the verification, and the application program is successfully logged in after the account number and the password of the login application program pass the verification.
If the similarity between the input fingerprint information and the prestored fingerprint information is greater than or equal to the similarity threshold value, the two fingerprint information are matched, otherwise, the two fingerprint information are not matched. The similarity threshold can be set according to requirements, such as 90%, 95%, and the like.
According to the application program login method, when the fact that the short message verification code needs to be input when the login application program is detected, fingerprint information of a user is verified, after the verification is passed, the short message verification code is automatically extracted from the short message corresponding to the application program and copied to the position corresponding to the application program, the user does not need to search the short message and manually input the short message verification code, operation procedures are saved, operation convenience is improved, and fingerprint verification safety is high.
In one embodiment, prior to step 302, the application login method comprises: acquiring a logged security management application account, acquired fingerprint information and a selected application program to be managed; and correspondingly storing the security management application account, the acquired fingerprint information and the application program to be managed.
Specifically, a user registers a security management application account at a terminal, and logs in a security management application program through the security management application account and a corresponding password. The terminal collects fingerprint information input by a user and a selected application program to be managed, correspondingly stores a safety management application account, the collected fingerprint information and the application program to be managed, and uploads the fingerprint information and the application program to be managed to a server of the safety management application for storage. By pre-storing the fingerprint information and the application program to be managed, subsequent fingerprint verification is facilitated, and the application program to be managed is monitored.
In one embodiment, the application programs to be managed can be classified to obtain the types of the application programs, and the short messages corresponding to the application programs are found according to the types of the application programs. The types of the application programs can be finance, entertainment, tourism, social and the like. The short messages can be classified according to the types of the application programs, and the short messages corresponding to different types of application programs are different.
In one embodiment, the step of obtaining the short message corresponding to the application program includes: searching a short message of a first terminal, wherein the first terminal is a terminal which needs to log in the application program at present; and if the short message corresponding to the application program exists in the first terminal, acquiring the short message corresponding to the application program from the first terminal.
The short message corresponding to the application program is searched in the first terminal, namely the short message verification code information sent by the application program is received on the first terminal, the short message corresponding to the application program is obtained from the first terminal, and the short message verification code is extracted from the short message. The first terminal is inserted with a SIM (subscriber identity Module) card where a communication number bound with an application is located. And sending the login verification short message of the application program to the first terminal of the communication number.
In one embodiment, the step of acquiring the short message corresponding to the application program includes: if the first terminal does not have the short message corresponding to the application program, uploading a first notice that the first terminal does not have the short message verification code to a server; and receiving a short message verification code returned by the server according to the first notification, wherein the returned short message verification code is a short message verification code uploaded by a second terminal which logs in the security management application account at the same time, and the uploaded short message verification code is a short message verification code extracted by the second terminal from a short message corresponding to the application program.
The server is corresponding to the safety management application. And inserting the SIM card where the communication number bound with the application program is positioned into the second terminal.
In one embodiment, after the short message corresponding to the application program is acquired, the difference between the current time and the time when the short message is received can be further obtained, whether the difference exceeds the validity period of the short message verification code or not is judged, if yes, a prompt that the short message verification code is overdue is returned, and if not, the short message verification code is extracted from the short message. The validity period of the short message verification code is set by the service provider of the application program according to the requirement, such as 1 minute, 3 minutes, 10 minutes and the like.
FIG. 4 is a flow diagram of a method for application login in another embodiment. As shown in fig. 4, a method for logging in an application program includes:
step 402, running the security management application, submitting a security management application registration request, and registering a security management application account.
Step 404, acquiring the entered fingerprint information and the selected application program to be managed.
And step 406, storing the security management application account, the acquired fingerprint information and the application program needing to be managed correspondingly.
Step 408, detecting that the login application program needs to input the short message verification code.
And when the safety management application of the terminal detects that the login application program needs to input the short message verification code, prompting the user to input fingerprint information.
Step 410, acquiring the input fingerprint information.
The terminal passes through the fingerprint module and gathers the fingerprint information of user input.
Step 412, determining whether the input fingerprint information matches the stored fingerprint information, if yes, executingstep 414, and if no, executingstep 410.
And step 414, searching the received short message and acquiring the short message corresponding to the application program.
And step 416, extracting the short message verification code from the short message, copying the short message verification code to a corresponding position of the application program, and performing login verification.
According to the application program login method, when the fact that the short message verification code needs to be input when the login application program is detected, fingerprint information of a user is verified, after the verification is passed, the short message verification code is automatically extracted from the short message corresponding to the application program and copied to the position corresponding to the application program, the user does not need to search the short message and manually input the short message verification code, operation procedures are saved, operation convenience is improved, and fingerprint verification safety is high.
FIG. 5 is a flow diagram that illustrates a method for application login authentication, under an embodiment. As shown in fig. 5, a method for login authentication of an application, described in terms of a server corresponding to a security management application, includes:
step 502, receiving fingerprint information uploaded by a first terminal, which needs to input a short message verification code, when logging in an application program.
And the server corresponding to the safety management application receives the fingerprint information uploaded by the first terminal. The uploaded fingerprint information is input by prompt information sent by a user according to a short message verification code input requirement and acquired by the first terminal.
Step 504, comparing the uploaded fingerprint information with pre-stored fingerprint information, where the pre-stored fingerprint information is pre-stored fingerprint information corresponding to the security management application account.
And the server corresponding to the safety management application compares the uploaded fingerprint information with the prestored fingerprint information, judges whether the similarity between the uploaded fingerprint information and the prestored fingerprint information exceeds a similarity threshold value, if so, matches the uploaded fingerprint information, and otherwise, does not match the prestored fingerprint information.
Step 506, a comparison result that the uploaded fingerprint information is matched with pre-stored fingerprint information is returned to the first terminal, the comparison result is used for indicating the first terminal to obtain a short message corresponding to the application program, a short message verification code is extracted from the short message, the extracted short message verification code is copied to a position where the short message verification code needs to be input when the application program is logged in, and login verification is carried out.
According to the method for login authentication of the application program, after the fingerprint information is received, the fingerprint information is verified, the result of passing the verification is returned to the terminal for logging in the application program, the terminal is instructed to acquire the short message corresponding to the application program, the short message verification code is extracted, the short message verification code is copied to the corresponding position of the application program, login authentication is conducted, the operation process is saved, operation convenience is improved, and the fingerprint authentication is high in safety.
In one embodiment, the method for application login authentication further comprises: receiving the uploaded login security management application account, the acquired fingerprint information and the selected application program to be managed; and correspondingly storing the security management application account, the acquired fingerprint information and the application program to be managed.
In one embodiment, the method for application login authentication further comprises: if the first terminal does not have the short message corresponding to the application program, receiving a first notice that the first terminal does not have the short message verification code; and returning a short message verification code uploaded by a second terminal to the first terminal according to the first notification, wherein the second terminal is a terminal simultaneously logging in the security management application account, and the uploaded short message verification code is a short message verification code extracted by the second terminal from a short message corresponding to the application program.
And describing the login method of the application program by combining a specific application scene. As shown in fig. 6, an application a is logged in a terminal 610, and after an account and a password corresponding to the application a input by a user are acquired, a short message verification code is prompted to be input, that is, a verificationcode input box 620 is displayed, wherein the short message verification code is sent by a server corresponding to the application a to a communication number bound to the account corresponding to the application a. After detecting that the short message verification code needs to be input by the application program a, the security management application on the terminal 610 prompts the user to enter fingerprint information. The terminal 610 obtains input fingerprint information through a fingerprint module, compares the input fingerprint information with pre-stored fingerprint information through a security management application, if the input fingerprint information is matched with the pre-stored fingerprint information, searches a short message box on the terminal 610, searches a short message corresponding to the application program A from the short message box, extracts a short message verification code from the short message, copies the short message verification code into a verificationcode input box 620 on an application program A interface, and submits the short message verification code in the verificationcode input box 620 to a server corresponding to the application program A for verification. In the verification process, the user does not need to switch to the short message, check the short message verification code and manually input the short message verification code, so that the operation flow is saved.
As shown in fig. 7, the application scenario includes afirst terminal 710, aserver 720 corresponding to the security management application, and asecond terminal 730. Thefirst terminal 710 is a terminal for which the current login application program needs to input the short message authentication code. Thesecond terminal 730 is a terminal in which the security management application account is simultaneously logged in and the communication number bound to the application program a is located. Theserver 720 corresponding to the security management application stores a security management application account, collected fingerprint information, and an application program to be managed. The security management application on thefirst terminal 710 acquires an application program to be managed corresponding to the security management application account from the securitymanagement application server 720, and detects application program login. When the login application a displays the verificationcode input box 712, the security management application of thefirst terminal 710 detects that the short message verification code needs to be input when the login application a logs in, prompts to input fingerprint information, and uploads the acquired fingerprint information to theserver 720. Theserver 720 compares the uploaded fingerprint information with the stored fingerprint information, and returns a matching result to thefirst terminal 710. The first terminal 710 searches that there is no short message corresponding to the application a, and then sends a first notification including that the first terminal does not have the short message of the application a to theserver 720. Theserver 720 notifies the security management application on thesecond terminal 730 to search for its own short message. Thesecond terminal 730 obtains the short message corresponding to the application program a, extracts the short message verification code, and sends the short message verification code to theserver 720. Theserver 720 sends the short message verification code to thefirst terminal 710; the first terminal 710 copies the short message authentication code to the authenticationcode input box 712 of the application a.
FIG. 8 is a block diagram of an apparatus for application login in one embodiment. As shown in fig. 8, an apparatus for logging in an application, which is described in terms of a terminal, includes afingerprint verification module 810, aninformation identification module 820, and a shortmessage extraction module 830. Wherein:
thefingerprint verification module 810 is configured to, if it is detected that the short message verification code needs to be input by the login application program, acquire input fingerprint information, and compare the input fingerprint information with pre-stored fingerprint information, where the pre-stored fingerprint information is pre-stored fingerprint information corresponding to the security management application account.
Theinformation identification module 820 is used for acquiring the short message corresponding to the application program.
The shortmessage extraction module 830 is configured to extract a short message verification code from the short message if the input fingerprint information matches with pre-stored fingerprint information, copy the extracted short message verification code to a location where the short message verification code needs to be input when logging in the application program, where the extracted short message verification code is used to instruct the application program to perform login verification.
According to the application program login device, when the fact that the short message verification code needs to be input when the login application program is detected, fingerprint information of a user is verified, after the verification is passed, the short message verification code is automatically extracted from the short message corresponding to the application program and copied to the position corresponding to the application program, the user does not need to search the short message and manually input the short message verification code, operation procedures are saved, operation convenience is improved, and fingerprint verification safety is high.
Fig. 9 is a block diagram of an apparatus for application login in another embodiment. As shown in fig. 9, an apparatus for logging in an application program, which is described in terms of a terminal, includes afingerprint verification module 810, aninformation identification module 820, a shortmessage extraction module 830, and astorage module 840.
Thestorage module 840 is configured to obtain a logged security management application account, collected fingerprint information, and a selected application program to be managed, and correspondingly store the security management application account, the collected fingerprint information, and the selected application program to be managed.
In one embodiment, theinformation identification module 820 is further configured to search for a short message of a first terminal, where the first terminal is a terminal that needs to log in the application program currently, and if the short message corresponding to the application program exists in the first terminal, obtain the short message corresponding to the application program from the first terminal; if the first terminal does not have the short message corresponding to the application program, uploading a first notice that the short message verification code does not exist in the first terminal to a server;
the shortmessage extraction module 830 is configured to receive a short message verification code returned by the server according to the first notification, where the returned short message verification code is a short message verification code uploaded by a second terminal that logs in the security management application account at the same time, and the uploaded short message verification code is a short message verification code extracted by the second terminal from a short message corresponding to the application program.
FIG. 10 is a block diagram of an apparatus for application login authentication in one embodiment. As shown in fig. 10, an apparatus for application login authentication, described in terms of a server, includes areceiving module 1002, afingerprint verification module 1004, a sendingmodule 1006, and astorage module 1008. Wherein:
thereceiving module 1002 is configured to receive fingerprint information uploaded by a first terminal, which needs to input a short message verification code when logging in an application program.
Thefingerprint verification module 1004 is configured to compare the uploaded fingerprint information with pre-stored fingerprint information, where the pre-stored fingerprint information is pre-stored fingerprint information corresponding to the security management application account.
The sendingmodule 1006 is configured to return a comparison result that the uploaded fingerprint information matches with pre-stored fingerprint information to the first terminal, where the comparison result is used to instruct the first terminal to obtain a short message corresponding to the application program, extract a short message verification code from the short message, copy the extracted short message verification code to a location where the short message verification code needs to be input when logging in the application program, and perform login verification.
In one embodiment, thereceiving module 1002 is further configured to receive the uploaded logged security management application account, the collected fingerprint information, and the selected application to be managed.
Thestorage module 1008 is configured to correspondingly store the security management application account, the acquired fingerprint information, and the application program to be managed.
In an embodiment, thereceiving module 1002 is further configured to receive a first notification that the short message verification code does not exist in the first terminal if the short message corresponding to the application does not exist in the first terminal;
the sendingmodule 1006 is further configured to return a short message verification code uploaded by a second terminal to the first terminal according to the first notification, where the second terminal is a terminal that logs in the security management application account at the same time, and the uploaded short message verification code is a short message verification code extracted by the second terminal from a short message corresponding to the application program.
As shown in fig. 11,security management application 1100 includes astorage module 1102, afingerprint verification module 1104, aninformation identification module 1106, and a shortmessage extraction module 1108. Thestorage module 1102 is configured to store a security management application account, acquired fingerprint information, and an application program to be managed. After the user logs in the security management application, when the login application App1120 needs short message authentication, the security management application detects that the logged-in application is recorded in thestorage module 1102, and prompts the user to input fingerprint information. After acquiring the fingerprint information input by the user, thefingerprint verification module 1104 compares the input fingerprint information with the fingerprint information in thestorage module 1102, and sends a signal indicating that the fingerprint verification is passed to the short messageprompt module 1108 if the similarity exceeds a similarity threshold (e.g., 90%). Theinformation identification module 1106 searches for a short message which needs to be subjected to short message verification with the currently logged-in application program from the received short messages according to the type of the currently logged-in application program. The shortmessage extraction module 1108 extracts a short message verification code from the short message corresponding to the current login application program, and copies the short message verification code to the position where the verification code needs to be input in the current login application program. The user verifies the copied short message verification code and inputs the correct account and password of the currently logged-inapplication 1120 for logging in.
The division of each module in the above-mentioned apparatus for application login and apparatus for application login authentication is only used for illustration, in other embodiments, the method for application login and/or the method for application login authentication may be divided into different modules as required to complete all or part of the functions of the above-mentioned method for application login and/or method for application login authentication.
The present application also provides a computer-readable storage medium. One or more non-transitory computer-readable storage media containing computer-executable instructions that, when executed by one or more processors, cause the processors to implement a method of application login and/or a method of application login authentication.
The application also provides a computer device. The computer device comprises a memory and a processor, wherein the memory stores computer readable instructions, and the instructions, when executed by the processor, enable the processor to realize an application program login method and/or an application program login authentication method.
The embodiment of the application also provides computer equipment. As shown in fig. 12, for convenience of explanation, only the portions related to the embodiments of the present application are shown, and details of the specific techniques are not disclosed, please refer to the method portion of the embodiments of the present application. The computer device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the computer device as the mobile phone as an example:
fig. 12 is a block diagram of a partial structure of a mobile phone related to a computer device provided in an embodiment of the present application. Referring to fig. 12, the cellular phone includes: radio Frequency (RF)circuit 1210,memory 1220,input unit 1230,display unit 1240,sensor 1250,audio circuit 1260, wireless fidelity (WiFi)module 1270,processor 1280, andpower supply 1290. Those skilled in the art will appreciate that the handset configuration shown in fig. 12 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
TheRF circuit 1210 may be configured to receive and transmit signals during information transmission or communication, and may receive downlink information of a base station and then process the downlink information to theprocessor 1280; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, theRF circuit 1210 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Messaging Service (SMS), and the like.
Thememory 1220 may be used to store software programs and modules, and theprocessor 1280 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in thememory 1220. Thememory 1220 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, and the like), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, thememory 1220 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
Theinput unit 1230 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of thecellular phone 1200. Specifically, theinput unit 1230 may include atouch panel 1231 andother input devices 1232. Thetouch panel 1231, which may also be referred to as a touch screen, may collect touch operations performed by a user on or near the touch panel 1231 (e.g., operations performed by the user on or near thetouch panel 1231 using any suitable object or accessory such as a finger, a stylus, etc.), and drive the corresponding connection device according to a preset program. In one embodiment, thetouch panel 1231 can include two portions, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to theprocessor 1280, and can receive and execute commands sent by theprocessor 1280. In addition, thetouch panel 1231 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. Theinput unit 1230 may includeother input devices 1232 in addition to thetouch panel 1231. In particular,other input devices 1232 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
Thedisplay unit 1240 may be used to display information input by the user or information provided to the user and various menus of the cellular phone.Display unit 1240 may include adisplay panel 1241. In one embodiment, theDisplay panel 1241 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment,touch panel 1231 canoverlay display panel 1241, and whentouch panel 1231 detects a touch operation thereon or nearby, thetouch panel 1231 can transmit the touch operation toprocessor 1280 to determine the type of touch event, and thenprocessor 1280 can provide corresponding visual output ondisplay panel 1241 according to the type of touch event. Although in fig. 12, thetouch panel 1231 and thedisplay panel 1241 are implemented as two independent components to implement the input and output functions of the mobile phone, in some embodiments, thetouch panel 1231 and thedisplay panel 1241 may be integrated to implement the input and output functions of the mobile phone.
Thecell phone 1200 may also include at least onesensor 1250, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of thedisplay panel 1241 according to the brightness of ambient light, and the proximity sensor may turn off thedisplay panel 1241 and/or the backlight when the mobile phone moves to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
Audio circuit 1260,speaker 1261, andmicrophone 1262 can provide an audio interface between a user and a cell phone. Theaudio circuit 1260 can transmit the received electrical signal converted from the audio data to thespeaker 1261, and the audio signal is converted into a sound signal by thespeaker 1261 and output; on the other hand, themicrophone 1262 converts the collected sound signal into an electrical signal, which is received by theaudio circuit 1260 and converted into audio data, and then the audio data is processed by the audiodata output processor 1280, and then the processed audio data is transmitted to another mobile phone through theRF circuit 1210, or the audio data is output to thememory 1220 for subsequent processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through theWiFi module 1270, and provides wireless broadband internet access for the user. Although fig. 12 showsWiFi module 1270, it is understood that it is not an essential component ofcell phone 1200 and may be omitted as desired.
Theprocessor 1280 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in thememory 1220 and calling data stored in thememory 1220, thereby performing overall monitoring of the mobile phone. In one embodiment, theprocessor 1280 may include one or more processing units. In one embodiment, theprocessor 1280 may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, applications, and the like; the modem processor handles primarily wireless communications. It is to be appreciated that the modem processor described above may not be integrated into theprocessor 1280.
Themobile phone 1200 further includes a power supply 1290 (e.g., a battery) for supplying power to various components, and preferably, the power supply may be logically connected to theprocessor 1280 through a power management system, so that the power management system may manage charging, discharging, and power consumption.
In one embodiment, thecell phone 1200 may also include a camera, a bluetooth module, and the like.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), or the like.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.