Fingerprint Collection Method and Terminal

ABSTRACT

A fingerprint collection method and a terminal, where the method includes obtaining, by a terminal, a fingerprint collection instruction, where the fingerprint collection instruction instructs to collect a fingerprint using a fingerprint sensor integrated on a function key, collecting, by the terminal using the fingerprint sensor based on the fingerprint collection instruction, fingerprint information recorded by a user on the function key, obtaining, by the terminal on the function key at any moment of collecting the fingerprint information, a first key event triggered by the user, where the first key event is any operation other than a fingerprint recording event, and discarding, by the terminal, the first key event.

This application claims priority to Chinese Patent Application No.201610882606.1, filed with the Chinese Patent Office on Oct. 8, 2016 andentitled “FINGERPRINT AUTHENTICATION METHOD AND DEVICE”, and priority toInternational Patent Application No. PCT/CN2016/109839, filed with theChinese Patent Office on Dec. 14, 2016 and entitled “FINGERPRINTCOLLECTION METHOD AND TERMINAL”, which are incorporated herein byreference in their entirety.

TECHNICAL FIELD

The present invention relates to the field of communicationstechnologies, and in particular, to a fingerprint collection method anda terminal.

BACKGROUND

Currently, many applications (APP, Application) can implement variousfingerprint application functions that are based on fingerprintauthentication, for example, fingerprint payment and fingerprint unlock.A core principle of the fingerprint application functions is:authenticating a collected fingerprint of a user, and performing acorresponding application function after an identity of the user isdetermined based on an authentication result.

To implement the foregoing fingerprint application functions, afingerprint sensor (that is, fingerprint sensor) needs to be disposed ona terminal, and a fingerprint of a user is collected by using thefingerprint sensor. The fingerprint sensor may be integrated on anyfunction key of the terminal, for example, a power key, a home key, or avolume key. The power key is used as an example. When the fingerprintsensor is integrated on the power key, the user not only can implement alock screen or wakeup function of the terminal by pressing the power keybut also can implement a corresponding fingerprint application functionby collecting the fingerprint of the user by using the fingerprintsensor on the power key.

In this case, when a fingerprint application function is performed, forexample, when a fingerprint payment function is enabled to collect afingerprint of a user, once the user accidentally presses the power keyand triggers a lock screen operation, the terminal switches to a lockscreen state. In this case, a fingerprint payment procedure that isbeing performed is forced to be interrupted, and the fingerprint paymentfunction cannot be completed.

SUMMARY

Embodiments of the present invention provide a fingerprint collectionmethod and a terminal. When a fingerprint sensor is integrated on anyfunction key of a terminal, a failure of a fingerprint applicationfunction that is caused when a user unintentionally operates a functionkey can be avoided.

To achieve the foregoing objective, the following technical solutionsare used in the embodiments of the present invention.

According to a first aspect, an embodiment of the present inventionprovides a fingerprint collection method, including: obtaining, by aterminal, a fingerprint collection instruction, where the fingerprintcollection instruction is used to instruct to collect a fingerprint byusing a fingerprint sensor integrated on a function key; collecting, bythe terminal by using the fingerprint sensor based on the fingerprintcollection instruction, fingerprint information recorded by a user onthe function key; and obtaining, by the terminal on the function key atany moment of collecting the fingerprint information, a first key eventtriggered by the user, where the first key event is any operation otherthan a fingerprint recording event. In this case, the terminal maydiscard the first key event. That is, in a process of collecting thefingerprint information of the user, a related function of the functionkey may be temporarily disabled. In this way, when the fingerprintsensor is integrated on the function key, the related function of thefunction key does not interfere in the process of collecting thefingerprint information, thereby avoiding a problem that a fingerprintapplication function related to a fingerprint collection process cannotbe performed any longer.

In a possible design, the discarding, by the terminal, the first keyevent includes: determining, by the terminal, a priority of the firstkey event and a priority of collecting the fingerprint information; anddiscarding, by the terminal, the first key event if the priority ofcollecting the fingerprint information is higher than the priority ofthe first key event. Therefore, mutual interference between an originalfunction of the function key and a fingerprint collection function canbe avoided in different application scenarios.

In a possible design, the function key has a corresponding key status,and the key status is used to indicate that the function key is in alocked state or an unlocked state. After the obtaining, by a terminal, afingerprint collection instruction, the method further includes:setting, by the terminal, the key status of the function key to thelocked state. In this way, after a fingerprint drive module of theterminal obtains the fingerprint collection instruction, the key statusof the function key may be set to the locked state, so as to ensure thateach related function of the function key is disabled in the subsequentfingerprint collection process.

In a possible design, the discarding, by the terminal, the first keyevent includes: generating, by the terminal based on the first keyevent, a first operation instruction corresponding to the first keyevent; determining, by the terminal, that a status of the foregoing keystatus bit is the locked state; and further, discarding the firstoperation instruction.

In a possible design, the method further includes: setting, by theterminal, the key status to the unlocked state after the fingerprintinformation of the user is collected, so that the related function ofthe function key returns to normal.

In a possible design, after the obtaining, by the terminal on thefunction key, a first key event triggered by the user, the methodfurther includes: generating, by the terminal based on the first keyevent, a first operation instruction corresponding to the first keyevent; and storing, by the terminal, the first operation instruction.After the setting, by the terminal, the key status to the unlockedstate, the method further includes: executing, by the terminal, thefirst operation instruction. That is, after setting the key status tothe unlocked state, the terminal may further execute the first operationinstruction. In this way, the terminal not only can be prevented frombeing interfered by the original function of the function key in thefingerprint collection process but also can complete the first key eventtriggered by the user.

In a possible design, after the setting, by the terminal, the key statusbit to an unlocked state, the method further includes: obtaining asecond key event triggered by the user on the function key; andgenerating, by the terminal based on the second key event, a secondoperation instruction corresponding to the second key event. Further,when determining that the status of the key status bit is the unlockedstate, the terminal can directly execute the second operationinstruction.

In a possible design, the obtaining, by a terminal, a fingerprintcollection instruction includes: generating, by the terminal, thefingerprint collection instruction if it is detected that the usertriggers a fingerprint application function in a target application.

According to a second aspect, an embodiment of the present inventionprovides a fingerprint collection method, including: obtaining, by aterminal, a fingerprint collection instruction, where the fingerprintcollection instruction is used to instruct to collect a fingerprint byusing a fingerprint sensor integrated on a function key; collecting, bythe terminal by using the fingerprint sensor based on the fingerprintcollection instruction, fingerprint information recorded by a user onthe function key; obtaining, by the terminal on the function key at anymoment of collecting the fingerprint information, a key operationtriggered by the user; and determining, by the terminal based on keyduration of the key operation, whether to discard the key operation,that is, determining whether the key operation is an accidental touchoperation, so as to avoid a conflict with an original key function ofthe function key in a fingerprint collection process.

In a possible design, the determining, by the terminal based on keyduration of the key operation, whether to discard the key operationincludes: When the key duration of the key operation is shorter thanfirst preset duration, because the key duration is relatively short, itmay be considered that the key operation is accidentally performed bythe user. That is, the intention of the user in this case still isperforming the fingerprint collection function on the function keyinstead of performing the original key function of the function key.Therefore, the terminal may discard the key operation, therebyimplementing a foolproof touch function.

In a possible design, the method further includes: when the key durationof the key operation is longer than the first preset duration andshorter than second preset duration, where the key operation may beconsidered as an effective short press operation, performing, by theterminal, an operation instruction corresponding to the short pressoperation; and when the key duration of the key operation is longer thanthe second preset duration, where the key operation may be considered asan effective long press operation, performing, by the terminal, anoperation instruction corresponding to the long press operation.

In a possible design, the method further includes: adjusting, by theterminal, a value of the first preset duration based on a currentapplication scenario.

In a possible design, after the collecting, by the terminal by using thefingerprint sensor based on the fingerprint collection instruction,fingerprint information recorded by a user on the function key, themethod further includes:

authenticating, by the terminal, an identity of the user by using thecollected fingerprint information.

According to a third aspect, an embodiment of the present inventionprovides a terminal, including: an obtaining unit, configured to obtaina fingerprint collection instruction, where the fingerprint collectioninstruction is used to instruct to collect a fingerprint by using afingerprint sensor integrated on a function key; a collection unit,configured to collect, by using the fingerprint sensor based on thefingerprint collection instruction, fingerprint information recorded bya user on the function key, where the obtaining unit is furtherconfigured to obtain, by the terminal on the function key at any momentof collecting the fingerprint information, a first key event triggeredby the user, where the first key event is any operation other than afingerprint recording event; and a shielding unit, configured to discardthe first key event.

In a possible design, the shielding unit is specifically configured to:determine a priority of the first key event and a priority of collectingthe fingerprint information; and discard the first key event if thepriority of collecting the fingerprint information is higher thanpriority of the first key event.

In a possible design, the function key has a corresponding key status,and the key status is used to indicate that the function key is in alocked state or an unlocked state. The terminal further includes asetting unit, configured to set a key status bit of the function key toa locked state.

In a possible design, the shielding unit is specifically configured to:generate, based on the first key event, a first operation instructioncorresponding to the first key event; determine that a status of the keystatus bit is the locked state; and discard the first operationinstruction.

In a possible design, the setting unit is further configured to set, bythe terminal, the key status bit to an unlocked state after thefingerprint information of the user is collected.

In a possible design, the terminal further includes an execution unit,configured to: generate, based on the first key event, a first operationinstruction corresponding to the first key event; store the firstoperation instruction; and execute the first operation instruction.

In a possible design, the obtaining unit is further configured to obtaina second key event triggered by the user on the function key. The secondkey event is the same as or different from the first key event. Theexecution unit is further configured to: generate, based on the secondkey event, a second operation instruction corresponding to the secondkey event; determine that the key status bit is the unlocked state; andexecute the second operation instruction.

In a possible design, the obtaining unit is specifically configured togenerate the fingerprint collection instruction if it is detected thatthe user triggers a fingerprint application function in a targetapplication.

According to a fourth aspect, an embodiment of the present inventionprovides a terminal, including: an obtaining unit, configured to obtaina fingerprint collection instruction, where the fingerprint collectioninstruction is used to instruct to collect a fingerprint by using afingerprint sensor integrated on a function key; a collection unit,configured to collect, by using the fingerprint sensor based on thefingerprint collection instruction, fingerprint information recorded bya user on the function key, where the obtaining unit is furtherconfigured to obtain, by the terminal on the function key at any momentof collecting the fingerprint information, a key operation triggered bythe user; and a determining unit, configured to determine, based on keyduration of the key operation, whether to discard the key operation.

In a possible design, the determining unit is specifically configured todiscard the key operation when the key duration of the key operation isshorter than first preset duration.

In a possible design, the terminal further includes an execution unit,configured to: execute an operation instruction corresponding to a shortpress operation when the key duration of the key operation is longerthan the first preset duration and shorter than second preset duration;and execute an operation instruction corresponding to a long pressoperation when the key duration of the key operation is longer than thesecond preset duration. The second preset duration is longer than thefirst preset duration.

In a possible design, the execution unit is further configured to adjusta value of the first preset duration based on a current applicationscenario of the terminal.

In a possible design, the execution unit is further configured toauthenticate an identity of the user by using the collected fingerprintinformation.

According to a fifth aspect, an embodiment of the present inventionprovides a terminal, including a processor, a memory, a bus, and acommunications interface. The memory is configured to store a computerexecutable instruction, the processor is connected to the memory byusing the bus, and when the terminal runs, the processor executes thecomputer executable instruction stored in the memory, to cause theterminal to perform the fingerprint collection method according to anyone of the foregoing designs.

According to a sixth aspect, an embodiment of the present inventionprovides a computer storage medium, configured to store a computersoftware instruction used by the foregoing terminal. The computerstorage medium includes a program designed for the terminal forexecuting the foregoing aspects.

According to a seventh aspect, an embodiment of the present inventionprovides a computer program. The computer program includes aninstruction. The computer program, when executed by a computer, causesthe computer to perform the fingerprint collection method according toany one of the designs of the first aspect.

In the embodiments of the present invention, the name of the terminaldoes not constitute a limitation to devices or functional modules.During actual implementation, the devices or the functional modules mayexist with other names. The devices or the functional modules fallwithin the scope of the following claims of the present invention andtheir equivalent technologies provided that functions of the devices orthe functional modules are similar to functions of devices or functionalmodules in the present invention.

In addition, for technical effects of any one of the designs of thesecond aspect to the seventh aspect, refer to technical effects ofdifferent designs of the first aspect. Details are not described hereinagain.

These aspects or other aspects in the present invention are more conciseand easily understandable in descriptions in the following embodiments.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a first schematic diagram of an application scenario of aterminal according to an embodiment of the present invention;

FIG. 2 is a sectional view of a power key integrating a fingerprintsensor according to an embodiment of the present invention;

FIG. 3 is a schematic structural diagram of a mobile phone according toan embodiment of the present invention;

FIG. 4 is a schematic cooperation diagram of performing a fingerprintcollection method by a terminal according to an embodiment of thepresent invention;

FIG. 5 is a second schematic diagram of an application scenario of aterminal according to an embodiment of the present invention;

FIG. 6 is a first schematic flowchart of a fingerprint collection methodaccording to an embodiment of the present invention;

FIG. 7 is a schematic diagram of a fingerprint payment procedureaccording to an embodiment of the present invention;

FIG. 8 is a schematic architectural diagram of a tablet computeraccording to an embodiment of the present invention;

FIG. 9 is a second schematic flowchart of a fingerprint collectionmethod according to an embodiment of the present invention;

FIG. 10 is a first schematic diagram of an application scenario of afingerprint collection method according to an embodiment of the presentinvention;

FIG. 11 is a second schematic diagram of an application scenario of afingerprint collection method according to an embodiment of the presentinvention;

FIG. 12 is a third schematic diagram of an application scenario of afingerprint collection method according to an embodiment of the presentinvention;

FIG. 13 is a first schematic structural diagram of a terminal accordingto an embodiment of the present invention; and

FIG. 14 is a second schematic structural diagram of a terminal accordingto an embodiment of the present invention.

DESCRIPTION OF EMBODIMENTS

The terms “first” and “second” below are merely intended for a purposeof description, and shall not be understood as an indication orimplication of relative importance or implicit indication of a quantityof indicated technical features. Therefore, a feature limited by “first”or “second” may explicitly or implicitly include one or more features.In descriptions of embodiments of the present invention, unlessotherwise stated, “a plurality of” means two or more.

An embodiment of the present invention provides a fingerprint collectionmethod that may be applied to any terminal having a fingerprintcollection function. The terminal may be a mobile phone, a tabletcomputer, a notebook computer, a UMPC (Ultra-mobile Personal Computer,ultra-mobile personal computer), a netbook, a PDA (Personal DigitalAssistant, personal digital assistant), or the like. This is not limitedin this embodiment of the present invention.

As shown in FIG. 1, a mobile phone 100 is used as an example. In thefingerprint collection method provided in this embodiment of the presentinvention, a fingerprint sensor 11 may be integrated on any function keyof the mobile phone, for example, a power key 12, a home key, or avolume adjustment key. The function key may be a physical key or avirtual key. This is not limited in this embodiment of the presentinvention.

Using an optical fingerprint identification technology as an example,the fingerprint sensor 11 may be specifically formed by a photosensitivediode or a phototransistor. As shown in FIG. 2, FIG. 2 is a sectionalview of the power key 12. A plurality of fingerprint sensors 11 may beintegrated on the power key 12. A backlight source 13 is a surface lightsource, and light emitted from the backlight source 13 is diffuselyreflected after being irradiated on a finger. A part of the light isreceived by the fingerprint sensors 11. The fingerprint sensors 11convert received optical signals into corresponding electrical signals.The light is reflected when passing through a wave trough (referred toas a valley subsequently) and a wave peak (referred to as a ridgesubsequently) of a fingerprint, and light energy of the reflected lightdiffers. Usually, light energy obtained after light is reflected at avalley is lower than light energy obtained after the light is reflectedat a ridge. Based on such a difference, values of voltages or currentsoutput by the fingerprint sensors 11 at different locations aredifferent. Further, relative locations of the valley and the ridge ofthe fingerprint are identified, so as to obtain fingerprint informationof a user.

It should be noted that in this embodiment, the optical fingerprintidentification technology is used as an example for description. It maybe understood that a capacitive sensor or an ultrasonic sensor mayalternatively be used for fingerprint identification. This is notlimited in this embodiment of the present invention.

Further, with reference to FIG. 2, as shown in FIG. 3, tine mobile phone100 further includes components such as a processor 380, a memory 330,an RF (radio frequency, radio frequency) circuit 320, an input unit 340,and a display unit 350. A person skilled in the art may understand thatthe structure of the mobile phone shown in FIG. 3 does not constitute alimitation to the mobile phone, and the mobile phone may include morecomponents or fewer components than those shown in the figure, or somecomponents may be combined, or a different component deployment may beused.

An application having a fingerprint application function, such as anapplication store (in which application software can be downloaded orpurchased) client, Alipay, WeiPay, or a bank client, may be installed onthe mobile phone 100. In this way, when the user performs acorresponding operation on an operation interface of the application byusing the input unit 340, a corresponding operation instruction isgenerated, for example, an unlock instruction or a payment instruction.After obtaining the operation instruction, the processor 380 may invokea related software program or module from the memory 330 to execute theoperation instruction.

It can be learned that the processor 380 is a control center of themobile phone 100, and is connected to various parts of the entire mobilephone by using various interfaces and lines. By running or executing thesoftware program and/or module stored in the memory 330, and invokingdata stored in the memory 330, the processor 380 performs variousfunctions of the mobile phone 100 and data processing, therebyperforming overall monitoring on the mobile phone. Optionally, theprocessor 380 may integrate an application processor and a modemprocessor. The application processor mainly processes an operatingsystem, a user interface, an application program, and the like. Themodem processor mainly processes wireless communication, Certainly, theforegoing modem processor may alternatively not be integrated into theprocessor 380.

The memory 330 may be configured to store a software program and module.The processor 380 runs the software program and module stored in thememory 330, to implement various functional applications and dataprocessing of the mobile phone 100. The memory 330 may mainly include aprogram storage area and a data storage area. The program storage areamay store an operating system (for example, system firmware), anapplication program required by at least one function (for example, afingerprint payment function and an image display function), a driver(for example, a fingerprint drive module), and the like.

The input unit 340 may be configured to: receive input digit orcharacter information, and generate a key signal input related to a usersetting and function control of the mobile phone 100. Specifically, theinput unit 340 may include a touch panel 341 and another input device342. The touch panel 341, also referred to as a touch panel, may collecta touch operation of the user on or near the touch panel (such as anoperation of the user on or near the touch panel 341 by using any properobject or accessory such as a finger or a stylus), and drive acorresponding connection apparatus based on a preset program. Inaddition to the touch panel 341, the input unit 340 may further includethe another input device 342. Specifically, the another input device 342may include, but is not limited to, one or more of a physical keyboard,a functional key (such as a volume control key or a switch key), atrackball, a mouse, and a joystick.

The display unit 350 may be configured to display information entered bythe user or information provided for the user, and various menus of themobile phone 100. The display unit 350 may include a display panel 351.The touch panel 341 may cover the display panel 351. When the touchpanel 341 detects a touch operation on or near the touch panel 341, thetouch panel 341 transmits the touch operation to the processor 380 todetermine a type of a touch event. Then, the processor 380 provides acorresponding visual output on the display panel 351 based on the typeof the touch event. Although in FIG. 3, the touch panel 341 and thedisplay panel 351 are used as two separate components to implement inputand output functions of the mobile phone 100, in some embodiments, thetouch panel 341 and the display panel 351 may be integrated to implementthe input and output functions of the mobile phone 100.

The RF circuit 320 may be configured to receive and send signals duringinformation transmission and receiving or a conversation. Generally, theRF circuit includes, but is not limited to, an antenna, at least oneamplifier, a transceiver, a coupler, an LNA (low noise amplifier, lownoise amplifier), a duplexer, and the like. In addition, the RF circuit320 may also communicate with a network and another device by means ofwireless communication. Any communication standard or protocol may beused for the wireless communication. This is not limited in thisembodiment of the present invention.

In addition, the mobile phone 100 may further include sensors such as agravity sensor, a light sensor, a gyroscope, a barometer, a hygrometer,a thermometer, and an infrared sensor, a power source supplying power tovarious components, a WiFi (wireless fidelity, wireless fidelity)module, a Bluetooth module, and the like. Details are not describedherein.

Specifically, based on a schematic structural diagram of the mobilephone 100, as shown in FIG. 4, in the fingerprint collection methodprovided in this embodiment of the present invention, when the usertriggers a fingerprint application function of an application, forexample, when the user clicks a fingerprint payment option in a shoppingapplication, the application generates a fingerprint collectioninstruction and sends the fingerprint collection instruction to theprocessor 380. The fingerprint collection instruction is used toinstruct to collect a fingerprint by using the fingerprint sensor 11integrated on the power key 12. In this case, the processor 380 invokesthe fingerprint drive module to drive the fingerprint sensor 11 tocollect the fingerprint information recorded by the user on the powerkey 12. When a finger of the user touches the power key 12, sensingunits (for example, the photosensitive diode or the phototransistormentioned above) at different locations in the fingerprint sensor 11each convert a received optical signal into a corresponding electricalsignal and store the electrical signal in the memory 330. In this way,the fingerprint drive module can determine the fingerprint informationof the user based on the electrical signals output by the sensing unitsat the different locations in the fingerprint sensor 11.

However, as shown in FIG. 5. at any moment of collecting the fingerprintinformation, if the processor 380 detects that the user triggers a firstkey event on the power key 12, for example, when the user performs ashort press or a long press on the power key 12 by using a finger,because the first key event may cause an operation such as lock screen,shutdown, or restart, the processor 380 may discard the first key event,until the fingerprint information of the user is successfully collected.That is, in a process of collecting the fingerprint information of theuser, a related function of the power key 12 may be temporarily disabledor locked. In this way, when the fingerprint sensor 11 is integrated onthe power key 12, the related function of the power key 12 does notinterfere in the process of collecting the fingerprint information,thereby avoiding a problem that a fingerprint application functionrelated to a fingerprint collection process cannot be performed anylonger.

Similarly, when the fingerprint sensor 11 is integrated on anotherfunction key (for example, a home key), to prevent, when the fingerprintsensor 11 collects the fingerprint information, the user from triggeringa corresponding function of the function key to interrupt or interferewith the fingerprint collection process, the foregoing solution may beused. The processor 380 discards the first key event after detecting thefirst key event triggered by the user on the function key.

In addition, a sensor having another function may further be integratedon the function key. The home key is used as an example. A pressuresensor may further be disposed on the home key to sense a pressing forceof the finger of the user. In this case, at any moment of collecting thefingerprint information, if it is detected that the user needs to invokethe pressure sensor to trigger a first key event on the home key, thefirst key event may be discarded, or a working status of the pressuresensor may be set to a disabled state or a locked state, therebypreventing, when the fingerprint sensor 11 collects the fingerprintinformation, the user from triggering the corresponding function of thefunction key to interrupt or interfere with the fingerprint collectionprocess.

The fingerprint collection method provided in this embodiment of thepresent invention is described in detail below with reference to theterminal provided in FIG. 1 to FIG. 3 and in which the fingerprintsensor 11 is integrated on any function key. As shown in FIG. 6, themethod includes the following steps.

101: The terminal obtains a fingerprint collection instruction, wherethe fingerprint collection instruction is used to instruct to collect afingerprint by using a fingerprint sensor integrated on a function key.

Specifically, when a user opens a target application having afingerprint application function, if the user triggers the correspondingfingerprint application function, for example, fingerprint payment,fingerprint unlock, or a fingerprint gesture, a processor of theterminal may generate a fingerprint collection instruction based on atrigger operation of the user, and send the fingerprint collectioninstruction to a fingerprint drive module of the terminal. Thefingerprint collection instruction is used to instruct the fingerprintdrive module to collect the fingerprint of the user by using thefingerprint sensor integrated on the function key.

Certainly, for some fingerprint application functions in a system of theterminal, for example, fingerprint unlock or opening differentapplications by using different fingerprints, after detecting that theuser triggers the fingerprint application function, the terminal maygenerate the foregoing fingerprint collection instruction.

Alternatively, the fingerprint collection instruction may also be sentby another terminal or an external device. This is not limited in thisembodiment of the present invention. For example, when a wearable deviceused by the user needs to collect a fingerprint by using the terminal,the wearable device may send the fingerprint collection instruction tothe terminal.

102: The terminal sets a key status bit of the function key to a lockedstate, where the key status bit is used to indicate that a function ofthe function key is in a locked state or an unlocked state.

In a memory of the terminal, the key status bit may be set for thefunction key. The key status bit is used to indicate that the functionof the function key is in the locked state or the unlocked state. Thatthe function key is a power key is used as an example. One bit may beused as a key status bit of the power key. When the bit is 0, itindicates that a function of the power key is in an unlocked state. Thatis, each related function (for example, a lock screen or wakeup functiontriggered by a short press on the power key, or a screenshot functiontriggered by a long press on the power key) of the power key is in anormal running state. When the bit is 1, it indicates that a function ofthe power key is in a locked state. That is, each related function ofthe power key is disabled or the power key temporarily stops working.

In step 102, after the fingerprint drive module of the terminal obtainsthe fingerprint collection instruction, the key status bit of thefunction key may be set to the locked state, so as to ensure that eachrelated function of the function key is disabled in a subsequentfingerprint collection process.

103: The terminal collects, by using the fingerprint sensor based on thefingerprint collection instruction, fingerprint information recorded bya user on the function key.

In step 103, the fingerprint drive module may invoke the fingerprintsensor to collect the fingerprint information recorded by the user onthe function key. For example, the fingerprint drive module sets thefingerprint sensor to a ready (Ready) state, so that the fingerprintsensor is powered on, to wait for the user to record a fingerprint onthe function key.

104: If the terminal obtains, on the function key at any moment ofcollecting the fingerprint information, a first key event triggered bythe user, the terminal generates a first operation instructioncorresponding to the first key event.

The first key event may be any operation other than a fingerprintrecording event, for example, a press operation on the function key.This is not limited in this embodiment of the present invention.

Specifically, when step 103 is being performed, that is, when thefingerprint information is being collected, if the first key eventtriggered by the user is obtained on the function key, the processor ofthe terminal invokes system firmware in the memory to generate the firstoperation instruction corresponding to the first key event.

For example, that the function key is a power key is still used as anexample. When a finger of the user touches the power key to input thefingerprint information, once the first key event triggered by the useron the power key is detected, for example, a long press on the power keyor a short press on the power key, the processor is triggered to invokethe system firmware to generate the first operation instructioncorresponding to the first key event. For example, in a screen wakeupstate, a first operation instruction corresponding to a long press onthe power key is a screenshot instruction, and a first operationinstruction corresponding to a short press on the power key is a lockscreen instruction.

105: The terminal checks a status of the key status bit.

106: The terminal discards the first operation instruction if the keystatus bit is in the locked state.

Different from the prior art, after generating the first operationinstruction corresponding to the first key event, the terminaldetermines, by querying the status of the key status bit, whether toexecute the first operation instruction.

Specifically, if the key status bit is in the locked state, it indicatesthat the current terminal is collecting the fingerprint information ofthe user by using the fingerprint sensor. Each related function of thefunction key is disabled or the function key temporarily stops working.In this case. the terminal may directly discard the first operationinstruction, that is, discard the first key event.

In this way, a function of temporarily disabling the related function ofthe function key in a process of collecting the fingerprint informationof the user may be implemented based on an existing procedure ofgenerating a corresponding operation instruction by invoking the systemfirmware, thereby reducing modifications of a related program such asthe system firmware in the terminal, and reducing implementation costsof the terminal provided in this embodiment of the present invention.

Optionally, in step 106, if the key status bit is in the locked state,the terminal displays a prompt dialog box, to prompt the user whether toperform an operation (for example, lock screen, shutdown, restart, orstandby) corresponding to the first key event. If the user chooses toperform the operation corresponding to the first key event, the terminalperforms the operation corresponding to first key event. If the userchooses not to perform the operation corresponding to the first keyevent, the terminal discards the first operation instruction.

For example, in a fingerprint payment authentication process, the userpresses the power key (a fingerprint sensor is integrated on the powerkey). In this case, the user may want to give up fingerprint payment(for example, the user gives up payment because the user abandonspurchasing of a product), and the terminal prompts the user whether tocontinue the fingerprint payment or perform a lock screen operation. Ifthe user chooses to perform the lock screen operation, the terminalterminates a payment operation and locks a screen. If the user choosesto perform a fingerprint payment operation, the terminal continues toperform the fingerprint payment operation and discards a power keyevent.

Alternatively, if the key status bit is in the locked state, theterminal may not immediately discard the first operation instruction,but temporarily store the first operation instruction. For example, whenthe key status bit is in the locked state, the terminal may set a timerfor timing. In a preset time period, the generated first operationinstruction is stored in a buffer, and the first operation instructionis discarded at the end of the preset time period.

In this way, if collection of the fingerprint information of the user iscompleted in the preset time period, the terminal may still perform thefirst operation instruction based on the first operation instruction,thereby restoring the first key event triggered by the user.

Further, after obtaining the first key event, the terminal may furtherdetermine a priority of the first key event and a priority of collectingthe fingerprint information. Optionally, the first key event and afingerprint collection event have different priority values (that is,priority value). A larger priority value indicates a lower prioritylevel.

For example, the terminal may determine, based on a system messagerunning in the terminal, that the current terminal is in a screen-onstate, screen-off state, or a lock screen state.

In this case, when the terminal is in the screen-on state, the user maydirectly record the fingerprint information on the power key. In thiscase, the first key event triggered by the user on the power keyinterferes with a fingerprint recording process. Therefore, it may bedetermined that a priority value of collecting the fingerprintinformation is 1, and a priority value of the first key event is 2 (apriority level indicated by the priority value 1 is higher than apriority level indicated by the priority value 2).

When the terminal is in the screen-off state or the lock screen state,the terminal first needs to wake up a screen by performing the first keyevent, and then can record the fingerprint information on the power key.Therefore, it may be determined that a priority value of collecting thefingerprint information is 2, and a priority value of the first keyevent is 1.

In this case, in step 106, the terminal may further determine whetherthe first operation instruction needs to be discarded based on thepriority of the first key event and the priority of collecting thefingerprint information.

For example, after receiving the fingerprint collection instruction, theterminal automatically switches to the screen-off state if the userperforms no operation for a long time. In this case, if the first keyevent, for example, a short press on the power key, triggered by theuser on the power key is obtained, Where the short press operation onthe power key can wake up the screen of the terminal, and if the firstoperation instruction corresponding to the first key event is directlydiscarded, the terminal switches to the lock screen state after being inthe screen-off state for a time period. In this case, the user cannotrecord the fingerprint information. Therefore, the terminal may firstdetermine that the priority value of collecting the fingerprintinformation is 2, and that the priority value of the first key event is1; and further, compare the priority of the first key event and thepriority of collecting the fingerprint information, and perform thefirst key event having a higher priority.

107: The terminal sets the key status bit to an unlocked state aftercollecting the fingerprint information of the user.

When collecting the fingerprint information of the user, the fingerprintsensor stores a generated electrical signal into the memory. Thefingerprint drive module matches the stored electrical signal withfingerprint information prestored by the user. If the matching succeeds,it indicates that authentication of an identity of the user succeeds. Ifthe matching fails, it indicates that authentication of an identity ofthe user fails. No matter whether the authentication of the identitysucceeds or fails, an authentication result needs to be sent to thetarget application that triggers the fingerprint collection process. Inthis case, it may be considered that the fingerprint information of theuser has been successfully collected. Further, the terminal can changethe key status bit from the locked state to the unlocked state, so thatthe related function of the function key returns to normal.

It should be noted that as shown in FIG. 7, that a fingerprint paymentfunction is the foregoing fingerprint application function is used as anexample. Based on a chronological order in the fingerprint paymentprocedure performed by the user, the fingerprint payment procedure maybe divided into: opening a target application (the target applicationincludes the fingerprint payment function)—triggering the fingerprintpayment function (as shown in FIG. 1, the user clicks a fingerprintpayment option)—collecting a fingerprint—fingerprint authentication—afingerprint payment result.

In this case, as shown in FIG. 7, the terminal may set the key statusbit of the function key to the locked state at a moment T1 at which theuser opens the target application, may set the key status bit of thefunction key to the locked state at a moment T2 at which the usertriggers the fingerprint payment function, or may set the key status bitof the function key to the locked state at a moment T3 at which afingerprint touch is detected and a fingerprint starts to be collected.That is, the terminal may set the key status bit of the function key tothe locked state at any moment from a time point at which the user opensthe target application to a time point at which the fingerprint startsto be collected (that is, a time period of T1 to T3 in FIG. 7), so as toensure that each related function of the function key is disabled in thesubsequent fingerprint collection process.

Correspondingly, the terminal may set the key status bit to the unlockedstate at a moment T4 at which fingerprint collection ends, may set thekey status bit to the unlocked state at a moment T5 at which fingerprintauthentication is performed, or may set the key status bit to theunlocked state when a fingerprint payment result is obtained, that is,at a moment T6 at which the fingerprint payment is completed. That is,the terminal may set the key status bit to the unlocked state at anymoment from a time point at which the fingerprint collection ends to atime point at which the fingerprint payment is completed (that is, atime period of T4 to T6 in FIG. 7), thereby restoring an originalfunction of the function key.

If the terminal sets the key status bit to the unlocked state when thefingerprint collection ends, the related function of the function keycan be restored for the user as soon as possible. If the terminal setsthe key status bit to the unlocked state after the fingerprintauthentication, it can be ensured that there is no interference from theoriginal function of the function key in the fingerprint collectionprocess and the fingerprint authentication process. If the terminal setsthe key status bit to the unlocked state when the fingerprint payment iscompleted, it can be ensured that there is no interference from theoriginal function of the function key before the fingerprint payment iscompleted, thereby improving payment reliability. Certainly, the usermay set, based on an actual requirement, a time for changing the keystatus bit. This is not limited in this embodiment of the presentinvention.

Further, if the terminal already stores the first operation instructionin step 106, after step 107 is performed, that is, after the terminalsets the key status bit to the unlocked state, the terminal may furtherexecute the first operation instruction. In this way, the terminal notonly can be prevented from being interfered by the original function ofthe function key in the fingerprint collection process but also cancomplete the first key event triggered by the user.

Optionally, as shown in FIG. 5, in the fingerprint payment process, theterminal usually displays a current payment status to the user in realtime. In this case, if the terminal immediately executes the firstoperation instruction, for example, an instruction of returning to aterminal desktop, after the terminal completes the fingerprintcollection, learning of a payment result of the fingerprint payment bythe user is affected. Therefore, as shown in FIG. 7, the terminal mayexecute the first operation instruction at or after the moment T6 atwhich the fingerprint payment is completed. In this way, it can beensured that the terminal executes the first operation instruction aftercompleting the fingerprint payment and displaying the payment result tothe user, improving user experience. The terminal displays thefingerprint payment result at the moment T6 by using the display unit350 (FIG. 3), for example, displaying a user interface including textcontent of “payment succeeds.”

Certainly, for other fingerprint application functions, for example, anapplication function such as fingerprint unlock or a fingerprint gesturefor which the fingerprint of the user needs to be collected,interference from the original function of the function key in thefingerprint collection process can be avoided by setting the key statusbit based on the foregoing method.

Subsequently, still as shown in FIG. 6, the terminal may further performthe following step 201 to step 204, that is, trigger the relatedfunction of the function key.

201: The terminal obtains a second key event triggered by the user onthe function key.

The second key event is the same as or different from the first keyevent. For example, the second key event may be a short press or a longpress on the function key.

202: The terminal generates, based on the second key event, a secondoperation instruction corresponding to the second key event.

Similar to step 104, once the second key event, for example, a longpress on the power key, triggered by the user on the function key isdetected, the processor is triggered to invoke the system firmware inthe memory to generate the second operation instruction corresponding tothe second key event. For example, a second operation instructioncorresponding to the long press on the power key is a screenshotinstruction.

203: The terminal checks the status of the key status bit.

204: The terminal executes the second operation instruction if the keystatus bit is in the unlocked state.

Similar to step 105 and step 106, after generating the second operationinstruction corresponding to the second key event, the terminal candetermine, still by querying the status of the key status bit, whetherto execute the second operation instruction.

Different from step 106, because the key status bit has been set to theunlocked state in step 107, that is, each related function of thefunction key is in a normal running state. That is, executing the secondoperation instruction and collecting the fingerprint information do notconflict with each other in this case. Therefore, the terminal candirectly execute the second operation instruction.

In this way, this embodiment of the present invention provides thefingerprint collection method, so that in the process of collecting thefingerprint information of the user, the related function of thefunction key integrating the fingerprint sensor can be temporarilydisabled. In this way, the related function of the function key does notinterfere in the process of collecting the fingerprint information byusing the fingerprint sensor, thereby avoiding a problem that thefingerprint application function related to the fingerprint collectionprocess cannot be performed any longer.

For example, FIG. 8 is a schematic architectural diagram of a tabletcomputer 200. The fingerprint collection method is described below byusing the tablet computer 200 as an example.

The tablet computer 200 may have a Windows operating system. A component42 used for a Windows biometric service (Windows biometric service) anda fingerprint application (Application, APP) 43 having a fingerprintapplication function are run on a core 41 of the Windows operatingsystem. The component 42 includes a fingerprint drive module provided bya fingerprint provider, for example, an engine adapter (Engine Adapter)44. The engine adapter 44 may be configured to detect status informationof a fingerprint sensor 48. For example, the engine adapter 44 may set astatus of the fingerprint sensor 48 to a ready (Ready) state, so thatthe fingerprint sensor 48 is powered on, to wait for the user to recorda fingerprint on a function key 47.

In this embodiment of the present invention, a first dynamic linklibrary (Dynamic Link Library, DLL) 45 and an EC (Embedded Control,embedded control) system firmware 46 may be additionally introduced inthe tablet computer 200.

The first dynamic link library 45 can obtain the status information ofthe fingerprint sensor that is sent by the engine adapter 44, and candetect a lock screen, hibernation, standby, or restart message or thelike generated by the Windows system, that is, obtain applicationscenario information of the tablet computer 200.

In this case, the first dynamic link library 45 can invoke the EC systemfirmware 46 to lock or unlock a related function of the function key 47based on the status information of the fingerprint sensor 48 and theapplication scenario information.

For example, when the user triggers a fingerprint payment function ofthe fingerprint application 43, the fingerprint application 43 generatesa fingerprint collection instruction, triggering the component 42 towait for, by using the fingerprint sensor 48, the user to record afingerprint on the function key 47. In this case, the engine adapter 44may set the fingerprint sensor 48 to a ready state, and send the readystate of the fingerprint sensor 48 to the first dynamic link library 45.In this case, if the first dynamic link library 45 detects that thecurrent tablet computer 200 is in a screen-on state, that is, a priorityof collecting the fingerprint information is higher than a priority of afirst key event, the first dynamic link library 45 invokes the EC systemfirmware 46 to lock the related function of the function key 47.

In this way, in a process of collecting the fingerprint information, ifthe first key event triggered by the user is obtained on the functionkey 47, the first dynamic link library 45 may directly discard the firstkey event, or temporarily store the first key event, and executes afirst operation instruction corresponding to the first key event afterthe fingerprint information of the user is collected, thereby avoidinginterference from the related function of the function key 47 in theprocess of collecting the fingerprint information.

Further, when the first dynamic link library 45 detects a lock screenmessage generated by the Windows system, that is, the tablet computer200 is in a locked state, the user needs to unlock the tablet computer200 and then can normally use a function such as the fingerprintapplication 43. In this case, the first dynamic link library 45 invokesthe EC system firmware 46 to unlock the related function of the functionkey 47.

Similarly, when detecting a hibernation, standby, or restart messagegenerated by the Windows system, the first dynamic link library 45 mayalso invoke the EC system firmware 46 to unlock the related function ofthe function key 47.

In addition, as shown in FIG. 8, a second dynamic link library 44 mayfurther be provided in the tablet computer 200. Cooperating with theWindows operating system, the second dynamic link library 44 may providea read/write (Read/Write) interface between the first dynamic linklibrary 45 and the EC system firmware 46, thereby establishing acommunications channel between the first dynamic link library 45 and theEC system firmware 46.

Further, as shown in FIG. 8, a fingerprint-information executableprogram 49 may further be provided in the tablet computer 200. Theexecutable program 49 may display, by using an animation based on thestatus information of the fingerprint sensor 48 and the applicationscenario information that are obtained by the first dynamic link library45, each status of recording the fingerprint by the user and afingerprint authentication or payment result, for example, informationsuch as a payment success/failure, so as to inform the user of a currentfingerprint status, and establish a friendly man-machine interface forthe user.

An embodiment of the present invention provides a fingerprint collectionmethod. As shown in FIG. 9, the method includes the following steps.

301: A terminal obtains a fingerprint collection instruction, where thefingerprint collection instruction is used to instruct to collect afingerprint by using a fingerprint sensor integrated on a function key.

302: In response to the fingerprint collection instruction, the terminalcollects, by using the fingerprint sensor, fingerprint informationrecorded by a user on the function key.

Specifically, in step 301, when the user triggers a correspondingfingerprint application function, for example, fingerprint payment,fingerprint unlock, or a fingerprint gesture, a processor of theterminal may generate a fingerprint collection instruction based on atrigger operation of the user, and send the fingerprint collectioninstruction to a fingerprint drive module of the terminal. Thefingerprint collection instruction is used to instruct the fingerprintdrive module to collect the fingerprint of the user by using thefingerprint sensor integrated on the function key.

For example, in the following embodiments, descriptions are provided byusing an example in which a power key is used as the foregoing functionkey. It may be understood that the function key may alternatively be ahome key, a volume adjustment key, or the like. This is not limited inthis embodiment of the present invention.

In step 302, the terminal may invoke, by using the fingerprint drivemodule, the fingerprint sensor to collect the fingerprint informationrecorded by the user on the power key. For example, the fingerprintdrive module sets the fingerprint sensor on the power key to a ready(Ready) state, so that the fingerprint sensor is powered on, to wait forthe user to record a fingerprint on the power key.

303: The terminal obtains, on the function key at any moment ofcollecting the fingerprint information, a key operation triggered by theuser.

304 a: The terminal discards the key operation when key duration of thekey operation is shorter than first preset duration.

304 b: The terminal executes an operation instruction corresponding to ashort press operation when key duration of the key operation is longerthan first preset duration and shorter than second preset duration.

304 c: The terminal executes an operation instruction corresponding to along press operation when key duration of the key operation is longerthan second preset duration.

Because the fingerprint sensor is integrated on the power key, the powerkey has both a fingerprint collection function and an original keyfunction of the power key (for example, a lock screen function or ashutdown function). In this case, to avoid a conflict with the originalkey function in a fingerprint collection process, when the fingerprintinformation of the user is collected, if a key operation triggered bythe user is obtained on the power key, the terminal may determine, basedon key duration of the key operation on the power key, whether the keyoperation is an accidental touch operation.

Specifically, as shown in FIG. 10, a power key 401 of the terminal isconnected to an input end 402 a of a PMIC (power management integratedcircuit, power management integrated circuit), an output end 402 b ofthe PMIC is connected to an input end 403 a of an EC (Embedded Control,embedded control) system firmware, and an output end 403 b of the ECsystem firmware is connected to a processor 380 of the terminal by usinga system bus.

In this case, at any moment of collecting the fingerprint information,the user usually touches, by using a finger, a fingerprint sensordisposed on a surface of the power key 401, so that the fingerprintsensor collects the fingerprint information. Once the user triggers akey operation on the power key 401, the power key 401 is closed, acircuit shown in FIG. 10 is conducted after the power key 401 is closed.In this case, the power key 401 generates a power key signal (forexample, the power key signal is a low-level signal), and sends thepower key signal to the input end 402 a of the PMIC. The PMIC sends thepower key signal to the input end 403 a of the EC by using the outputend 402 b of the PMIC. The EC starts timing after obtaining the powerkey signal, so as to obtain key duration of the key operation performedby the user on the power key 401.

In this case, as shown by (a) in FIG. 11, when key duration for thepower key signal (that is, a low-level signal in (a) in FIG. 11) isshorter than the first preset duration, because the key duration isrelatively short, it may be considered that the key operation isaccidentally performed by the user. That is, the intention of the userin this case still is performing the fingerprint collection function onthe power key instead of performing the original key function of thepower key. Therefore, the terminal may discard the key operation,thereby implementing a foolproof touch function.

Correspondingly, as shown by (b) in FIG. 11, when key duration for thepower key signal (that is, a low-level signal in (b) in FIG. 11) islonger than the first preset duration and shorter than the second presetduration, it may be considered that the key operation is an effectiveshort press operation. In this case, the terminal may report the powerkey signal to the processor 380 by using the system bus. The processor380 executes an operation instruction corresponding to the short pressoperation, for example, a hibernation instruction, a sleepinginstruction, or a display off instruction. This is not limited in thisembodiment of the present invention.

In addition, as shown by (c) in FIG, 11, when key duration for the powerkey signal (that is, a low-level signal in (c) in FIG. 11) is longerthan the second preset duration, it may be considered that the keyoperation is an effective long press operation. In this case, theterminal may report the power key signal to the processor 380 by usingthe system bus. The processor 380 executes an operation instructioncorresponding to the long press operation, for example, a forcedshutdown instruction or a screenshot instruction. This is not limited inthis embodiment of the present invention.

The second preset duration is longer than the first preset duration. Forexample, a time difference between the second preset duration and thefirst preset duration is four seconds. Certainly, a person skilled inthe art may set the first preset duration and/or the second presetduration based on actual experience or an actual application scenario.In addition, a corresponding setting interface may further be providedin the terminal, so that the user may adjust a value of the first presetduration and/or the second preset duration by using the settinginterface. This is not limited in this embodiment of the presentinvention.

In this way, based on the fingerprint collection method shown in step301 to step 304 (step 304 includes 304 a to 304 c), the terminal maydiscard a key operation having relatively short key duration (whichusually is an accidental touch operation) in the fingerprint collectionprocess. In this way, key operations having relatively short keyduration do not interfere with a normal fingerprint collection process.However, when key duration of a key operation is relatively long, thekey operation is usually intentionally performed by the user. In thiscase, the terminal may trigger the original key function of the powerkey, thereby avoiding a conflict between a fingerprint collectionfunction and the original key function of the power key when afingerprint sensor is integrated on the power key.

Further, before determining whether a current key operation is anaccidental touch operation, the terminal may first obtain a currentscreen status. When a screen is in a screen-on state (in this case, thescreen may be in an unlocked state or a locked state, and this is notlimited in this embodiment of the present invention), whether thecurrent key operation is an accidental touch operation may further bedetermined based on the foregoing key duration. When the screen is notin the screen-on state (for example, a screen-off state), the terminaldoes not need to perform a foolproof touch operation, but directlyreports the power key signal generated by the power key 401 to theprocessor 380 by using the system bus. The processor 380 executes anoperation instruction corresponding to the power key signal, to reducepower consumption of the terminal.

In addition, the EC may further interact with the fingerprint drivemodule. When the user triggers the key operation on the power key, theEC reports information about the key operation to the fingerprint drivemodule. The fingerprint drive module may determine an applicationscenario of a current terminal. For example, the current terminal is ina target application scenario such as a lock screen state, a fingerprintrecording state, or a fingerprint identification state. In this case, asshown in FIG. 12, when the terminal is in the lock screen state, thefingerprint drive module may instruct the EC to adjust the value of thefirst preset duration, for example, increasing the value of the firstpreset duration, until a current fingerprint unlock operation iscompleted.

In this way, when the terminal performs a fingerprint-related functionsuch as unlock, fingerprint recording, or fingerprint payment, afingerprint collection (or fingerprint identification) process that isbeing performed is not interrupted or interfered with due to the keyoperation triggered by the user on the power key.

It may be understood that to implement the foregoing functions, theforegoing various network elements such as the terminal include hardwarestructures and/or software modules corresponding to the variousfunctions. A person of ordinary skill in the art should be easily awarethat in combination with units and algorithm steps in the examplesdescribed in the embodiments disclosed in this specification, thepresent invention can be implemented by hardware or a combination ofhardware and computer software. Whether a function is performed byhardware or computer software driving hardware depends on particularapplications and design constraint conditions of the technicalsolutions. A person skilled in the art may use different methods toimplement the described functions for each particular application, butit should not be considered that the implementation goes beyond thescope of the present invention.

In the embodiments of the present invention, functional module divisionmay be performed on the terminal based on the examples of the methods.For example, various functional modules may be divided based on thecorresponding functions, or two or more functions may be integrated intoone processing module. The integrated module may be implemented in aform of hardware, or may be implemented in a form of a softwarefunctional module. It should be noted that the module division in theembodiments of the present invention is an example, and is merelylogical function division. There may be another division manner in anactual implementation.

When various functional modules are divided based on the correspondingfunctions, FIG. 13 is a possible schematic structural diagram of theterminal in the foregoing embodiments. The terminal includes anobtaining unit 31, a collection unit 32, a shielding unit 33, a settingunit 34, and an execution unit 35.

The obtaining unit 31 is configured to support the terminal inperforming the processes 101 and 201 in FIG. 6 and the processes 301 and303 in FIG. 9. The collection unit 32 is configured to support theterminal in performing the process 103 in FIG. 6 and the process 302 inFIG. 9. The shielding unit 33 is configured to support the terminal inperforming the processes 104 to 106 in FIG. 6. The setting unit 34 isconfigured to support the terminal in performing the processes 102 and106 in FIG. 6. The execution unit 35 is configured to support theterminal in performing the processes 202 to 204 in FIG. 6 and theprocesses 304 a to 304 c in FIG. 9. All related content of the steps inthe foregoing method embodiments may be referred for the functionaldescriptions of the corresponding functional modules. Details are notdescribed herein again.

When an integrated unit is used, FIG. 13 is a possible schematicstructural diagram of the terminal in the foregoing embodiments. Theterminal includes a processing module 1302 and a communications module1303. The processing module 1302 is configured to control and manage anaction of the terminal. For example, the processing module 1302 isconfigured to support the terminal in performing the processes 101 to107 and 201 to 204 in FIG. 6, and/or configured to perform anotherprocess in a technology described in this specification. Thecommunications module 1303 is configured to support the terminal incommunicating with another network entity. The terminal may furtherinclude a storage module 1301, configured to store program code and dataof the terminal.

The processing module 1302 may be a processor or a controller, and forexample, may be a central processing unit (Central Processing Unit,CPU), a general purpose processor, a digital signal processor (DigitalSignal Processor, DSP), an application-specific integrated circuit(Application-Specific Integrated Circuit, ASIC), a field programmablegate array (Field Programmable Gate Array, FPGA) or another programmablelogical device, a transistor logical device, a hardware component, orany combination thereof. The controller/processor can implement orperform various examples of logic blocks, modules, and circuitsdescribed with reference to content disclosed in the present invention.The processor may also be a combination that implements a calculationfunction, for example, including one microprocessor or a combination ofmultiple microprocessors, or a combination of a DSP and amicroprocessor. The communications module 1303 may be a transceiver, atransmission/receiving circuit, a communications interface, or the like.The storage module 1301 may be a memory.

That the terminal is a mobile phone is used as an example. When theprocessing module 1302 is a processor, the communications module 1303 isa communications interface, and the storage module 1301 is a memory, theterminal in the embodiments of the present invention may be the mobilephone 100 shown in FIG. 3 or the tablet computer 200 shown in FIG. 8.

All or sonic of the foregoing embodiments may be implemented by means ofsoftware, hardware, firmware, or any combination thereof. When softwareis used to implement the embodiments, the embodiments may be implementedcompletely or partially in a form of a computer program product. Thecomputer program product includes one or more computer instructions.When the computer program instructions are loaded and executed on thecomputer, the procedure or functions according to the embodiments of thepresent invention are all or partially generated. The computer may be ageneral-purpose computer, a dedicated computer, a computer network, orother programmable apparatuses. The computer instructions may be storedin a computer-readable storage medium or may be transmitted from acomputer-readable storage medium to another computer-readable storagemedium. For example, the computer instructions may be transmitted from awebsite, computer, server, or data center to another website, computer,server, or data center in a wired (for example, a coaxial cable, anoptical fiber, or a digital subscriber line (DSL)) or wireless (forexample, infrared, radio, and microwave, or the like) manner. Thecomputer-readable storage medium may be any usable medium accessible bya computer, or a data storage device, such as a server or a data center,integrating one or more usable media. The usable medium may be amagnetic medium (for example, a soft disk, a hard disk, or a magnetictape), an optical medium (for example, a DVD), a semiconductor medium(for example, a solid state disk (SSD)), or the like.

The foregoing descriptions are merely specific implementations of thisapplication, but are not intended to limit the protection scope of thisapplication. Any variation or replacement within the technical scopedisclosed in this application shall fall within the protection scope ofthis application. Therefore, the protection scope of this applicationshall be subject to the protection scope of the claims.

1.-28. (canceled)
 29. A fingerprint collection method, implemented by aterminal, and the fingerprint collection method comprising: obtaining afingerprint collection instruction, wherein the fingerprint collectioninstruction instructs the terminal to collect a fingerprint using afingerprint sensor integrated on a function key; setting a key status ofthe function key to a locked state; collecting, using the fingerprintsensor based on the fingerprint collection instruction, fingerprintinformation of a user; obtaining a first key event of the function keyfrom the user; generating, based on the first key event, a firstoperation instruction corresponding to the first key event; determiningthat the key status is the locked state; and discarding the firstoperation instruction.
 30. The fingerprint collection method of claim29, wherein discarding the first key event comprises: determining apriority of the first key event and a priority of collecting thefingerprint information, and discarding the first key event when thepriority of collecting the fingerprint information is higher than thepriority of the first key event.
 31. The fingerprint collection methodof claim 29, further comprising setting the key status to an unlockedstate after collecting the fingerprint information of the user.
 32. Thefingerprint collection method of claim 31, further comprising executingthe first operation instruction.
 33. The fingerprint collection methodof claim 31, wherein after setting the key status to the unlocked state,the fingerprint collection method further comprises: obtaining a secondkey event from the user on the function key; generating, based on thesecond key event, a second operation instruction corresponding to thesecond key event; determining that the key status is the unlocked state;and executing the second operation instruction.
 34. The fingerprintcollection method of claim 29, wherein obtaining the fingerprintcollection instruction comprises: detecting that a fingerprintapplication function in a target application is triggered; and obtainingthe fingerprint collection instruction.
 35. The fingerprint collectionmethod of claim 29, further comprising: detecting that a key duration ofthe first key event is less than a first preset duration; and discardingthe first operation instruction in response to the determining that thekey duration of the first key event is less than the first presetduration.
 36. The fingerprint collection method of claim 29, furthercomprising: detecting that a key duration of the first key event isgreater than the first preset duration and less than a second presetduration, wherein the second preset duration is greater than the firstpreset duration; and executing an operation instruction corresponding toa short press operation.
 37. The fingerprint collection method of claim29, further comprising: detecting that a key duration of the first keyevent is greater than a second preset duration, wherein the secondpreset duration is greater than the first preset duration; and executingan operation instruction corresponding to a long press operation.
 38. Aterminal, comprising: a function key; a fingerprint sensor integrated onthe function key; at least one processor coupled to the function key andthe fingerprint sensor; and a memory coupled to the at least oneprocessor and configured to store programming instructions that, whenexecuted by the at least one processor, cause the terminal to: obtain afingerprint collection instruction, wherein the fingerprint collectioninstruction instructs to collect a fingerprint using the fingerprintsensor integrated on the function key; collect fingerprint informationof a user using the fingerprint sensor based on the fingerprintcollection instruction; obtain a key event of the function key from theuser; generate a first operation instruction corresponding to the keyevent; and discard the first operation instruction when the key durationof the key event is less than the first preset duration.
 39. Theterminal of claim 38, wherein the programming instructions, whenexecuted by the at least one processor, further cause the terminal toexecute an operation instruction corresponding to a short pressoperation when the key duration of the key operation is greater than thefirst preset duration and less than second preset duration, wherein thesecond preset duration is greater than the first preset duration. 40.The terminal of claim 38, wherein the programming instructions whenexecuted by the at least one processor, further cause the terminal toexecute an operation instruction corresponding to a long press operationwhen the key duration of the key operation is greater than the secondpreset duration.
 41. The terminal of claim 38, wherein the programminginstructions, when executed by the at least one processor, further causethe terminal to adjust a value of the first preset duration based on acurrent application scenario.
 42. The terminal of claim 38, wherein theprogramming instructions, when executed by the at least one processor,further cause the terminal to authenticate an identity of the user usingthe fingerprint information.
 43. A terminal, comprising: a function key;a fingerprint sensor integrated on the function key; at least oneprocessor coupled to the function key and the fingerprint sensor; and amemory coupled to the at least one processor and configured to storeprogramming instructions that, when executed by the at least oneprocessor, cause the terminal to: obtain a fingerprint collectioninstruction, wherein the fingerprint collection instruction instructsthe terminal to collect a fingerprint using the fingerprint sensorintegrated on the function key; set a key status of the function key toa locked state; collect fingerprint information of a user using thefingerprint sensor based on the fingerprint collection instruction;obtain a first key event of the function key from the user; generate,based on the first key event, a first operation instructioncorresponding to the first key event; determine that the key status isthe locked state; and discard the first operation instruction.
 44. Theterminal of claim 43, wherein when discarding the first key event, theprogramming instructions, when executed by the at least one processor,further cause the terminal to: determine a priority of the first keyevent and a priority of collecting the fingerprint information; anddiscard the first key event when the priority of collecting thefingerprint information is higher than the priority of the first keyevent.
 45. The terminal of claim 43, wherein the programminginstructions, when executed by the at least one processor, further causethe terminal to set the key status to an unlocked state after collectingthe fingerprint information of the user.
 46. The terminal of claim 45,wherein the programming instructions, when executed by the at least oneprocessor, further cause the terminal to execute the first operationinstruction.
 47. The terminal of claim 45, wherein the programminginstructions, when executed by the at least one processor, further causethe terminal to: obtain a second key event from the user on the functionkey; generate, based on the second key event, a second operationinstruction corresponding to the second key event; determine that thekey status is the unlocked state; and execute the second operationinstruction.
 48. The terminal of claim 43, wherein when obtaining thefingerprint collection instruction, the programming instructions, whenexecuted by the at least one processor, further cause the terminal to:detect that a fingerprint application function in a target applicationis triggered; and obtain the fingerprint collection instruction.