CN105574400B - A kind of information processing method and electronic equipment - Google Patents
A kind of information processing method and electronic equipment Download PDFInfo
- Publication number
- CN105574400B CN105574400B CN201410643500.7A CN201410643500A CN105574400B CN 105574400 B CN105574400 B CN 105574400B CN 201410643500 A CN201410643500 A CN 201410643500A CN 105574400 B CN105574400 B CN 105574400B
- Authority
- CN
- China
- Prior art keywords
- information
- electronic equipment
- user
- biological information
- default
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of information processing methods, are applied to the first electronic equipment, the method includes:In first electronic equipment and the second electronic equipment there are when the communication connection, the first solicited message of currently running first application program of the second electronic equipment is obtained;When first solicited message is the authentication request information to the first user, detection obtains the first biological information of first user in presumptive area;First biological information and the first default biological information are subjected to matching verification, obtain verification result;The first authentication information is generated according to the verification result, sends first authentication information to second electronic equipment.The above method provided by the invention, a kind of the technique effect that convenient secure log verification can be realized in multiple equipment can be realized for solving to lack in the prior art the technical issues of realizing convenient, secure log verification method and electronic equipment in multiple equipment.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method and electronic equipment.
Technical background
As the number of applications installed on the intelligent terminals such as mobile phone, tablet computer is more and more, answered in user's use
When with the process of program, it is necessary to which the boundary for the normal operation for logining application program could be realized by inputting the information such as username and password
Face.But the corresponding username and password of different application programs may be different, such as:User sets QQ application programs
Fixed logon information 1 is user name 1 and password 1, and for Taobao's application program, logon information 2 set by user is user name 2
With password 2.As the number of applications installed on electronic equipment is more and more, user needs the logon information remembered increasingly
It is more, and the logon information remembered accurately can must just guarantee to log in corresponding application program.
Present inventor has found that the prior art at least exists during realizing the technical solution of the embodiment of the present application
Following technical problem:
It needs to input different logon accounts when different applications since in the prior art, user logs on an electronic device
Information, this requires user to remember multiple and different log-on messages.Even if the existing side logged in by modes such as biological informations
Method also only in a privately owned equipment, and can not step on the account of fingerprint application and application program in multiple and different equipment
Record.So lacking a kind of method and electronics that can realize convenient secure log verification in multiple equipment in the prior art
Equipment.
Invention content
A kind of information processing method of offer of the embodiment of the present invention and electronic equipment, it is a kind of for solving to lack in the prior art
It can be the technical issues of realizing convenient, secure log verification method and electronic equipment in multiple equipment, realizing can
The technique effect of convenient secure log verification is realized in multiple equipment.
A kind of information processing method is applied to the first electronic equipment, and first electronic equipment can be with the second electronic equipment
Communication connection is established, the method includes:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronics to set
First solicited message of standby currently running first application program;
When first solicited message is the authentication request information to the first user, detection obtains described in presumptive area
The first biological information of first user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, first authentication information to second electronics is sent and sets
It is standby.
Optionally, first authentication information includes the login identity that the first user is used to login first application program
Information.
Optionally, described that first biological information and the first default biological information are subjected to matching verification, it is verified
As a result, specifically including:
Judge whether first biological information matches with the described first default biological information, obtains first and judge knot
Fruit;
Based on first judging result, the verification result is generated, wherein when first judging result is to be,
The verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
Optionally, described to be recognized according to verification result generation first when the verification result is the successful match
Information is demonstrate,proved, first authentication information is sent to second electronic equipment, specifically includes:
Based on the communication connection, the identification information of first application program is obtained;
Based on the described first default biological information and the identification information, first authentication information is generated;
First authentication information is sent to second electronic equipment.
Optionally, the first solicited message for obtaining currently running first application program of the second electronic equipment it
Afterwards, and when first solicited message is to the authentication request information of the first user, detection obtains described the in presumptive area
Before the first biological information of one user, the method further includes:
It is that first user inputs the first user information for first application program in first solicited message
Input solicited message when, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will
First default characteristic information is associated with first user information;
Preserve first authentication information, the first default biological information, first default characteristic information.
Optionally, the first solicited message for obtaining currently running first application program of the second electronic equipment it
Afterwards, the method further includes:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology of first user in the presumptive area
Information;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent out
Second electronic equipment is given, so that first user can be based on the default log-on message applies journey described first
It is registered in sequence.
On the other hand, the embodiment of the present application also provides a kind of first electronic equipment, and first electronic equipment can be with second
Electronic equipment establishes communication connection, and first electronic equipment includes:
First acquisition unit, in first electronic equipment and the second electronic equipment there are when the communication connection,
Obtain the first solicited message of currently running first application program of second electronic equipment;
First detection unit, for when first solicited message is the authentication request information to the first user, detecting
Obtain the first biological information of first user in presumptive area;
First authentication unit is obtained for first biological information and the first default biological information to be carried out matching verification
Obtain verification result;
First processing units send the first certification letter for generating the first authentication information according to the verification result
It ceases to second electronic equipment.
Optionally, first authentication information includes the login identity that the first user is used to login first application program
Information.
Optionally, first authentication unit specifically includes:
First judgment module, for judge first biological information and the described first default biological information whether phase
Match, obtains the first judging result;
First generation module generates the verification result for being based on first judging result, wherein described the
One judging result is when being, the verification result is successful match, when first judging result is no, the verification result
For it fails to match.
Optionally, when the verification result is the successful match, the first processing units specifically include:
First acquisition module obtains the identification information of first application program for being based on the communication connection;
Second generation module, for based on the described first default biological information and the identification information, generating described first
Authentication information;
First sending module, for sending first authentication information to second electronic equipment.
Optionally, first electronic equipment further includes:
First recording unit, for being that first user is directed to first application program in first solicited message
When inputting the input solicited message of the first user information, first user information is recorded as first authentication information;
Second detection unit, for detecting the second biological information for obtaining first user in the presumptive area;
Second recording unit, for second biological information to be recorded as the described first default biological information;
Second acquisition unit obtains the identification information of first application program for being based on the communication connection;
Third recording unit, for being and the described first default biological information corresponding first by the identification information recording
Default characteristic information, and first default characteristic information is associated with first user information;
First storage unit, for preserving first authentication information, the first default biological information, described first in advance
If characteristic information.
Optionally, first electronic equipment further includes:
First judging unit obtains second for judging whether first solicited message is user's registration solicited message
Judging result;
Third detection unit, for when second judging result is to be, detection to obtain described in the presumptive area
The third biological information of first user;
Second judgment unit, for judging whether the third biological information matches with the described first default biological information,
Obtain third judging result;
First transmission unit, when for being in the third judging result, by the first electronic equipment described in advance typing
In default log-on message be sent to second electronic equipment believe so that first user can be based on the default registration
Breath is registered in first application program.
Said one in the embodiment of the present application or multiple technical solutions at least have following one or more technology effects
Fruit:
1, due in technical solution in the embodiment of the present application, using in first electronic equipment and the second electronics
For equipment there are when the communication connection, detection obtains the technology hand of the first biological information of first user in presumptive area
Section.In this way, application program hair of second electronic equipment in the function and the second electronic equipment that do not have identification user biological feature
When playing authentication request, it can be obtained the in presumptive area by having the first electronic equipment of function detection of identification user biological feature
The first biological information of one user, and then the biological information by identifying the first user, to make first in the second electronic equipment
Application program enters the operating status after authentication.It can be in multiple equipment thus it is possible to effectively solve to lack one kind in the prior art
Upper the technical issues of realizing convenient, secure log verification method and electronic equipment, realizing can be real in multiple equipment
Existing convenient, secure log verification technique effect.
2, since in technical solution in the embodiment of the present application, use will be in the first electronic equipment described in advance typing
Default log-on message be sent to second electronic equipment so that first user can be based on the default log-on message
The technological means registered in first application program.User carries out application program on the second electronic equipment in this way
When registration, without being manually entered the related registration information of user, the first electronic equipment is in the biological information for detecting user and in advance
If biological information matches, so that it may the log-on message of the advance typing of user are sent to the second electronic equipment and complete registration.So
It realizes in the function that the second electronic equipment does not have identification user biological feature, it can be by having identification user biological feature
The technique effect of the registration of user in the first application program of first electronic equipment of function to complete the second electronic equipment.
Description of the drawings
Fig. 1 is a kind of flow chart for information processing method that the embodiment of the present application one provides;
Fig. 2 is the specific implementation of the step S103 of information processing method in the embodiment of the present application one;
Fig. 3 is the first realization method of the step S104 of information processing method in the embodiment of the present application one;
Fig. 4 is the block diagram for a kind of electronic equipment that the embodiment of the present application two provides.
Specific implementation mode
In technical solution provided by the embodiments of the present application, by a kind of information processing method of offer and electronic equipment, use
In solving the second electronic equipment in the prior art when not having the function of identification user biological feature, tool can not be passed through by existing
First electronic equipment of the function of standby identification user biological feature makes the first application program in the second electronic equipment enter mirror
The technical issues of the technical issues of operating status after power, realizes and does not have identification user biological feature in the second electronic equipment
Function when, can also be made in the second electronic equipment by having the first electronic equipment of the function of identification user biological feature
First application program enters the technique effect of the technical issues of operating status after authenticating.
To solve above-mentioned technical problem and realize above-mentioned technique effect, the general thought of technical solution in the embodiment of the present application
It is as follows:
A kind of information processing method is applied to the first electronic equipment, and first electronic equipment can be with the second electronic equipment
Communication connection is established, the method includes:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronics to set
First solicited message of standby currently running first application program;
When first solicited message is the authentication request information to the first user, detection obtains described in presumptive area
The first biological information of first user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, first authentication information to second electronics is sent and sets
It is standby.
It is set with the second electronics in first electronic equipment due in technical solution in the embodiment of the present application, using
It is standby that there are the technological means for when communication connection, detecting the first biological information of first user in acquisition presumptive area.
In this way, the second electronic equipment initiates mirror in the application program of the function and the second electronic equipment that do not have identification user biological feature
When weighing request, the first use in presumptive area can be obtained by having the first electronic equipment of function detection of identification user biological feature
First biological information at family, and then the biological information by identifying the first user, to make first in the second electronic equipment to apply
Program enters the operating status after authentication.It can be real in multiple equipment thus it is possible to effectively solve to lack in the prior art one kind
The technical issues of existing convenient, secure log verification method and electronic equipment, realizing can realize just in multiple equipment
Prompt, secure log verification technique effect.
In order to better understand the above technical scheme, below by attached drawing and specific embodiment to technical solution of the present invention
It is described in detail, it should be understood that the specific features in the embodiment of the present application and embodiment are to the detailed of technical solution of the present invention
Thin explanation, rather than to the restriction of technical solution of the present invention, in the absence of conflict, the embodiment of the present application and embodiment
In technical characteristic can be combined with each other.
Embodiment one
Referring to FIG. 1, the embodiment of the present application provides a kind of information processing method, it is applied to the first electronic equipment, described the
One electronic equipment can be established with the second electronic equipment and be communicated to connect, the method includes:
A kind of information processing method is applied to the first electronic equipment, and first electronic equipment can be with the second electronic equipment
Communication connection is established, the method includes:
S101:In first electronic equipment and the second electronic equipment there are when the communication connection, described second is obtained
First solicited message of currently running first application program of electronic equipment;
S102:When first solicited message is the authentication request information to the first user, detection obtains presumptive area
The first biological information of interior first user;
S103:First biological information and the first default biological information are subjected to matching verification, obtain verification result;
S104:The first authentication information is generated according to the verification result, sends first authentication information to described second
Electronic equipment.
In specific implementation process, first electronic equipment can be the hand for the function of having identification user biological feature
The electronic equipments such as machine, tablet computer, laptop can also be other electronic equipment, one be schematically illustrated here, just differing.Institute
It can be the electronic equipments such as mobile phone, tablet computer, laptop, cash dispenser to state the second electronic equipment, can also be other electricity
Sub- equipment one schematically illustrates here, just differing.First electronic equipment can by cable data line, bluetooth, NFC, WIFI, etc.
Mode and second electronic equipment, which are established, to be communicated to connect, can also by external second electronic equipment of a connecting interface,
Connecting interface is specifically as follows USB interface, earphone interface or digital interface.
In the embodiment of the present application, it with the first electronic equipment will be the mobile phone for the function of having identification user biological feature,
For second electronic equipment is laptop, the realization process of the method in the embodiment of the present application to be described in detail.
It is being mobile phone with the first electronic equipment, when the second electronic equipment is for laptop, step S101's is specific
It is embodied as:When mobile phone and laptop are wirelessly or non-wirelessly communicated to connect there are one, laptop is by currently running the
First solicited message of one application program is sent to mobile phone.Alternatively, mobile phone initiates a detection request for detecting laptop
Whether currently running first application program has the first solicited message, when laptop obtains the first solicited message, passes through
First solicited message is sent to mobile phone by the communication connection between laptop and mobile phone.First application program can be QQ,
Wechat, mail can also be other application program, one be schematically illustrated here, just differing.First solicited message can be that request is stepped on
Record information, request registration information, log in after request normal operation information, can also be other solicited message, here, just differing
One schematically illustrates.
After executing completion step S101, the method in the embodiment of the present application just executes step S102, i.e.,:Described
When one solicited message is the authentication request information to the first user, detection obtains the first life of first user in presumptive area
Object information.
It is being mobile phone with the first electronic equipment, the second electronic equipment is the specific reality of step S102 for laptop
It is now:After first solicited message of the first application program that mobile phone is run by the laptop of acquisition, first judge that first asks
Ask whether information is authentication request information, when the first application program initiates authentication request information, mobile phone obtains in advance by detecting
Determine the first biological information of first user in region.Such as:When the first application program is " QQ application programs ", " QQ application journeys
First solicited message of sequence " is the first solicited message of request input login user name and password, at this point, " QQ application programs "
First solicited message is authentication request information.Mobile phone is obtained the first finger print information of the first user by sensor, first regarded
One or more combinations in the first iris information of nethike embrane information, the first acoustic information, the first pulse information.Certainly, specific
During realization, the first biological information can also be other other biological informations, one be schematically illustrated here, just differing in the application.
After executing completion step S102, the method in the embodiment of the present application just executes step S103, i.e.,:By described
One biological information carries out matching verification with the first default biological information, obtains verification result.
As described in Figure 2, in the embodiment of the present application, step S103 is to be achieved by the steps of:
S201:Judge whether first biological information matches with the described first default biological information, obtains first and sentence
Disconnected result;
S202:Based on first judging result, the verification result is generated, wherein be in first judging result
When being, the verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
Continue with the first electronic equipment to be mobile phone, the second electronic equipment is step S201, step for laptop
S202's is implemented as:After mobile phone detects the first biological information of the first user, judge in the first biological information and mobile phone
Whether the first default biological information of advance typing matches.Such as:When mobile phone detects the first finger print information of the first user,
Judge whether the first finger print information matches with the first preset fingerprint information in mobile phone;Alternatively, when mobile phone detects the first user
The first iris information when, judge whether the first iris information matches with the first default iris information in mobile phone.When the first life
When object information is matched with the first default biological information, generation verification result is successful match, when the first biological information is pre- with first
If biological information mismatches, it is that it fails to match to generate verification result.
After executing completion step S103, the method in the embodiment of the present application just executes step S104, i.e.,:According to described
Verification result generates the first authentication information, sends first authentication information to second electronic equipment.
Wherein, first authentication information includes the login identity letter that the first user is used to login first application program
Breath.
In the embodiment of the present application, step S104 at least has there are three types of specific implementation, but is not limited only to both realities
Existing mode:
With reference to figure 3, first way is described to be tied according to the verification when the verification result is the successful match
Fruit generates the first authentication information, sends first authentication information to second electronic equipment, specifically includes:
S301:Based on the communication connection, the identification information of first application program is obtained;
S302:Based on the described first default biological information and the identification information, first authentication information is generated;
S303:First authentication information is sent to second electronic equipment.
The second way, when it fails to match for described in for the verification result, electronic equipment is given birth to based on the verification result
At a prompt message, and the prompt message is sent to second electronic equipment.
Continue with the first electronic equipment to be mobile phone, for the second electronic equipment is laptop, to the upper of step S104
The specific implementation for stating two ways is described:
First way, mobile phone is in the first biological information for confirming the first user and the first default biological information in mobile phone
After successful match, the mark letter that an application program identification solicited message is used to ask the first application program to laptop is initiated
Breath, after laptop receives application program identification solicited message, passes through mobile phone by the identification information of the first application program
Communication connection between notebook is sent to mobile phone.
Mobile phone obtain the first application program identification information after, first pass through identification information obtain mobile phone in it is described mark pair
All authentication informations answered, then obtained by the first default biological information associated with the first default biological information and with first
Associated first authentication information of application program.Such as:When the identification information of the first application program identifies for " QQ application programs "
When information, obtains " QQ application programs " logon information all in mobile phone and includes the first logon information, the second logon information,
In, the first logon information is associated with the first preset fingerprint information, and the second logon information is associated with the second preset fingerprint information.
When the first default biological information is the first preset fingerprint information, mobile phone obtains and the first preset fingerprint information associated first
Logon information, the first logon information are the first authentication information.
It is associated with the first default biological information using journey that mobile phone can also first pass through the first default biological information acquisition
Sequence, then obtain first in application program associated with the first default biological information by the identification information of the first application program and answer
With the first authentication information of program.Such as:First default biological information is the first preset fingerprint information, is believed with the first preset fingerprint
Manner of breathing is associated " QQ application programs ", " wechat application program ".When the identification information of the first application program is " QQ application journeys
When sequence " identification information, you can obtain " QQ application journeys associated with the first preset fingerprint information by " QQ application programs " mark
First log-on message of sequence ", the first log-on message are the first authentication information.
When in mobile phone not with the mark corresponding authentication information, alternatively, mobile phone obtains mobile phone by identification information
In all authentication informations corresponding with the mark can but when all authentication informations are not associated with the first default biological information
The first prompt message is generated, such as:User authentication information is not present, and the first prompt message is the first authentication information.
After mobile phone obtains the first authentication information, just first is recognized by the communication connection between mobile phone and laptop
Card information is sent to laptop.In specific implementation process, first authentication information can be the first user for stepping on
Enter the login identity information of first application program, such as:User name and password or a command information, such as:Open file
Gripping finger enables or a prompt message, such as:User authentication information is not present, and can also be other other authentication informations, here,
Just differ in the application and one schematically illustrates.
The second way, mobile phone is in the first biological information for confirming the first user and the first default biological information in mobile phone
After it fails to match, mobile phone will generate the second prompt message, such as:User information cannot match.Mobile phone passes through between laptop
Communication connection the second prompt message is sent to laptop.
In order to enable users to the authentication information associated with biological information of the typing in the first electronic equipment, described in acquisition
After first solicited message of currently running first application program of the second electronic equipment, and it is pair in first solicited message
When the authentication request information of the first user, detection obtains in presumptive area before the first biological information of first user, institute
The method of stating further includes:
It is that first user inputs the first user information for first application program in first solicited message
Input solicited message when, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will
First default characteristic information is associated with first authentication information;
Preserve first authentication information, the first default biological information, first default characteristic information.
Continue with the first electronic equipment to be mobile phone, for the second electronic equipment is laptop, to the tool of above-mentioned steps
Body realization is described:The first solicited message that mobile phone obtains is that the first user inputs the first user letter for the first application program
When the input solicited message of breath, first user information is recorded as the first authentication information, such as:When the first application program is
" QQ application programs ", the first user the first user letter such as input username and password on " QQ application programs " log-in interface
Breath or the first user input first user such as user name, password, registration mailbox letter in " QQ application programs " register interface
Breath.Mobile phone obtains the first user information by communication connection between laptop, and the first user information is recorded as the
One authentication information.
Mobile phone send out a prompt message for prompt the first user on a preset region the first user of typing second
Biological information.Such as:The biological informations such as fingerprint, iris, pulse.After the second biological information that mobile phone obtains the first user, by the
Two biological informations are recorded as the first default biological information.Mobile phone can also initiate an application program identification solicited message and be used for notes
This computer asks the identification information of the first application program, will after laptop receives application program identification solicited message
The identification information of first application program is sent to mobile phone by the communication connection between mobile phone and notebook.
In turn, identification information recording is the first default characteristic information corresponding with the first default biological information by mobile phone, and
First default characteristic information is associated with first authentication information.Such as:When the first default biological information is the first user
The first finger print information, the identification information of the first application program is " QQ application programs " identification information, and the first authentication information is
When first user is used to log in first logon information of " QQ application programs ", then corresponding with the first finger print information first is default special
Reference breath is " QQ application programs " identification information.Also, it is " QQ application programs " identification information is associated with the first logon information.
Show that the first finger print information of the first user in mobile phone is corresponding with first logon information of " QQ application programs ".I.e.:Pass through " QQ
Application program " identification information can be by the first finger print information of the first user, " QQ application programs " and the first user for logging in " QQ
First logon information of application program " associates.
Again by the first default characteristic information by the first application program, the first default biological information and the first authentication information into
After row association, will and the corresponding first default biological information of the first user, the first default feature corresponding with the first application program
Information and the first authentication information are stored in mobile phone.
In order to enable users to be set to complete the second electronics by the function of the identification user biological feature of the first electronic equipment
The technique effect of user's registration in the first standby application program is obtaining currently running first application of second electronic equipment
After first solicited message of program, the method further includes:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology of first user in the presumptive area
Information;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent out
Second electronic equipment is given, so that first user can be based on the default log-on message applies journey described first
It is registered in sequence.
Continue with the first electronic equipment to be mobile phone, for the second electronic equipment is laptop, to the tool of above-mentioned steps
Body realization is described:After the first solicited message that mobile phone obtains, judge whether the first solicited message is user's registration request letter
Breath.Such as:When the first application program is " QQ application programs ", user clicks the registration button of " QQ application programs ", in turn " QQ
Application program " enters register interface, and the first solicited message that mobile phone obtains at this time is that the user's registration of " QQ application programs " is asked
Seek information.
Determine the first solicited message be user's registration solicited message when, mobile phone send out a prompt message for prompt first
The third biological information of user first user of typing on a preset region.The third biology letter of the first user is obtained in mobile phone
After breath, judge whether third biological information and the first default biological information of advance typing in mobile phone match.Such as:When mobile phone is examined
When measuring the finger print information of the first user, judge whether finger print information matches with the first preset fingerprint information in mobile phone;Alternatively,
When mobile phone detects the iris information of the first user, judge the first default iris information in iris information and mobile phone whether
Match.
When third biological information is matched with the first default biological information, by the default log-on message in advance typing mobile phone
It is sent to laptop, is registered in the first application program so that the first user can be based on default log-on message.Than
Such as:It is the user's registration solicited message of " QQ application programs ", and the fingerprint and hand of first user's typing in the first solicited message
When the first preset fingerprint information matches in machine, the default log-on message in first typing mobile phone is sent to notebook electricity by mobile phone
Default log-on message is filled into the corresponding input frame of " QQ application programs " register interface by brain, laptop, the first user
Default log-on message can be viewed in laptop, can directly be registered using default log-on message, can be also directed to pre-
If certain information in log-on message are modified, such as:Password, contact method etc., and then pass through modified log-on message
It is registered.
It includes some conventional user's registration informations that log-on message is preset in mobile phone, such as:User name, password, the pet name,
Relevant mailbox, contact method etc..Default log-on message can be the log-on message of user's advance typing in mobile phone, can also be
After mobile phone and laptop generate communication connection, the first log-on message that user is inputted by laptop, notebook
User is inputted the first log-on message again and is sent to mobile phone by computer, and the first log-on message is recorded as default log-on message simultaneously by mobile phone
It preserves.Certainly, during specific implementation, those of ordinary skill in the art can also obtain default registration using other manner
Information one schematically illustrates here, just differing in the application.
Embodiment two
Based on inventive concept same as a kind of information processing method in the embodiment of the present application one, referring to FIG. 4, the application
Embodiment provides a kind of first electronic equipment, and first electronic equipment can be established with the second electronic equipment and be communicated to connect, described
First electronic equipment includes:
First acquisition unit 401, for there are the communication connections in first electronic equipment and the second electronic equipment
When, obtain the first solicited message of currently running first application program of the second electronic equipment;
First detection unit 402, for when first solicited message is the authentication request information to the first user, examining
Survey the first biological information for obtaining first user in presumptive area;
First authentication unit 403, for first biological information and the first default biological information to be carried out matching verification,
Obtain verification result;
First processing units 404 send first certification for generating the first authentication information according to the verification result
Information is to second electronic equipment.
First authentication information includes the login identity information that the first user is used to login first application program.
In order to be able to verify that the matching relationship of the first biological information and the first default biological information, the first authentication unit tool
Body includes:
First judgment module, for judge first biological information and the described first default biological information whether phase
Match, obtains the first judging result;
First generation module generates the verification result for being based on first judging result, wherein described the
One judging result is when being, the verification result is successful match, when first judging result is no, the verification result
For it fails to match.
The first authentication information is generated in order to be based on verification result, when the verification result is the successful match, institute
First processing units are stated to specifically include:
First acquisition module obtains the identification information of first application program for being based on the communication connection;
Second generation module, for based on the described first default biological information and the identification information, generating described first
Authentication information;
First sending module, for sending first authentication information to second electronic equipment.
In order to the first default biological information of typing user, and by the first default biological information and the first application program
First authentication information is associated, and first electronic equipment further includes:
First recording unit, for being that first user is directed to first application program in first solicited message
When inputting the input solicited message of the first user information, first user information is recorded as first authentication information;
Second detection unit, for detecting the second biological information for obtaining first user in the presumptive area;
Second recording unit, for second biological information to be recorded as the described first default biological information;
Second acquisition unit obtains the identification information of first application program for being based on the communication connection;
Third recording unit, for being and the described first default biological information corresponding first by the identification information recording
Default characteristic information, and first default characteristic information is associated with first user information;
First storage unit, for preserving first authentication information, the first default biological information, described first in advance
If characteristic information.
In order to enable users to be set to complete the second electronics by the function of the identification user biological feature of the first electronic equipment
The technique effect of user's registration in the first standby application program, first electronic equipment further include:
First judging unit obtains second for judging whether first solicited message is user's registration solicited message
Judging result;
Third detection unit, for when second judging result is to be, detection to obtain described in the presumptive area
The third biological information of first user;
Second judgment unit, for judging whether the third biological information matches with the described first default biological information,
Obtain third judging result;
First transmission unit, when for being in the third judging result, by the first electronic equipment described in advance typing
In default log-on message be sent to second electronic equipment believe so that first user can be based on the default registration
Breath is registered in first application program.
By one or more of the embodiment of the present application technical solution, following one or more technology effects may be implemented
Fruit:
1, due in technical solution in the embodiment of the present application, using in first electronic equipment and the second electronics
For equipment there are when the communication connection, detection obtains the technology hand of the first biological information of first user in presumptive area
Section.In this way, application program hair of second electronic equipment in the function and the second electronic equipment that do not have identification user biological feature
When playing authentication request, it can be obtained the in presumptive area by having the first electronic equipment of function detection of identification user biological feature
The first biological information of one user, and then the biological information by identifying the first user, to make first in the second electronic equipment
Application program enters the operating status after authentication.It can be in multiple equipment thus it is possible to effectively solve to lack one kind in the prior art
Upper the technical issues of realizing convenient, secure log verification method and electronic equipment, realizing can be real in multiple equipment
Existing convenient, secure log verification technique effect.
2, since in technical solution in the embodiment of the present application, use will be in the first electronic equipment described in advance typing
Default log-on message be sent to second electronic equipment so that first user can be based on the default log-on message
The technological means registered in first application program.User carries out application program on the second electronic equipment in this way
When registration, without being manually entered the related registration information of user, the first electronic equipment is in the biological information for detecting user and in advance
If biological information matches, so that it may the log-on message of the advance typing of user are sent to the second electronic equipment and complete registration.So
It realizes in the function that the second electronic equipment does not have identification user biological feature, it can be by having identification user biological feature
The technique effect of the registration of user in the first application program of first electronic equipment of function to complete the second electronic equipment.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention
Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer
The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with life
In the computer-readable memory of object space formula work so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Specifically, the corresponding computer program instructions of information processing method in the embodiment of the present application can be stored in
CD, hard disk, on the storage mediums such as USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium
First electronic equipment reads or is performed, and includes the following steps:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronics to set
First solicited message of standby currently running first application program;
When first solicited message is the authentication request information to the first user, detection obtains described in presumptive area
The first biological information of first user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, first authentication information to second electronics is sent and sets
It is standby.
Wherein, first authentication information includes the login identity letter that the first user is used to login first application program
Breath.
Optionally, stored in the storage medium and step:By first biological information and the first default biology letter
Breath carries out matching verification, obtains verification result, and corresponding computer instruction specifically includes during specific be performed:
Judge whether first biological information matches with the described first default biological information, obtains first and judge knot
Fruit;
Based on first judging result, the verification result is generated, wherein when first judging result is to be,
The verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
Optionally, when the verification result is the successful match, stored in the storage medium and step:According to
The verification result generates the first authentication information, sends first authentication information to second electronic equipment, corresponding meter
The instruction of calculation machine specifically includes during specific be performed:
Based on the communication connection, the identification information of first application program is obtained;
Based on the described first default biological information and the identification information, first authentication information is generated;
First authentication information is sent to second electronic equipment.
Optionally, when in storage medium computer program instructions corresponding with information processing method read by an electronic equipment
It takes or is performed, after the first solicited message for obtaining currently running first application program of the second electronic equipment,
And when first solicited message is the authentication request information to the first user, detection obtains first use in presumptive area
Further include following steps before first biological information at family:
It is that first user inputs the first user information for first application program in first solicited message
Input solicited message when, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will
First default characteristic information is associated with first authentication information;
Preserve first authentication information, the first default biological information, first default characteristic information.
Optionally, when in storage medium computer program instructions corresponding with information processing method read by an electronic equipment
It takes or is performed, after the first solicited message for obtaining currently running first application program of the second electronic equipment,
Further include following steps:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology of first user in the presumptive area
Information;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent out
Second electronic equipment is given, so that first user can be based on the default log-on message applies journey described first
It is registered in sequence.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (12)
1. a kind of information processing method, is applied to the first electronic equipment, first electronic equipment can be built with the second electronic equipment
Vertical communication connection, the method includes:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronic equipment to work as
First solicited message of the first application program of preceding operation;
When first solicited message is the authentication request information to the first user, detection obtains described first in presumptive area
The first biological information of user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, sends first authentication information to second electronic equipment.
2. the method as described in claim 1, which is characterized in that first authentication information includes the first user for logining institute
State the login identity information of the first application program.
3. the method as described in claim 1, which is characterized in that described by first biological information and the first default biology letter
Breath carries out matching verification, obtains verification result, specifically includes:
Judge whether first biological information matches with the described first default biological information, obtains the first judging result;
Based on first judging result, the verification result is generated, wherein described when first judging result is to be
Verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
4. method as claimed in claim 3, which is characterized in that when the verification result is the successful match, described
The first authentication information is generated according to the verification result, sends first authentication information to second electronic equipment, specific packet
It includes:
Based on the communication connection, the identification information of first application program is obtained;
Based on the described first default biological information and the identification information, first authentication information is generated;
First authentication information is sent to second electronic equipment.
5. the method as described in any claim in claim 1-4, which is characterized in that obtaining, second electronic equipment is current
After first solicited message of the first application program of operation, and it is to be asked to the authentication of the first user in first solicited message
When seeking information, detection obtains in presumptive area before the first biological information of first user, and the method further includes:
It is that first user inputs the defeated of the first user information for first application program in first solicited message
When entering solicited message, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will be described
First default characteristic information is associated with first authentication information;
Preserve first authentication information, the first default biological information, first default characteristic information.
6. the method as described in any claim in claim 1-4, which is characterized in that obtaining, second electronic equipment is current
After first solicited message of the first application program of operation, the method further includes:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology letter of first user in the presumptive area
Breath;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent to
Second electronic equipment, so that first user can be based on the default log-on message in first application program
It is registered.
7. a kind of first electronic equipment, first electronic equipment can be established with the second electronic equipment and be communicated to connect, described first
Electronic equipment includes:
First acquisition unit, for, there are when the communication connection, being obtained in first electronic equipment and the second electronic equipment
First solicited message of currently running first application program of the second electronic equipment;
First detection unit, for when first solicited message is the authentication request information to the first user, detection to obtain
The first biological information of first user in presumptive area;
First authentication unit is tested for first biological information and the first default biological information to be carried out matching verification
Demonstrate,prove result;
First processing units send first authentication information extremely for generating the first authentication information according to the verification result
Second electronic equipment.
8. the first electronic equipment as claimed in claim 7, which is characterized in that first authentication information is used including the first user
In the login identity information for logining first application program.
9. the first electronic equipment as claimed in claim 7, which is characterized in that first authentication unit specifically includes:
First judgment module is obtained for judging whether first biological information matches with the described first default biological information
Obtain the first judging result;
First generation module generates the verification result, wherein sentence described first for being based on first judging result
Disconnected result is when being, the verification result is successful match, and when first judging result is no, the verification result is
With failure.
10. the first electronic equipment as claimed in claim 9, which is characterized in that the verification result be the successful match
When, the first processing units specifically include:
First acquisition module obtains the identification information of first application program for being based on the communication connection;
Second generation module, for based on the described first default biological information and the identification information, generating first certification
Information;
First sending module, for sending first authentication information to second electronic equipment.
11. the first electronic equipment as described in any claim in claim 7-10, which is characterized in that first electronic equipment
Further include:
First recording unit, for being that first user inputs for first application program in first solicited message
When the input solicited message of the first user information, first user information is recorded as first authentication information;
Second detection unit, for detecting the second biological information for obtaining first user in the presumptive area;
Second recording unit, for second biological information to be recorded as the described first default biological information;
Second acquisition unit obtains the identification information of first application program for being based on the communication connection;
Third recording unit, for presetting the identification information recording for corresponding with the described first default biological information first
Characteristic information, and first default characteristic information is associated with first user information;
First storage unit, for preserving first authentication information, the first default biological information, the first default spy
Reference ceases.
12. the first electronic equipment as described in any claim in claim 7-10, which is characterized in that first electronic equipment
Further include:
First judging unit obtains second and judges for judging whether first solicited message is user's registration solicited message
As a result;
Third detection unit, for when second judging result is to be, detection to obtain described first in the presumptive area
The third biological information of user;
Second judgment unit is obtained for judging whether the third biological information matches with the described first default biological information
Third judging result;
First transmission unit will be in the first electronic equipment described in advance typing when for being in the third judging result
Default log-on message is sent to second electronic equipment, so that first user can be existed based on the default log-on message
It is registered in first application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410643500.7A CN105574400B (en) | 2014-11-10 | 2014-11-10 | A kind of information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410643500.7A CN105574400B (en) | 2014-11-10 | 2014-11-10 | A kind of information processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105574400A CN105574400A (en) | 2016-05-11 |
CN105574400B true CN105574400B (en) | 2018-08-31 |
Family
ID=55884519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410643500.7A Active CN105574400B (en) | 2014-11-10 | 2014-11-10 | A kind of information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105574400B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111949960A (en) * | 2020-05-14 | 2020-11-17 | 华为技术有限公司 | Data sharing method, electronic device and system |
CN111859357A (en) * | 2020-07-17 | 2020-10-30 | 维沃移动通信有限公司 | Login method and device and electronic equipment |
CN113570360B (en) * | 2021-06-30 | 2024-03-19 | 中国银联股份有限公司 | Payment method, device, equipment and medium |
CN113935008B (en) * | 2021-12-15 | 2022-03-11 | 深圳竹云科技有限公司 | User authentication method, device, electronic equipment and computer readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533392A (en) * | 2013-10-25 | 2014-01-22 | 乐视网信息技术(北京)股份有限公司 | Method, electronic device and system for logging in account |
CN103634109A (en) * | 2013-10-31 | 2014-03-12 | 小米科技有限责任公司 | Operation right authentication method and device |
CN103701774A (en) * | 2013-12-03 | 2014-04-02 | 乐视网信息技术(北京)股份有限公司 | Login method and device |
CN103853950A (en) * | 2014-03-20 | 2014-06-11 | 深圳市中兴移动通信有限公司 | Authentication method based on mobile terminal and mobile terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100992573B1 (en) * | 2010-03-26 | 2010-11-05 | 주식회사 아이그로브 | Authentication method and system using mobile terminal |
-
2014
- 2014-11-10 CN CN201410643500.7A patent/CN105574400B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533392A (en) * | 2013-10-25 | 2014-01-22 | 乐视网信息技术(北京)股份有限公司 | Method, electronic device and system for logging in account |
CN103634109A (en) * | 2013-10-31 | 2014-03-12 | 小米科技有限责任公司 | Operation right authentication method and device |
CN103701774A (en) * | 2013-12-03 | 2014-04-02 | 乐视网信息技术(北京)股份有限公司 | Login method and device |
CN103853950A (en) * | 2014-03-20 | 2014-06-11 | 深圳市中兴移动通信有限公司 | Authentication method based on mobile terminal and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105574400A (en) | 2016-05-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10390222B2 (en) | Technologies for touch-free multi-factor authentication | |
EP2873192B1 (en) | Methods and systems for using derived credentials to authenticate a device across multiple platforms | |
US10812485B1 (en) | Wearable device-based user authentication | |
EP2939166B1 (en) | Query system and method to determine authentication capabilities | |
US9391968B2 (en) | Scored factor-based authentication | |
CN106716433B (en) | The system and method for certificate management between electronic equipment | |
US9172687B2 (en) | Query system and method to determine authentication capabilities | |
US9083689B2 (en) | System and method for implementing privacy classes within an authentication framework | |
US9306754B2 (en) | System and method for implementing transaction signing within an authentication framework | |
CN105827600B (en) | Method and device for logging in client | |
US20150242605A1 (en) | Continuous authentication with a mobile device | |
EP3608807A1 (en) | Privacy enhanced key management for a web service provider using a converged security engine | |
US9942223B2 (en) | Automated device discovery of pairing-eligible devices for authentication | |
CN105592014B (en) | A kind of trusted terminal verification method, device | |
WO2016081254A1 (en) | Optimized token-based proxy authentication | |
EP3175578A1 (en) | System and method for establishing trust using secure transmission protocols | |
CN105574400B (en) | A kind of information processing method and electronic equipment | |
ES2785048T3 (en) | Automatic connection to an online service | |
CN110061995A (en) | A kind of mouse, identity authorization system, method, apparatus and storage medium | |
CN107370765A (en) | A kind of ftp server identity identifying method and system | |
KR20180104657A (en) | Method, device and terminal for entering an application's login password | |
CN106411811A (en) | Authentication method, system and device of accessing customer service | |
CN104933379B (en) | ID card information acquisition methods, apparatus and system | |
Owens et al. | A Framework for Evaluating the Usability and Security of Smartphones as FIDO2 Roaming Authenticators | |
US11349672B1 (en) | Multi-factor authentication with code rotation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |