CN105574400B - A kind of information processing method and electronic equipment - Google Patents

A kind of information processing method and electronic equipment Download PDF

Info

Publication number
CN105574400B
CN105574400B CN201410643500.7A CN201410643500A CN105574400B CN 105574400 B CN105574400 B CN 105574400B CN 201410643500 A CN201410643500 A CN 201410643500A CN 105574400 B CN105574400 B CN 105574400B
Authority
CN
China
Prior art keywords
information
electronic equipment
user
biological information
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410643500.7A
Other languages
Chinese (zh)
Other versions
CN105574400A (en
Inventor
吴杨华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410643500.7A priority Critical patent/CN105574400B/en
Publication of CN105574400A publication Critical patent/CN105574400A/en
Application granted granted Critical
Publication of CN105574400B publication Critical patent/CN105574400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of information processing methods, are applied to the first electronic equipment, the method includes:In first electronic equipment and the second electronic equipment there are when the communication connection, the first solicited message of currently running first application program of the second electronic equipment is obtained;When first solicited message is the authentication request information to the first user, detection obtains the first biological information of first user in presumptive area;First biological information and the first default biological information are subjected to matching verification, obtain verification result;The first authentication information is generated according to the verification result, sends first authentication information to second electronic equipment.The above method provided by the invention, a kind of the technique effect that convenient secure log verification can be realized in multiple equipment can be realized for solving to lack in the prior art the technical issues of realizing convenient, secure log verification method and electronic equipment in multiple equipment.

Description

A kind of information processing method and electronic equipment
Technical field
The present invention relates to electronic technology field, more particularly to a kind of information processing method and electronic equipment.
Technical background
As the number of applications installed on the intelligent terminals such as mobile phone, tablet computer is more and more, answered in user's use When with the process of program, it is necessary to which the boundary for the normal operation for logining application program could be realized by inputting the information such as username and password Face.But the corresponding username and password of different application programs may be different, such as:User sets QQ application programs Fixed logon information 1 is user name 1 and password 1, and for Taobao's application program, logon information 2 set by user is user name 2 With password 2.As the number of applications installed on electronic equipment is more and more, user needs the logon information remembered increasingly It is more, and the logon information remembered accurately can must just guarantee to log in corresponding application program.
Present inventor has found that the prior art at least exists during realizing the technical solution of the embodiment of the present application Following technical problem:
It needs to input different logon accounts when different applications since in the prior art, user logs on an electronic device Information, this requires user to remember multiple and different log-on messages.Even if the existing side logged in by modes such as biological informations Method also only in a privately owned equipment, and can not step on the account of fingerprint application and application program in multiple and different equipment Record.So lacking a kind of method and electronics that can realize convenient secure log verification in multiple equipment in the prior art Equipment.
Invention content
A kind of information processing method of offer of the embodiment of the present invention and electronic equipment, it is a kind of for solving to lack in the prior art It can be the technical issues of realizing convenient, secure log verification method and electronic equipment in multiple equipment, realizing can The technique effect of convenient secure log verification is realized in multiple equipment.
A kind of information processing method is applied to the first electronic equipment, and first electronic equipment can be with the second electronic equipment Communication connection is established, the method includes:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronics to set First solicited message of standby currently running first application program;
When first solicited message is the authentication request information to the first user, detection obtains described in presumptive area The first biological information of first user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, first authentication information to second electronics is sent and sets It is standby.
Optionally, first authentication information includes the login identity that the first user is used to login first application program Information.
Optionally, described that first biological information and the first default biological information are subjected to matching verification, it is verified As a result, specifically including:
Judge whether first biological information matches with the described first default biological information, obtains first and judge knot Fruit;
Based on first judging result, the verification result is generated, wherein when first judging result is to be, The verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
Optionally, described to be recognized according to verification result generation first when the verification result is the successful match Information is demonstrate,proved, first authentication information is sent to second electronic equipment, specifically includes:
Based on the communication connection, the identification information of first application program is obtained;
Based on the described first default biological information and the identification information, first authentication information is generated;
First authentication information is sent to second electronic equipment.
Optionally, the first solicited message for obtaining currently running first application program of the second electronic equipment it Afterwards, and when first solicited message is to the authentication request information of the first user, detection obtains described the in presumptive area Before the first biological information of one user, the method further includes:
It is that first user inputs the first user information for first application program in first solicited message Input solicited message when, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will First default characteristic information is associated with first user information;
Preserve first authentication information, the first default biological information, first default characteristic information.
Optionally, the first solicited message for obtaining currently running first application program of the second electronic equipment it Afterwards, the method further includes:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology of first user in the presumptive area Information;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent out Second electronic equipment is given, so that first user can be based on the default log-on message applies journey described first It is registered in sequence.
On the other hand, the embodiment of the present application also provides a kind of first electronic equipment, and first electronic equipment can be with second Electronic equipment establishes communication connection, and first electronic equipment includes:
First acquisition unit, in first electronic equipment and the second electronic equipment there are when the communication connection, Obtain the first solicited message of currently running first application program of second electronic equipment;
First detection unit, for when first solicited message is the authentication request information to the first user, detecting Obtain the first biological information of first user in presumptive area;
First authentication unit is obtained for first biological information and the first default biological information to be carried out matching verification Obtain verification result;
First processing units send the first certification letter for generating the first authentication information according to the verification result It ceases to second electronic equipment.
Optionally, first authentication information includes the login identity that the first user is used to login first application program Information.
Optionally, first authentication unit specifically includes:
First judgment module, for judge first biological information and the described first default biological information whether phase Match, obtains the first judging result;
First generation module generates the verification result for being based on first judging result, wherein described the One judging result is when being, the verification result is successful match, when first judging result is no, the verification result For it fails to match.
Optionally, when the verification result is the successful match, the first processing units specifically include:
First acquisition module obtains the identification information of first application program for being based on the communication connection;
Second generation module, for based on the described first default biological information and the identification information, generating described first Authentication information;
First sending module, for sending first authentication information to second electronic equipment.
Optionally, first electronic equipment further includes:
First recording unit, for being that first user is directed to first application program in first solicited message When inputting the input solicited message of the first user information, first user information is recorded as first authentication information;
Second detection unit, for detecting the second biological information for obtaining first user in the presumptive area;
Second recording unit, for second biological information to be recorded as the described first default biological information;
Second acquisition unit obtains the identification information of first application program for being based on the communication connection;
Third recording unit, for being and the described first default biological information corresponding first by the identification information recording Default characteristic information, and first default characteristic information is associated with first user information;
First storage unit, for preserving first authentication information, the first default biological information, described first in advance If characteristic information.
Optionally, first electronic equipment further includes:
First judging unit obtains second for judging whether first solicited message is user's registration solicited message Judging result;
Third detection unit, for when second judging result is to be, detection to obtain described in the presumptive area The third biological information of first user;
Second judgment unit, for judging whether the third biological information matches with the described first default biological information, Obtain third judging result;
First transmission unit, when for being in the third judging result, by the first electronic equipment described in advance typing In default log-on message be sent to second electronic equipment believe so that first user can be based on the default registration Breath is registered in first application program.
Said one in the embodiment of the present application or multiple technical solutions at least have following one or more technology effects Fruit:
1, due in technical solution in the embodiment of the present application, using in first electronic equipment and the second electronics For equipment there are when the communication connection, detection obtains the technology hand of the first biological information of first user in presumptive area Section.In this way, application program hair of second electronic equipment in the function and the second electronic equipment that do not have identification user biological feature When playing authentication request, it can be obtained the in presumptive area by having the first electronic equipment of function detection of identification user biological feature The first biological information of one user, and then the biological information by identifying the first user, to make first in the second electronic equipment Application program enters the operating status after authentication.It can be in multiple equipment thus it is possible to effectively solve to lack one kind in the prior art Upper the technical issues of realizing convenient, secure log verification method and electronic equipment, realizing can be real in multiple equipment Existing convenient, secure log verification technique effect.
2, since in technical solution in the embodiment of the present application, use will be in the first electronic equipment described in advance typing Default log-on message be sent to second electronic equipment so that first user can be based on the default log-on message The technological means registered in first application program.User carries out application program on the second electronic equipment in this way When registration, without being manually entered the related registration information of user, the first electronic equipment is in the biological information for detecting user and in advance If biological information matches, so that it may the log-on message of the advance typing of user are sent to the second electronic equipment and complete registration.So It realizes in the function that the second electronic equipment does not have identification user biological feature, it can be by having identification user biological feature The technique effect of the registration of user in the first application program of first electronic equipment of function to complete the second electronic equipment.
Description of the drawings
Fig. 1 is a kind of flow chart for information processing method that the embodiment of the present application one provides;
Fig. 2 is the specific implementation of the step S103 of information processing method in the embodiment of the present application one;
Fig. 3 is the first realization method of the step S104 of information processing method in the embodiment of the present application one;
Fig. 4 is the block diagram for a kind of electronic equipment that the embodiment of the present application two provides.
Specific implementation mode
In technical solution provided by the embodiments of the present application, by a kind of information processing method of offer and electronic equipment, use In solving the second electronic equipment in the prior art when not having the function of identification user biological feature, tool can not be passed through by existing First electronic equipment of the function of standby identification user biological feature makes the first application program in the second electronic equipment enter mirror The technical issues of the technical issues of operating status after power, realizes and does not have identification user biological feature in the second electronic equipment Function when, can also be made in the second electronic equipment by having the first electronic equipment of the function of identification user biological feature First application program enters the technique effect of the technical issues of operating status after authenticating.
To solve above-mentioned technical problem and realize above-mentioned technique effect, the general thought of technical solution in the embodiment of the present application It is as follows:
A kind of information processing method is applied to the first electronic equipment, and first electronic equipment can be with the second electronic equipment Communication connection is established, the method includes:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronics to set First solicited message of standby currently running first application program;
When first solicited message is the authentication request information to the first user, detection obtains described in presumptive area The first biological information of first user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, first authentication information to second electronics is sent and sets It is standby.
It is set with the second electronics in first electronic equipment due in technical solution in the embodiment of the present application, using It is standby that there are the technological means for when communication connection, detecting the first biological information of first user in acquisition presumptive area. In this way, the second electronic equipment initiates mirror in the application program of the function and the second electronic equipment that do not have identification user biological feature When weighing request, the first use in presumptive area can be obtained by having the first electronic equipment of function detection of identification user biological feature First biological information at family, and then the biological information by identifying the first user, to make first in the second electronic equipment to apply Program enters the operating status after authentication.It can be real in multiple equipment thus it is possible to effectively solve to lack in the prior art one kind The technical issues of existing convenient, secure log verification method and electronic equipment, realizing can realize just in multiple equipment Prompt, secure log verification technique effect.
In order to better understand the above technical scheme, below by attached drawing and specific embodiment to technical solution of the present invention It is described in detail, it should be understood that the specific features in the embodiment of the present application and embodiment are to the detailed of technical solution of the present invention Thin explanation, rather than to the restriction of technical solution of the present invention, in the absence of conflict, the embodiment of the present application and embodiment In technical characteristic can be combined with each other.
Embodiment one
Referring to FIG. 1, the embodiment of the present application provides a kind of information processing method, it is applied to the first electronic equipment, described the One electronic equipment can be established with the second electronic equipment and be communicated to connect, the method includes:
A kind of information processing method is applied to the first electronic equipment, and first electronic equipment can be with the second electronic equipment Communication connection is established, the method includes:
S101:In first electronic equipment and the second electronic equipment there are when the communication connection, described second is obtained First solicited message of currently running first application program of electronic equipment;
S102:When first solicited message is the authentication request information to the first user, detection obtains presumptive area The first biological information of interior first user;
S103:First biological information and the first default biological information are subjected to matching verification, obtain verification result;
S104:The first authentication information is generated according to the verification result, sends first authentication information to described second Electronic equipment.
In specific implementation process, first electronic equipment can be the hand for the function of having identification user biological feature The electronic equipments such as machine, tablet computer, laptop can also be other electronic equipment, one be schematically illustrated here, just differing.Institute It can be the electronic equipments such as mobile phone, tablet computer, laptop, cash dispenser to state the second electronic equipment, can also be other electricity Sub- equipment one schematically illustrates here, just differing.First electronic equipment can by cable data line, bluetooth, NFC, WIFI, etc. Mode and second electronic equipment, which are established, to be communicated to connect, can also by external second electronic equipment of a connecting interface, Connecting interface is specifically as follows USB interface, earphone interface or digital interface.
In the embodiment of the present application, it with the first electronic equipment will be the mobile phone for the function of having identification user biological feature, For second electronic equipment is laptop, the realization process of the method in the embodiment of the present application to be described in detail.
It is being mobile phone with the first electronic equipment, when the second electronic equipment is for laptop, step S101's is specific It is embodied as:When mobile phone and laptop are wirelessly or non-wirelessly communicated to connect there are one, laptop is by currently running the First solicited message of one application program is sent to mobile phone.Alternatively, mobile phone initiates a detection request for detecting laptop Whether currently running first application program has the first solicited message, when laptop obtains the first solicited message, passes through First solicited message is sent to mobile phone by the communication connection between laptop and mobile phone.First application program can be QQ, Wechat, mail can also be other application program, one be schematically illustrated here, just differing.First solicited message can be that request is stepped on Record information, request registration information, log in after request normal operation information, can also be other solicited message, here, just differing One schematically illustrates.
After executing completion step S101, the method in the embodiment of the present application just executes step S102, i.e.,:Described When one solicited message is the authentication request information to the first user, detection obtains the first life of first user in presumptive area Object information.
It is being mobile phone with the first electronic equipment, the second electronic equipment is the specific reality of step S102 for laptop It is now:After first solicited message of the first application program that mobile phone is run by the laptop of acquisition, first judge that first asks Ask whether information is authentication request information, when the first application program initiates authentication request information, mobile phone obtains in advance by detecting Determine the first biological information of first user in region.Such as:When the first application program is " QQ application programs ", " QQ application journeys First solicited message of sequence " is the first solicited message of request input login user name and password, at this point, " QQ application programs " First solicited message is authentication request information.Mobile phone is obtained the first finger print information of the first user by sensor, first regarded One or more combinations in the first iris information of nethike embrane information, the first acoustic information, the first pulse information.Certainly, specific During realization, the first biological information can also be other other biological informations, one be schematically illustrated here, just differing in the application.
After executing completion step S102, the method in the embodiment of the present application just executes step S103, i.e.,:By described One biological information carries out matching verification with the first default biological information, obtains verification result.
As described in Figure 2, in the embodiment of the present application, step S103 is to be achieved by the steps of:
S201:Judge whether first biological information matches with the described first default biological information, obtains first and sentence Disconnected result;
S202:Based on first judging result, the verification result is generated, wherein be in first judging result When being, the verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
Continue with the first electronic equipment to be mobile phone, the second electronic equipment is step S201, step for laptop S202's is implemented as:After mobile phone detects the first biological information of the first user, judge in the first biological information and mobile phone Whether the first default biological information of advance typing matches.Such as:When mobile phone detects the first finger print information of the first user, Judge whether the first finger print information matches with the first preset fingerprint information in mobile phone;Alternatively, when mobile phone detects the first user The first iris information when, judge whether the first iris information matches with the first default iris information in mobile phone.When the first life When object information is matched with the first default biological information, generation verification result is successful match, when the first biological information is pre- with first If biological information mismatches, it is that it fails to match to generate verification result.
After executing completion step S103, the method in the embodiment of the present application just executes step S104, i.e.,:According to described Verification result generates the first authentication information, sends first authentication information to second electronic equipment.
Wherein, first authentication information includes the login identity letter that the first user is used to login first application program Breath.
In the embodiment of the present application, step S104 at least has there are three types of specific implementation, but is not limited only to both realities Existing mode:
With reference to figure 3, first way is described to be tied according to the verification when the verification result is the successful match Fruit generates the first authentication information, sends first authentication information to second electronic equipment, specifically includes:
S301:Based on the communication connection, the identification information of first application program is obtained;
S302:Based on the described first default biological information and the identification information, first authentication information is generated;
S303:First authentication information is sent to second electronic equipment.
The second way, when it fails to match for described in for the verification result, electronic equipment is given birth to based on the verification result At a prompt message, and the prompt message is sent to second electronic equipment.
Continue with the first electronic equipment to be mobile phone, for the second electronic equipment is laptop, to the upper of step S104 The specific implementation for stating two ways is described:
First way, mobile phone is in the first biological information for confirming the first user and the first default biological information in mobile phone After successful match, the mark letter that an application program identification solicited message is used to ask the first application program to laptop is initiated Breath, after laptop receives application program identification solicited message, passes through mobile phone by the identification information of the first application program Communication connection between notebook is sent to mobile phone.
Mobile phone obtain the first application program identification information after, first pass through identification information obtain mobile phone in it is described mark pair All authentication informations answered, then obtained by the first default biological information associated with the first default biological information and with first Associated first authentication information of application program.Such as:When the identification information of the first application program identifies for " QQ application programs " When information, obtains " QQ application programs " logon information all in mobile phone and includes the first logon information, the second logon information, In, the first logon information is associated with the first preset fingerprint information, and the second logon information is associated with the second preset fingerprint information. When the first default biological information is the first preset fingerprint information, mobile phone obtains and the first preset fingerprint information associated first Logon information, the first logon information are the first authentication information.
It is associated with the first default biological information using journey that mobile phone can also first pass through the first default biological information acquisition Sequence, then obtain first in application program associated with the first default biological information by the identification information of the first application program and answer With the first authentication information of program.Such as:First default biological information is the first preset fingerprint information, is believed with the first preset fingerprint Manner of breathing is associated " QQ application programs ", " wechat application program ".When the identification information of the first application program is " QQ application journeys When sequence " identification information, you can obtain " QQ application journeys associated with the first preset fingerprint information by " QQ application programs " mark First log-on message of sequence ", the first log-on message are the first authentication information.
When in mobile phone not with the mark corresponding authentication information, alternatively, mobile phone obtains mobile phone by identification information In all authentication informations corresponding with the mark can but when all authentication informations are not associated with the first default biological information The first prompt message is generated, such as:User authentication information is not present, and the first prompt message is the first authentication information.
After mobile phone obtains the first authentication information, just first is recognized by the communication connection between mobile phone and laptop Card information is sent to laptop.In specific implementation process, first authentication information can be the first user for stepping on Enter the login identity information of first application program, such as:User name and password or a command information, such as:Open file Gripping finger enables or a prompt message, such as:User authentication information is not present, and can also be other other authentication informations, here, Just differ in the application and one schematically illustrates.
The second way, mobile phone is in the first biological information for confirming the first user and the first default biological information in mobile phone After it fails to match, mobile phone will generate the second prompt message, such as:User information cannot match.Mobile phone passes through between laptop Communication connection the second prompt message is sent to laptop.
In order to enable users to the authentication information associated with biological information of the typing in the first electronic equipment, described in acquisition After first solicited message of currently running first application program of the second electronic equipment, and it is pair in first solicited message When the authentication request information of the first user, detection obtains in presumptive area before the first biological information of first user, institute The method of stating further includes:
It is that first user inputs the first user information for first application program in first solicited message Input solicited message when, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will First default characteristic information is associated with first authentication information;
Preserve first authentication information, the first default biological information, first default characteristic information.
Continue with the first electronic equipment to be mobile phone, for the second electronic equipment is laptop, to the tool of above-mentioned steps Body realization is described:The first solicited message that mobile phone obtains is that the first user inputs the first user letter for the first application program When the input solicited message of breath, first user information is recorded as the first authentication information, such as:When the first application program is " QQ application programs ", the first user the first user letter such as input username and password on " QQ application programs " log-in interface Breath or the first user input first user such as user name, password, registration mailbox letter in " QQ application programs " register interface Breath.Mobile phone obtains the first user information by communication connection between laptop, and the first user information is recorded as the One authentication information.
Mobile phone send out a prompt message for prompt the first user on a preset region the first user of typing second Biological information.Such as:The biological informations such as fingerprint, iris, pulse.After the second biological information that mobile phone obtains the first user, by the Two biological informations are recorded as the first default biological information.Mobile phone can also initiate an application program identification solicited message and be used for notes This computer asks the identification information of the first application program, will after laptop receives application program identification solicited message The identification information of first application program is sent to mobile phone by the communication connection between mobile phone and notebook.
In turn, identification information recording is the first default characteristic information corresponding with the first default biological information by mobile phone, and First default characteristic information is associated with first authentication information.Such as:When the first default biological information is the first user The first finger print information, the identification information of the first application program is " QQ application programs " identification information, and the first authentication information is When first user is used to log in first logon information of " QQ application programs ", then corresponding with the first finger print information first is default special Reference breath is " QQ application programs " identification information.Also, it is " QQ application programs " identification information is associated with the first logon information. Show that the first finger print information of the first user in mobile phone is corresponding with first logon information of " QQ application programs ".I.e.:Pass through " QQ Application program " identification information can be by the first finger print information of the first user, " QQ application programs " and the first user for logging in " QQ First logon information of application program " associates.
Again by the first default characteristic information by the first application program, the first default biological information and the first authentication information into After row association, will and the corresponding first default biological information of the first user, the first default feature corresponding with the first application program Information and the first authentication information are stored in mobile phone.
In order to enable users to be set to complete the second electronics by the function of the identification user biological feature of the first electronic equipment The technique effect of user's registration in the first standby application program is obtaining currently running first application of second electronic equipment After first solicited message of program, the method further includes:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology of first user in the presumptive area Information;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent out Second electronic equipment is given, so that first user can be based on the default log-on message applies journey described first It is registered in sequence.
Continue with the first electronic equipment to be mobile phone, for the second electronic equipment is laptop, to the tool of above-mentioned steps Body realization is described:After the first solicited message that mobile phone obtains, judge whether the first solicited message is user's registration request letter Breath.Such as:When the first application program is " QQ application programs ", user clicks the registration button of " QQ application programs ", in turn " QQ Application program " enters register interface, and the first solicited message that mobile phone obtains at this time is that the user's registration of " QQ application programs " is asked Seek information.
Determine the first solicited message be user's registration solicited message when, mobile phone send out a prompt message for prompt first The third biological information of user first user of typing on a preset region.The third biology letter of the first user is obtained in mobile phone After breath, judge whether third biological information and the first default biological information of advance typing in mobile phone match.Such as:When mobile phone is examined When measuring the finger print information of the first user, judge whether finger print information matches with the first preset fingerprint information in mobile phone;Alternatively, When mobile phone detects the iris information of the first user, judge the first default iris information in iris information and mobile phone whether Match.
When third biological information is matched with the first default biological information, by the default log-on message in advance typing mobile phone It is sent to laptop, is registered in the first application program so that the first user can be based on default log-on message.Than Such as:It is the user's registration solicited message of " QQ application programs ", and the fingerprint and hand of first user's typing in the first solicited message When the first preset fingerprint information matches in machine, the default log-on message in first typing mobile phone is sent to notebook electricity by mobile phone Default log-on message is filled into the corresponding input frame of " QQ application programs " register interface by brain, laptop, the first user Default log-on message can be viewed in laptop, can directly be registered using default log-on message, can be also directed to pre- If certain information in log-on message are modified, such as:Password, contact method etc., and then pass through modified log-on message It is registered.
It includes some conventional user's registration informations that log-on message is preset in mobile phone, such as:User name, password, the pet name, Relevant mailbox, contact method etc..Default log-on message can be the log-on message of user's advance typing in mobile phone, can also be After mobile phone and laptop generate communication connection, the first log-on message that user is inputted by laptop, notebook User is inputted the first log-on message again and is sent to mobile phone by computer, and the first log-on message is recorded as default log-on message simultaneously by mobile phone It preserves.Certainly, during specific implementation, those of ordinary skill in the art can also obtain default registration using other manner Information one schematically illustrates here, just differing in the application.
Embodiment two
Based on inventive concept same as a kind of information processing method in the embodiment of the present application one, referring to FIG. 4, the application Embodiment provides a kind of first electronic equipment, and first electronic equipment can be established with the second electronic equipment and be communicated to connect, described First electronic equipment includes:
First acquisition unit 401, for there are the communication connections in first electronic equipment and the second electronic equipment When, obtain the first solicited message of currently running first application program of the second electronic equipment;
First detection unit 402, for when first solicited message is the authentication request information to the first user, examining Survey the first biological information for obtaining first user in presumptive area;
First authentication unit 403, for first biological information and the first default biological information to be carried out matching verification, Obtain verification result;
First processing units 404 send first certification for generating the first authentication information according to the verification result Information is to second electronic equipment.
First authentication information includes the login identity information that the first user is used to login first application program.
In order to be able to verify that the matching relationship of the first biological information and the first default biological information, the first authentication unit tool Body includes:
First judgment module, for judge first biological information and the described first default biological information whether phase Match, obtains the first judging result;
First generation module generates the verification result for being based on first judging result, wherein described the One judging result is when being, the verification result is successful match, when first judging result is no, the verification result For it fails to match.
The first authentication information is generated in order to be based on verification result, when the verification result is the successful match, institute First processing units are stated to specifically include:
First acquisition module obtains the identification information of first application program for being based on the communication connection;
Second generation module, for based on the described first default biological information and the identification information, generating described first Authentication information;
First sending module, for sending first authentication information to second electronic equipment.
In order to the first default biological information of typing user, and by the first default biological information and the first application program First authentication information is associated, and first electronic equipment further includes:
First recording unit, for being that first user is directed to first application program in first solicited message When inputting the input solicited message of the first user information, first user information is recorded as first authentication information;
Second detection unit, for detecting the second biological information for obtaining first user in the presumptive area;
Second recording unit, for second biological information to be recorded as the described first default biological information;
Second acquisition unit obtains the identification information of first application program for being based on the communication connection;
Third recording unit, for being and the described first default biological information corresponding first by the identification information recording Default characteristic information, and first default characteristic information is associated with first user information;
First storage unit, for preserving first authentication information, the first default biological information, described first in advance If characteristic information.
In order to enable users to be set to complete the second electronics by the function of the identification user biological feature of the first electronic equipment The technique effect of user's registration in the first standby application program, first electronic equipment further include:
First judging unit obtains second for judging whether first solicited message is user's registration solicited message Judging result;
Third detection unit, for when second judging result is to be, detection to obtain described in the presumptive area The third biological information of first user;
Second judgment unit, for judging whether the third biological information matches with the described first default biological information, Obtain third judging result;
First transmission unit, when for being in the third judging result, by the first electronic equipment described in advance typing In default log-on message be sent to second electronic equipment believe so that first user can be based on the default registration Breath is registered in first application program.
By one or more of the embodiment of the present application technical solution, following one or more technology effects may be implemented Fruit:
1, due in technical solution in the embodiment of the present application, using in first electronic equipment and the second electronics For equipment there are when the communication connection, detection obtains the technology hand of the first biological information of first user in presumptive area Section.In this way, application program hair of second electronic equipment in the function and the second electronic equipment that do not have identification user biological feature When playing authentication request, it can be obtained the in presumptive area by having the first electronic equipment of function detection of identification user biological feature The first biological information of one user, and then the biological information by identifying the first user, to make first in the second electronic equipment Application program enters the operating status after authentication.It can be in multiple equipment thus it is possible to effectively solve to lack one kind in the prior art Upper the technical issues of realizing convenient, secure log verification method and electronic equipment, realizing can be real in multiple equipment Existing convenient, secure log verification technique effect.
2, since in technical solution in the embodiment of the present application, use will be in the first electronic equipment described in advance typing Default log-on message be sent to second electronic equipment so that first user can be based on the default log-on message The technological means registered in first application program.User carries out application program on the second electronic equipment in this way When registration, without being manually entered the related registration information of user, the first electronic equipment is in the biological information for detecting user and in advance If biological information matches, so that it may the log-on message of the advance typing of user are sent to the second electronic equipment and complete registration.So It realizes in the function that the second electronic equipment does not have identification user biological feature, it can be by having identification user biological feature The technique effect of the registration of user in the first application program of first electronic equipment of function to complete the second electronic equipment.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, the present invention can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with life In the computer-readable memory of object space formula work so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Specifically, the corresponding computer program instructions of information processing method in the embodiment of the present application can be stored in CD, hard disk, on the storage mediums such as USB flash disk, when computer program instructions quilt corresponding with information processing method in storage medium First electronic equipment reads or is performed, and includes the following steps:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronics to set First solicited message of standby currently running first application program;
When first solicited message is the authentication request information to the first user, detection obtains described in presumptive area The first biological information of first user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, first authentication information to second electronics is sent and sets It is standby.
Wherein, first authentication information includes the login identity letter that the first user is used to login first application program Breath.
Optionally, stored in the storage medium and step:By first biological information and the first default biology letter Breath carries out matching verification, obtains verification result, and corresponding computer instruction specifically includes during specific be performed:
Judge whether first biological information matches with the described first default biological information, obtains first and judge knot Fruit;
Based on first judging result, the verification result is generated, wherein when first judging result is to be, The verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
Optionally, when the verification result is the successful match, stored in the storage medium and step:According to The verification result generates the first authentication information, sends first authentication information to second electronic equipment, corresponding meter The instruction of calculation machine specifically includes during specific be performed:
Based on the communication connection, the identification information of first application program is obtained;
Based on the described first default biological information and the identification information, first authentication information is generated;
First authentication information is sent to second electronic equipment.
Optionally, when in storage medium computer program instructions corresponding with information processing method read by an electronic equipment It takes or is performed, after the first solicited message for obtaining currently running first application program of the second electronic equipment, And when first solicited message is the authentication request information to the first user, detection obtains first use in presumptive area Further include following steps before first biological information at family:
It is that first user inputs the first user information for first application program in first solicited message Input solicited message when, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will First default characteristic information is associated with first authentication information;
Preserve first authentication information, the first default biological information, first default characteristic information.
Optionally, when in storage medium computer program instructions corresponding with information processing method read by an electronic equipment It takes or is performed, after the first solicited message for obtaining currently running first application program of the second electronic equipment, Further include following steps:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology of first user in the presumptive area Information;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent out Second electronic equipment is given, so that first user can be based on the default log-on message applies journey described first It is registered in sequence.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (12)

1. a kind of information processing method, is applied to the first electronic equipment, first electronic equipment can be built with the second electronic equipment Vertical communication connection, the method includes:
In first electronic equipment and the second electronic equipment, there are when the communication connection, obtain second electronic equipment to work as First solicited message of the first application program of preceding operation;
When first solicited message is the authentication request information to the first user, detection obtains described first in presumptive area The first biological information of user;
First biological information and the first default biological information are subjected to matching verification, obtain verification result;
The first authentication information is generated according to the verification result, sends first authentication information to second electronic equipment.
2. the method as described in claim 1, which is characterized in that first authentication information includes the first user for logining institute State the login identity information of the first application program.
3. the method as described in claim 1, which is characterized in that described by first biological information and the first default biology letter Breath carries out matching verification, obtains verification result, specifically includes:
Judge whether first biological information matches with the described first default biological information, obtains the first judging result;
Based on first judging result, the verification result is generated, wherein described when first judging result is to be Verification result is successful match, and when first judging result is no, the verification result is that it fails to match.
4. method as claimed in claim 3, which is characterized in that when the verification result is the successful match, described The first authentication information is generated according to the verification result, sends first authentication information to second electronic equipment, specific packet It includes:
Based on the communication connection, the identification information of first application program is obtained;
Based on the described first default biological information and the identification information, first authentication information is generated;
First authentication information is sent to second electronic equipment.
5. the method as described in any claim in claim 1-4, which is characterized in that obtaining, second electronic equipment is current After first solicited message of the first application program of operation, and it is to be asked to the authentication of the first user in first solicited message When seeking information, detection obtains in presumptive area before the first biological information of first user, and the method further includes:
It is that first user inputs the defeated of the first user information for first application program in first solicited message When entering solicited message, first user information is recorded as first authentication information;
Detection obtains the second biological information of first user in the presumptive area;
Second biological information is recorded as the described first default biological information;
Based on the communication connection, the identification information of first application program is obtained;
It is the first default characteristic information corresponding with the described first default biological information by the identification information recording, and will be described First default characteristic information is associated with first authentication information;
Preserve first authentication information, the first default biological information, first default characteristic information.
6. the method as described in any claim in claim 1-4, which is characterized in that obtaining, second electronic equipment is current After first solicited message of the first application program of operation, the method further includes:
Judge whether first solicited message is user's registration solicited message, obtains the second judging result;
When second judging result is to be, detection obtains the third biology letter of first user in the presumptive area Breath;
Judge whether the third biological information matches with the described first default biological information, obtains third judging result;
When the third judging result is to be, the default log-on message in the first electronic equipment described in advance typing is sent to Second electronic equipment, so that first user can be based on the default log-on message in first application program It is registered.
7. a kind of first electronic equipment, first electronic equipment can be established with the second electronic equipment and be communicated to connect, described first Electronic equipment includes:
First acquisition unit, for, there are when the communication connection, being obtained in first electronic equipment and the second electronic equipment First solicited message of currently running first application program of the second electronic equipment;
First detection unit, for when first solicited message is the authentication request information to the first user, detection to obtain The first biological information of first user in presumptive area;
First authentication unit is tested for first biological information and the first default biological information to be carried out matching verification Demonstrate,prove result;
First processing units send first authentication information extremely for generating the first authentication information according to the verification result Second electronic equipment.
8. the first electronic equipment as claimed in claim 7, which is characterized in that first authentication information is used including the first user In the login identity information for logining first application program.
9. the first electronic equipment as claimed in claim 7, which is characterized in that first authentication unit specifically includes:
First judgment module is obtained for judging whether first biological information matches with the described first default biological information Obtain the first judging result;
First generation module generates the verification result, wherein sentence described first for being based on first judging result Disconnected result is when being, the verification result is successful match, and when first judging result is no, the verification result is With failure.
10. the first electronic equipment as claimed in claim 9, which is characterized in that the verification result be the successful match When, the first processing units specifically include:
First acquisition module obtains the identification information of first application program for being based on the communication connection;
Second generation module, for based on the described first default biological information and the identification information, generating first certification Information;
First sending module, for sending first authentication information to second electronic equipment.
11. the first electronic equipment as described in any claim in claim 7-10, which is characterized in that first electronic equipment Further include:
First recording unit, for being that first user inputs for first application program in first solicited message When the input solicited message of the first user information, first user information is recorded as first authentication information;
Second detection unit, for detecting the second biological information for obtaining first user in the presumptive area;
Second recording unit, for second biological information to be recorded as the described first default biological information;
Second acquisition unit obtains the identification information of first application program for being based on the communication connection;
Third recording unit, for presetting the identification information recording for corresponding with the described first default biological information first Characteristic information, and first default characteristic information is associated with first user information;
First storage unit, for preserving first authentication information, the first default biological information, the first default spy Reference ceases.
12. the first electronic equipment as described in any claim in claim 7-10, which is characterized in that first electronic equipment Further include:
First judging unit obtains second and judges for judging whether first solicited message is user's registration solicited message As a result;
Third detection unit, for when second judging result is to be, detection to obtain described first in the presumptive area The third biological information of user;
Second judgment unit is obtained for judging whether the third biological information matches with the described first default biological information Third judging result;
First transmission unit will be in the first electronic equipment described in advance typing when for being in the third judging result Default log-on message is sent to second electronic equipment, so that first user can be existed based on the default log-on message It is registered in first application program.
CN201410643500.7A 2014-11-10 2014-11-10 A kind of information processing method and electronic equipment Active CN105574400B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410643500.7A CN105574400B (en) 2014-11-10 2014-11-10 A kind of information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410643500.7A CN105574400B (en) 2014-11-10 2014-11-10 A kind of information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN105574400A CN105574400A (en) 2016-05-11
CN105574400B true CN105574400B (en) 2018-08-31

Family

ID=55884519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410643500.7A Active CN105574400B (en) 2014-11-10 2014-11-10 A kind of information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN105574400B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111949960A (en) * 2020-05-14 2020-11-17 华为技术有限公司 Data sharing method, electronic device and system
CN111859357A (en) * 2020-07-17 2020-10-30 维沃移动通信有限公司 Login method and device and electronic equipment
CN113570360B (en) * 2021-06-30 2024-03-19 中国银联股份有限公司 Payment method, device, equipment and medium
CN113935008B (en) * 2021-12-15 2022-03-11 深圳竹云科技有限公司 User authentication method, device, electronic equipment and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533392A (en) * 2013-10-25 2014-01-22 乐视网信息技术(北京)股份有限公司 Method, electronic device and system for logging in account
CN103634109A (en) * 2013-10-31 2014-03-12 小米科技有限责任公司 Operation right authentication method and device
CN103701774A (en) * 2013-12-03 2014-04-02 乐视网信息技术(北京)股份有限公司 Login method and device
CN103853950A (en) * 2014-03-20 2014-06-11 深圳市中兴移动通信有限公司 Authentication method based on mobile terminal and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100992573B1 (en) * 2010-03-26 2010-11-05 주식회사 아이그로브 Authentication method and system using mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533392A (en) * 2013-10-25 2014-01-22 乐视网信息技术(北京)股份有限公司 Method, electronic device and system for logging in account
CN103634109A (en) * 2013-10-31 2014-03-12 小米科技有限责任公司 Operation right authentication method and device
CN103701774A (en) * 2013-12-03 2014-04-02 乐视网信息技术(北京)股份有限公司 Login method and device
CN103853950A (en) * 2014-03-20 2014-06-11 深圳市中兴移动通信有限公司 Authentication method based on mobile terminal and mobile terminal

Also Published As

Publication number Publication date
CN105574400A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
US10390222B2 (en) Technologies for touch-free multi-factor authentication
EP2873192B1 (en) Methods and systems for using derived credentials to authenticate a device across multiple platforms
US10812485B1 (en) Wearable device-based user authentication
EP2939166B1 (en) Query system and method to determine authentication capabilities
US9391968B2 (en) Scored factor-based authentication
CN106716433B (en) The system and method for certificate management between electronic equipment
US9172687B2 (en) Query system and method to determine authentication capabilities
US9083689B2 (en) System and method for implementing privacy classes within an authentication framework
US9306754B2 (en) System and method for implementing transaction signing within an authentication framework
CN105827600B (en) Method and device for logging in client
US20150242605A1 (en) Continuous authentication with a mobile device
EP3608807A1 (en) Privacy enhanced key management for a web service provider using a converged security engine
US9942223B2 (en) Automated device discovery of pairing-eligible devices for authentication
CN105592014B (en) A kind of trusted terminal verification method, device
WO2016081254A1 (en) Optimized token-based proxy authentication
EP3175578A1 (en) System and method for establishing trust using secure transmission protocols
CN105574400B (en) A kind of information processing method and electronic equipment
ES2785048T3 (en) Automatic connection to an online service
CN110061995A (en) A kind of mouse, identity authorization system, method, apparatus and storage medium
CN107370765A (en) A kind of ftp server identity identifying method and system
KR20180104657A (en) Method, device and terminal for entering an application's login password
CN106411811A (en) Authentication method, system and device of accessing customer service
CN104933379B (en) ID card information acquisition methods, apparatus and system
Owens et al. A Framework for Evaluating the Usability and Security of Smartphones as FIDO2 Roaming Authenticators
US11349672B1 (en) Multi-factor authentication with code rotation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant