Application program access method and device
Technical field
This specification is related to field of computer technology more particularly to a kind of application program access method and device.
Background technology
With the development of development of Mobile Internet technology, the function of the mobile terminals such as smart mobile phone is more and more abundant, for example, mobile
Terminal can also provide the functions such as shopping online, amusement and recreation, mobile terminal has become in addition to providing basic communication function
One of necessity during people's daily life and work exchange.At the same time, with web application
The type and function of (Application, APP) are more and more abundant, and the APP that user installs in the terminal is also more and more.
Since APP has been usually noted many information (such as proprietary information, identity information, travel information etc.) of user, move
Dynamic terminal is once lost, if the APP in the mobile terminal, by other people malicious operations, for consequence than more serious, therefore, it is necessary to carry
Go out a kind of application program access method, to avoid the APP in mobile terminal by malicious operation.
Invention content
The purpose of this specification embodiment is to provide a kind of application program access method and device, works as mobile terminal to reach
Avoid the APP in the mobile terminal by the purpose of malicious operation when loss.
This specification embodiment is realized in:
A kind of application program access method that this specification embodiment provides, the method includes:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's
Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work(
Energy.
Optionally, the method further includes:
When the biological information of the user and the target biometric information mismatch, mesh described in No starting
Mark function.
Optionally, the target biometric information is set to the secondary of at least two functions in application program described
Before the step of authentication information, further include:
Receive the authorization requests of user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program
The re-authentication information of energy.
Optionally, described to set the target biometric information to the secondary of at least two functions in application program and recognize
Information is demonstrate,proved, including:
The function selection request that user is directed to application program is received, the function selection request is described using journey for selecting
At least two functions of sequence;
Set the target biometric information to the re-authentication information at least two functions that the user chooses.
Optionally, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
A kind of application program access mechanism that this specification embodiment provides, described device include:
First acquisition module, for obtaining target biometric information;
Setup module, for setting the target biometric information to the secondary of at least two functions in application program
Authentication information;
Second acquisition module, for working as the access request for receiving user and being triggered for objective function in the application program
When, the biological information of the user is obtained, the objective function is any of described at least two function;
Starting module, for when the biological information of the user is with the target biometric information matches, opening
Move the objective function.
Optionally, described device further includes:
Disabled module is used for when the biological information of the user and target biometric information mismatch,
Objective function described in No starting.
Optionally, described device further includes:
Receiving module, the authorization requests for receiving user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program
The re-authentication information of energy.
Optionally, the setup module, including:
Request reception unit selects request, the function selection request for receiving user for the function of application program
At least two functions for selecting the application program;
Setting unit, for setting the target biometric information at least two functions that the user chooses
Re-authentication information.
Optionally, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
The a kind of electronic equipment that this specification embodiment provides, including:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed
It manages device and executes following operation:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's
Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work(
Energy.
A kind of computer storage media that this specification embodiment provides, the computer-readable recording medium storage one
Or multiple programs, one or more of programs by the electronic equipment including multiple application programs when being executed so that the electricity
Sub- equipment executes following operation:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's
Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work(
Energy.
Above-mentioned at least one technical solution that this specification embodiment uses can reach following advantageous effect:
In this specification embodiment, it can authorize and recognize biological information as the secondary of multiple functions in application program
Information is demonstrate,proved, when the application program is in (online) state of login, if user accesses the function in the application program, is needed pair
The biological information of the user carries out re-authentication, whether has a permission for accessing the function to verify the user, and only two
Secondary certification passes through, and the user is just allowed to access the function, is avoided in the mobile terminal to reach when mobile terminal is lost
APP is by the purpose of malicious operation.In addition, in this specification embodiment, same biological information can be set as more simultaneously
The re-authentication information of a function, without being once arranged respectively for each function in multiple functions, operation is compared
Simply.
Description of the drawings
Attached drawing described herein is used for providing further understanding this specification, forms part of this specification,
The illustrative embodiments and their description of this specification do not constitute the improper restriction to this specification for explaining this specification.
In the accompanying drawings:
Fig. 1 is a kind of application program access method embodiment of this specification;
Fig. 2 is a kind of schematic diagram of application program access method of this specification;
Fig. 3 is this specification another kind application program access method embodiment;
Fig. 4 is a kind of application program access mechanism embodiment of this specification;
Fig. 5 is this specification a kind of electronic equipment embodiment.
Specific implementation mode
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation
Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described
Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this
The every other embodiment that field those of ordinary skill is obtained without making creative work should all belong to this
The range of specification protection.
What mobile Internet became at present is more and more important, and the terminal devices such as mobile phone are set as the Primary communication of mobile Internet
It is standby, it has also become people's very important tool in the communication process of daily life and work is pacified once losing in mobile terminal
The APP of dress is faced with by the risk of other people malicious operations, and in order to solve the above-mentioned technical problem, this specification embodiment provides
A kind of application program access method and device.
A kind of application program access method provided first below this specification embodiment is introduced.
Embodiment one
As shown in Figure 1, this specification embodiment provides a kind of application program access method, the executive agent of this method can be with
For terminal device, or can be executed jointly by terminal device and server, wherein the terminal device can be such as individual calculus
The equipment such as machine can also such as mobile phone, tablet computer, smartwatch and personal digital assistant mobile terminal device, the terminal be set
Standby can be the terminal device that user uses.The server can be independent server, can also be by multiple server groups
At server cluster.This method can specifically include following steps:
In step s 102, target biometric information is obtained.
In this specification embodiment, target biometric information can be actively entered by user, in an application scenarios,
The operating system that user can be directed to terminal device is actively entered target biometric information;In another application scenarios, use
Open a terminal the application program in equipment at family, target biometric information is actively entered in the application program, for example, user beats
" Alipay " installed in mobile phone is opened, the biological information input interface of " Alipay " is opened, carries out target biometric letter
The input of breath.
In this specification embodiment, user can be prompted to input target biometric information by terminal device, be answered at one
With in scene, user opens a terminal after equipment, and display reminding message is special to prompt user to input biology on the table for terminal device
Reference ceases, and user inputs target biometric information for the prompting message;In another application scenarios, user opens a terminal
After application program in equipment, application program pops up prompting message to prompt user to input biological information, and user is directed to should
Prompting message inputs target biometric information.
In this specification embodiment, target biometric information is subsequently used for comparing the biological characteristic letter of standard as certification
Breath.In practical applications, biological information may include at least one of following:Finger print information, voiceprint, face information and
Iris information.
In this specification embodiment, when biological information is finger print information, it can be known by the fingerprint of terminal device
Other device obtains target biometric information, wherein fingerprint identification device can be home keys, or has full frame fingerprint
The display screen of identification function.
When biological information is voiceprint, target biometric letter can be obtained by the microphone of terminal device
Breath.
When biological information is face information, target biometric letter can be obtained by the camera of terminal device
Breath.
When biological information is iris information, target biometric letter can be obtained by the camera of terminal device
Breath.
In this specification embodiment, target biometric information can be the biological characteristic letter uniquely stored in terminal device
Breath.
In step S104, it sets target biometric information to the re-authentication of at least two functions in application program
Information.
It is understood that user inputs login account and login password on the login interface of application program, using journey
The login account and login password can be sent to server and verified by sequence, and after being verified, which logins successfully,
Always it is in (online) state of login.
Currently, when user accesses to the various functions in the application program of login status, it can be without appointing
What is verified, and various functions are directly accessed, although operation relatively directly exists by the risk of malicious operation in this way.And this explanation
In book embodiment, re-authentication can be set simultaneously to multiple functions in application program, in the case, user steps on to being in
It when above-mentioned function in the application program of record state accesses, needs to verify the identity of user, verifying the user is
It is no that there are access rights can just access above-mentioned function only when being verified.
In addition, in order to avoid user is when reporting biological information to carry out re-authentication, the biology for needing to report is obscured
Characteristic information (e.g. reports fingerprint or face information;Alternatively, reporting the fingerprint of thumbprint information or index finger
Information), it, can be when re-authentication be arranged simultaneously to multiple functions in application program, using same in this specification embodiment
One biological information sets target biometric information at least two work(in application program as re-authentication information
The re-authentication information of energy.
In this specification embodiment, re-authentication information is for the foundation as re-authentication, specifically, in application program
When in login status, if user accesses function in the application program, the biological information to current accessed user is needed
Re-authentication is carried out, the foundation of re-authentication is re-authentication information.
In this specification embodiment, usually there are an application program multiple functions, function can specifically be divided into:Pay work(
It can, check history message function, userspersonal information's setting function, address list look facility, address list authorization function, chat letter
Look facility, dynamic publishing function are ceased, sweeps and sweeps function, game function and function of search etc..
In this specification embodiment, it is functional secondary target biometric information can be set to institute in application program
Authentication information can also set target biometric information to the re-authentication information of partial function in application program.
In this specification embodiment, recognize when setting target biometric information to the secondary of partial function in application program
When demonstrate,proving information, at least two functions can be randomly choosed, target biometric information is set as randomly choosing in application program
At least two functions re-authentication information;At least two functions can also be selected, by target according to certain selection rule
Biological information is set as the re-authentication information at least two functions of being chosen according to rule.
Specifically, selection rule may include:The function of user's property and privacy is arrived involved in preferential selection application program,
Or the function etc. that user is commonly used in preferential selection application program.
Preferably, it is contemplated that payment function checks that the functions such as history message function and chat message look facility are usual
It is related to the property and personal secrets of user, therefore, is setting target biometric information to partial function in application program
Re-authentication information in the case of, it is this kind of in application program target biometric information can be set to and is related to user's
The re-authentication information of the function of property and personal secrets, is revealed to avoid the property of user from suffering a loss with privacy.
In one example, for application program is GT grand touring APP, GT grand touring APP includes:" checking History Order " work(
Energy, " payment " function, and " personal information setting " function etc., can be by the mesh after obtaining target biometric information
Mark biological information is set as in GT grand touring APP " checking History Order " function, the re-authentication information of " payment " function.
In this specification embodiment, in order to meet the individual demand of user, can also at least two work(be selected by user
Can, target biometric information is set to the re-authentication information at least two functions that user chooses, at this point, above-mentioned steps
S104 can specifically include following steps:
Function selection request of the user for application program is received, function selection request is for selecting application program extremely
Few two functions;
Set target biometric information to the re-authentication information at least two functions that the user chooses.
In this specification embodiment, before the selection that user carries out function, application program can also make prompt, prompt
Which function user can select, with for reference, for example, prompt user selects include in application program to be related to user
Property and personal secrets function.
In step s 106, it when receiving the access request that user triggers for objective function in application program, obtains
The biological information of user, the objective function are any of above-mentioned at least two function.
In this specification embodiment, when receiving the access request that user triggers for objective function in application program,
Reporting of user biological information can be prompted to carry out re-authentication, such as prompted by way of message notifying, be followed by
Receive the biological information of reporting of user.
In this specification embodiment, in order to avoid frequently prompting user, the unfriendly of interaction is caused, when receiving user's needle
To that when the access request of objective function triggering, can not make any prompt in application program, the biology for directly acquiring user is special
Reference ceases, and in a typical application scenarios, by taking finger print information as an example, the terminal with full frame fingerprint identification function is set
Standby, user clicks screen and triggers access request, which, can also be full frame by its while receiving access request
Fingerprint identification function obtains the finger print information of the user so that its finger print information is obtained in the case where user has no perception, into
And carry out re-authentication.
In this specification embodiment, when target biometric information is finger print information, if receiving user for application
The access request that objective function triggers in program, then terminal device startup fingerprint identification device, obtains the finger print information of user.
When target biometric information is voiceprint, triggered for objective function in application program if receiving user
Access request, then terminal device start microphone, obtain the sound of user, the sound of the user extracted from the sound got
Line information.
When target biometric information is face information, triggered for objective function in application program if receiving user
Access request, then terminal device start camera, obtain the facial image of user, from the facial image got extraction should
The face information of user.
When target biometric information is iris information, triggered for objective function in application program if receiving user
Access request, then terminal device start camera, obtain the eye image of user, from the eye image got extraction should
The iris information of user.
In step S108, when the biological information of user and target biometric information matches, start target work(
Energy.
In this specification embodiment, foundation of the target biometric information as re-authentication, if current accessed user
Biological information and target biometric information matches, then illustrate that current accessed user has the power of access target function
Limit, terminal device start the objective function, so that user accesses.
If the biological information of current accessed user is mismatched with target biometric information, illustrate the current accessed
User does not have the permission of access target function, and terminal device does not start the objective function, at this point, this specification embodiment provides
Application program access method, following steps can also be increased:
When the biological information of user and target biometric information mismatch, No starting objective function, to
It avoids by malicious operation.
In addition, it is contemplated that environmental factor etc., the biological information of collected user is second-rate sometimes, leads to user
Biological information and target biometric information mismatch, in this specification embodiment, terminal device can also prompt
Current accessed user input password carry out certification again, if again certification identify, No starting objective function, to avoid by
Malicious operation.
In one example, prompt user inputs finger print information to terminal device for the first time, is given birth to finger print information as target
Object characteristic information is equipped with the first APP, the 2nd APP and the 3rd APP in terminal device, and the 3rd APP includes 3 functions, respectively
First function, the second function and third function set target biometric information to the first function, the second function and third work(
The re-authentication information of energy.
As shown in Fig. 2, when user A wants to access the third function 22 of the 3rd APP 21 in terminal device 20, user A can be with
The 3rd APP21 is clicked, since the 3rd APP21 is usually login status (inputting its login password without user to be authenticated),
Therefore it can be directly entered the interface of the 3rd APP21, user A can continue to click 22 triggering access request of third function, due to
First function, the second function and third function are that the state that is not logged in (needs its biological information of reporting of user to carry out two
Secondary certification), therefore the finger print information for obtaining current accessed user A carries out re-authentication, when certification by when, into third function
Content page 23, so that user A accesses.
This specification embodiment provides a kind of application program access method, can authorize using biological information as application
The re-authentication information of multiple functions in program is answered when the application program is in (online) state of login if user accesses this
With the function in program, then need to carry out re-authentication to the biological information of the user, to verify whether the user has
The permission of the function is accessed, only re-authentication passes through, and the user is just allowed to access the function, to reach when mobile terminal is lost
Avoid the APP in the mobile terminal by the purpose of malicious operation when mistake.It, can will be with all one's life in addition, in this specification embodiment
Object characteristic information is set as the re-authentication information of multiple functions simultaneously, without distinguishing for each function in multiple functions
Once it is arranged, operation is fairly simple.
Embodiment two
As shown in figure 3, this specification embodiment provides another application program access method, it can in this specification embodiment
To provide user's license grant clause, in the case that user receives license grant clause, just target biometric information is set as applying
The re-authentication information of at least two functions in program.At this point, this method can specifically include following steps:
In step S300, the authorization requests of user's triggering are received, which is used to indicate target biometric
Information is set as the re-authentication information of at least two functions in application program.
In this specification embodiment, user triggers authorization requests, and characterization user has agreed to license grant clause.
In this specification embodiment, authorization requests are actively triggered by user, in an application scenarios, user can be directed to
The operating system of terminal device is actively entered triggering authorization requests;In another application scenarios, user opens a terminal in equipment
Application program, actively trigger authorization requests in the application program, for example, user opens in mobile phone " Alipay " installed,
The authorization requests for opening " Alipay " trigger interface, carry out the triggering of authorization requests.
In this specification embodiment, user can be prompted to trigger authorization requests by terminal device, in an application scenarios,
User opens a terminal after equipment, terminal device on the table display reminding message with ask the user whether agree to license grant clause, if
User agrees to license grant clause, then shows that user triggers authorization requests;In another application scenarios, user opens a terminal in equipment
Application program after, application program pop up prompting message with ask the user whether agree to license grant clause, if user agree to authorize item
Money then shows that user triggers authorization requests.
In this specification embodiment, biological information may include at least one of following:Finger print information, voiceprint,
Face information and iris information.Target biometric information is subsequently used for comparing the biological information of standard as certification.
In step s 302, target biometric information is obtained.
In this specification embodiment, target biometric information can be actively entered by user, in an application scenarios,
The operating system that user can be directed to terminal device is actively entered target biometric information;In another application scenarios, use
Open a terminal the application program in equipment at family, target biometric information is actively entered in the application program, for example, user beats
" Alipay " installed in mobile phone is opened, the biological information input interface of " Alipay " is opened, carries out target biometric letter
The input of breath.
In this specification embodiment, user can be prompted to input target biometric information by terminal device, be answered at one
With in scene, user opens a terminal after equipment, and display reminding message is special to prompt user to input biology on the table for terminal device
Reference ceases, and user inputs target biometric information for the prompting message;In another application scenarios, user opens a terminal
After application program in equipment, application program pops up prompting message to prompt user to input biological information, and user is directed to should
Prompting message inputs target biometric information.
In this specification embodiment, when biological information is finger print information, it can be known by the fingerprint of terminal device
Other device obtains target biometric information, wherein fingerprint identification device can be home keys, or has full frame fingerprint
The display screen of identification function.When biological information is voiceprint, target can be obtained by the microphone of terminal device
Biological information.When biological information is face information, target organism can be obtained by the camera of terminal device
Characteristic information.When biological information is iris information, target biometric can be obtained by the camera of terminal device
Information.
In this specification embodiment, target biometric information can be the biological characteristic letter uniquely stored in terminal device
Breath.
In step s 304, target biometric information is set to the re-authentication of at least two functions in application program
Information.
User inputs login account and login password on the login interface of application program, and application program can be by the login account
Number and login password be sent to server and verified, after being verified, which logins successfully, and is in logs in always
(online) state.It, can be without currently, when user accesses to the various functions in the application program of login status
Any verification, directly accesses various functions, although operation relatively directly exists by the risk of malicious operation in this way.
And in this specification embodiment, re-authentication can be set simultaneously to multiple functions in application program, in this feelings
Under condition, when user accesses to the above-mentioned function in the application program of login status, need to carry out the identity of user
Verification, verifies whether the user there are access rights can just access above-mentioned function only when being verified.In addition, in order to
It avoids user when reporting biological information to carry out re-authentication, obscures the biological information for needing to report (on being, for example,
Report fingerprint or face information;Alternatively, reporting the finger print information of thumbprint information or index finger), it can be in correspondence
When re-authentication being set simultaneously with multiple functions in program, using same biological information as re-authentication information, i.e.,
Set target biometric information to the re-authentication information of at least two functions in application program.
In this specification embodiment, re-authentication information is for the foundation as re-authentication, specifically, in application program
When in login status, if user accesses function in the application program, the biological information to current accessed user is needed
Re-authentication is carried out, the foundation of re-authentication is re-authentication information.
In this specification embodiment, usually there are an application program multiple functions, function can specifically be divided into:Pay work(
It can, check history message function, userspersonal information's setting function, address list look facility, address list authorization function, chat letter
Look facility, dynamic publishing function are ceased, sweeps and sweeps function, game function and function of search etc..
In this specification embodiment, it is functional secondary target biometric information can be set to institute in application program
Authentication information can also set target biometric information to the re-authentication information of partial function in application program.
In this specification embodiment, recognize when setting target biometric information to the secondary of partial function in application program
When demonstrate,proving information, at least two functions can be randomly choosed, target biometric information is set as randomly choosing in application program
At least two functions re-authentication information.
Further, it is contemplated that payment function checks that the functions such as history message function and chat message look facility are logical
Often it is related to the property and personal secrets of user, therefore, when setting target biometric information to part work(in application program
When the re-authentication information of energy, it is preferred that it is this kind of in application program target biometric information can be set to and is related to use
The re-authentication information of the property at family and the function of personal secrets, is let out to avoid the property of user from suffering a loss with privacy
Dew.
In one example, for application program is GT grand touring APP, GT grand touring APP includes:" checking History Order " work(
Energy, " payment " function, and " personal information setting " function etc., can be by the mesh after obtaining target biometric information
Mark biological information is set as in GT grand touring APP " checking History Order " function, the re-authentication information of " payment " function.
In this specification embodiment, in order to meet the individual demand of user, can also at least two work(be selected by user
Can, set target biometric information to the re-authentication information at least two functions that user chooses.
In this specification embodiment, before the selection that user carries out function, application program can also make prompt, prompt
Which function user can select, with for reference, for example, prompt user selects include in application program to be related to user
Property and personal secrets function.
In step S306, when receiving the access request that user triggers for objective function in application program, obtain
The biological information of user, the objective function are any of above-mentioned at least two function.
In this specification embodiment, when receiving the access request that user triggers for objective function in application program,
Reporting of user biological information can be prompted to carry out re-authentication, such as prompted by way of message notifying, be followed by
Receive the biological information of reporting of user.
In this specification embodiment, in order to avoid frequently prompting user, the unfriendly of interaction is caused, when receiving user's needle
To that when the access request of objective function triggering, can not make any prompt in application program, the biology for directly acquiring user is special
Reference ceases, and in a typical application scenarios, by taking finger print information as an example, the terminal with full frame fingerprint identification function is set
Standby, user clicks screen and triggers access request, which, can also be full frame by its while receiving access request
Fingerprint identification function obtains the finger print information of the user so that its finger print information is obtained in the case where user has no perception, into
And carry out re-authentication.
In this specification embodiment, when target biometric information is finger print information, if receiving user for application
The access request that objective function triggers in program, then terminal device startup fingerprint identification device, obtains the finger print information of user.
When target biometric information is voiceprint, triggered for objective function in application program if receiving user
Access request, then terminal device start microphone, obtain the sound of user, the sound of the user extracted from the sound got
Line information.
When target biometric information is face information, triggered for objective function in application program if receiving user
Access request, then terminal device start camera, obtain the facial image of user, from the facial image got extraction should
The face information of user.
When target biometric information is iris information, triggered for objective function in application program if receiving user
Access request, then terminal device start camera, obtain the eye image of user, from the eye image got extraction should
The iris information of user.
In step S308, when the biological information of user and target biometric information matches, start target work(
Energy.
In this specification embodiment, foundation of the target biometric information as re-authentication, if current accessed user
Biological information and target biometric information matches, then illustrate that current accessed user has the power of access target function
Limit, terminal device start the objective function, so that user accesses.
If the biological information of current accessed user is mismatched with target biometric information, illustrate the current accessed
User does not have the permission of access target function, and terminal device does not start the objective function, at this point, this specification embodiment provides
Application program access method, following steps can also be increased:
When the biological information of user and target biometric information mismatch, No starting objective function.
In addition, when the biological information of user and target biometric information mismatch, terminal device can also be
It prompts current accessed user to input password and carries out certification again, if certification identifies again, No starting objective function.
It should be noted that in practical applications, above-mentioned steps S300's and S302 executes sequence, it can be according to Fig. 3 institutes
That shows first carries out step S300, then executes step S302, i.e., first receives the authorization requests of user, then obtains target biometric letter
Breath;Step S302 can also be first carried out, then executes step S300, i.e., first obtains target biometric information, then receive user's
Authorization requests, this specification embodiment are not construed as limiting this.
This specification embodiment provides a kind of application program access method, can provide user's license grant clause, only when with
When family is agreed to authorize, just authorize using biological information as the re-authentication information of multiple functions in application program, when this is answered
When being in (online) state of login with program, if user accesses the function in the application program, the biology to the user is needed
Characteristic information carries out re-authentication, and to verify whether the user has the permission for accessing the function, only re-authentication passes through,
Allow the user to access the function, avoids the APP in the mobile terminal by malicious operation when mobile terminal is lost to reach
Purpose.In addition, in this specification embodiment, same biological information can be set to the secondary of multiple functions simultaneously and recognized
Information is demonstrate,proved, without being once arranged respectively for each function in multiple functions, operation is fairly simple.
It should be noted that this specification embodiment provide method, can be also used for installed in terminal device to
The secondary login authentication of few two application programs, specifically, can be by the collected target organism of the operating system of terminal device
Characteristic information is set as the authentication information of at least two application programs in the terminal device.In compared to the prior art, needle is needed
It is authenticated the setting of information one by one to each application program, in this specification embodiment, multiple applications can be disposably set
The authentication information of program, operation are fairly simple, time saving.
Embodiment three
It is the application program access method that this specification embodiment provides above, is based on same thinking, this specification is real
It applies example and a kind of application program access mechanism is also provided, as shown in Figure 4.
The application program access mechanism includes:First acquisition module 401, setup module 402,403 and of the second acquisition module
Starting module 404, wherein
First acquisition module 401, for obtaining target biometric information;
Setup module 402, for setting the target biometric information at least two functions in application program
Re-authentication information;
Second acquisition module 403, for working as the access for receiving user and being triggered for objective function in the application program
When request, the biological information of the user is obtained, the objective function is any of described at least two function;
Starting module 404 is used for when the biological information of the user and the target biometric information matches,
Start the objective function.
This specification embodiment provides a kind of application program access method, can authorize using biological information as application
The re-authentication information of multiple functions in program is answered when the application program is in (online) state of login if user accesses this
With the function in program, then need to carry out re-authentication to the biological information of the user, to verify whether the user has
The permission of the function is accessed, only re-authentication passes through, and the user is just allowed to access the function, to reach when mobile terminal is lost
Avoid the APP in the mobile terminal by the purpose of malicious operation when mistake.It, can will be with all one's life in addition, in this specification embodiment
Object characteristic information is set as the re-authentication information of multiple functions simultaneously, without distinguishing for each function in multiple functions
Once it is arranged, operation is fairly simple.
In this specification embodiment, the application program access mechanism further includes:
Disabled module is used for when the biological information of the user and target biometric information mismatch,
Objective function described in No starting.
In this specification embodiment, the application program access mechanism further includes:
Receiving module, the authorization requests for receiving user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program
The re-authentication information of energy.
In this specification embodiment, the setup module 402, including:
Request reception unit selects request, the function selection request for receiving user for the function of application program
At least two functions for selecting the application program;
Setting unit, for setting the target biometric information at least two functions that the user chooses
Re-authentication information.
In this specification embodiment, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
Example IV
It is the application program access mechanism that this specification embodiment provides above, is based on same thinking, this specification is real
It applies example and a kind of electronic equipment is also provided, as shown in Figure 5.
In hardware view, which includes processor, further includes optionally internal bus, network interface, memory.
Wherein, memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), also may be used
Can further include nonvolatile memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, the electricity
Sub- equipment is also possible that the required hardware of other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA
(Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral
Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard
Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always
Line etc..For ease of indicating, only indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of
Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from then operation in corresponding computer program to memory is read in nonvolatile memory, in logical layer
Application program access mechanism is formed on face.Processor executes the program that memory is stored, and specifically for executing following behaviour
Make:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's
Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work(
Energy.
This specification embodiment provides a kind of application program access method, can authorize using biological information as application
The re-authentication information of multiple functions in program is answered when the application program is in (online) state of login if user accesses this
With the function in program, then need to carry out re-authentication to the biological information of the user, to verify whether the user has
The permission of the function is accessed, only re-authentication passes through, and the user is just allowed to access the function, to reach when mobile terminal is lost
Avoid the APP in the mobile terminal by the purpose of malicious operation when mistake.It, can will be with all one's life in addition, in this specification embodiment
Object characteristic information is set as the re-authentication information of multiple functions simultaneously, without distinguishing for each function in multiple functions
Once it is arranged, operation is fairly simple.
Optionally, as one embodiment, the method further includes:
When the biological information of the user and the target biometric information mismatch, mesh described in No starting
Mark function.
Optionally, it as one embodiment, sets in application program extremely the target biometric information to described
Before the step of re-authentication information of few two functions, further include:
Receive the authorization requests of user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program
The re-authentication information of energy.
Optionally, described to set in application program at least the target biometric information to as one embodiment
The re-authentication information of two functions, including:
The function selection request that user is directed to application program is received, the function selection request is described using journey for selecting
At least two functions of sequence;
Set the target biometric information to the re-authentication information at least two functions that the user chooses.
Optionally, as one embodiment, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
The method that application program access mechanism disclosed in the above-mentioned embodiment illustrated in fig. 4 such as this specification executes can be applied to
In processor, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.
During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor or software form
Instruction is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit,
CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal
Processor, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided
Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in this specification embodiment disclosed
Each method, step and logic diagram.General processor can be microprocessor or the processor can also be any conventional
Processor etc..The step of method in conjunction with disclosed in this specification embodiment, can be embodied directly in hardware decoding processor execution
Complete, or in decoding processor hardware and software module combine execute completion.Software module can be located at random storage
Device, flash memory, read-only memory, this fields such as programmable read only memory or electrically erasable programmable memory, register at
In ripe storage medium.The storage medium is located at memory, and processor reads the information in memory, is completed in conjunction with its hardware
The step of stating method.
Certainly, other than software realization mode, other realization methods are not precluded in the electronic equipment of this specification, such as
The mode etc. of logical device or software and hardware combining, that is to say, that the executive agent of following process flow is not limited to each
Logic unit can also be hardware or logical device.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage
One or more programs, the one or more program include instruction, and the instruction is when the portable electric for being included multiple application programs
When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and it is following specifically for executing
Method:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's
Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work(
Energy.
In short, the foregoing is merely the preferred embodiment of this specification, it is not intended to limit the protection of this specification
Range.For all spirit in this specification within principle, any modification, equivalent replacement, improvement and so on should be included in this
Within the protection domain of specification.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus
Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described
There is also other identical elements in the process of element, method, commodity or equipment.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method
Part explanation.