CN108647510A - Application program access method and device - Google Patents

Application program access method and device Download PDF

Info

Publication number
CN108647510A
CN108647510A CN201810467177.0A CN201810467177A CN108647510A CN 108647510 A CN108647510 A CN 108647510A CN 201810467177 A CN201810467177 A CN 201810467177A CN 108647510 A CN108647510 A CN 108647510A
Authority
CN
China
Prior art keywords
information
user
application program
target biometric
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810467177.0A
Other languages
Chinese (zh)
Inventor
温涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Nova Technology Singapore Holdings Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810467177.0A priority Critical patent/CN108647510A/en
Publication of CN108647510A publication Critical patent/CN108647510A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

This specification embodiment discloses a kind of application program access method and device, this method include:Obtain target biometric information;Set target biometric information to the re-authentication information of at least two functions in application program;When receiving the access request that user triggers for objective function in application program, the biological information of user is obtained, objective function is any of described at least two function;When the biological information of user and target biometric information matches, start objective function.In this specification embodiment, it can authorize using biological information as the re-authentication information of multiple functions in application program, when the application program is in login status, if user accesses the function in the application program, it then needs to carry out re-authentication to the biological information of the user, only re-authentication is by just allowing the user to access the function, to achieve the purpose that avoid the APP in the mobile terminal by malicious operation when mobile terminal is lost.

Description

Application program access method and device
Technical field
This specification is related to field of computer technology more particularly to a kind of application program access method and device.
Background technology
With the development of development of Mobile Internet technology, the function of the mobile terminals such as smart mobile phone is more and more abundant, for example, mobile Terminal can also provide the functions such as shopping online, amusement and recreation, mobile terminal has become in addition to providing basic communication function One of necessity during people's daily life and work exchange.At the same time, with web application The type and function of (Application, APP) are more and more abundant, and the APP that user installs in the terminal is also more and more.
Since APP has been usually noted many information (such as proprietary information, identity information, travel information etc.) of user, move Dynamic terminal is once lost, if the APP in the mobile terminal, by other people malicious operations, for consequence than more serious, therefore, it is necessary to carry Go out a kind of application program access method, to avoid the APP in mobile terminal by malicious operation.
Invention content
The purpose of this specification embodiment is to provide a kind of application program access method and device, works as mobile terminal to reach Avoid the APP in the mobile terminal by the purpose of malicious operation when loss.
This specification embodiment is realized in:
A kind of application program access method that this specification embodiment provides, the method includes:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work( Energy.
Optionally, the method further includes:
When the biological information of the user and the target biometric information mismatch, mesh described in No starting Mark function.
Optionally, the target biometric information is set to the secondary of at least two functions in application program described Before the step of authentication information, further include:
Receive the authorization requests of user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program The re-authentication information of energy.
Optionally, described to set the target biometric information to the secondary of at least two functions in application program and recognize Information is demonstrate,proved, including:
The function selection request that user is directed to application program is received, the function selection request is described using journey for selecting At least two functions of sequence;
Set the target biometric information to the re-authentication information at least two functions that the user chooses.
Optionally, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
A kind of application program access mechanism that this specification embodiment provides, described device include:
First acquisition module, for obtaining target biometric information;
Setup module, for setting the target biometric information to the secondary of at least two functions in application program Authentication information;
Second acquisition module, for working as the access request for receiving user and being triggered for objective function in the application program When, the biological information of the user is obtained, the objective function is any of described at least two function;
Starting module, for when the biological information of the user is with the target biometric information matches, opening Move the objective function.
Optionally, described device further includes:
Disabled module is used for when the biological information of the user and target biometric information mismatch, Objective function described in No starting.
Optionally, described device further includes:
Receiving module, the authorization requests for receiving user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program The re-authentication information of energy.
Optionally, the setup module, including:
Request reception unit selects request, the function selection request for receiving user for the function of application program At least two functions for selecting the application program;
Setting unit, for setting the target biometric information at least two functions that the user chooses Re-authentication information.
Optionally, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
The a kind of electronic equipment that this specification embodiment provides, including:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work( Energy.
A kind of computer storage media that this specification embodiment provides, the computer-readable recording medium storage one Or multiple programs, one or more of programs by the electronic equipment including multiple application programs when being executed so that the electricity Sub- equipment executes following operation:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work( Energy.
Above-mentioned at least one technical solution that this specification embodiment uses can reach following advantageous effect:
In this specification embodiment, it can authorize and recognize biological information as the secondary of multiple functions in application program Information is demonstrate,proved, when the application program is in (online) state of login, if user accesses the function in the application program, is needed pair The biological information of the user carries out re-authentication, whether has a permission for accessing the function to verify the user, and only two Secondary certification passes through, and the user is just allowed to access the function, is avoided in the mobile terminal to reach when mobile terminal is lost APP is by the purpose of malicious operation.In addition, in this specification embodiment, same biological information can be set as more simultaneously The re-authentication information of a function, without being once arranged respectively for each function in multiple functions, operation is compared Simply.
Description of the drawings
Attached drawing described herein is used for providing further understanding this specification, forms part of this specification, The illustrative embodiments and their description of this specification do not constitute the improper restriction to this specification for explaining this specification. In the accompanying drawings:
Fig. 1 is a kind of application program access method embodiment of this specification;
Fig. 2 is a kind of schematic diagram of application program access method of this specification;
Fig. 3 is this specification another kind application program access method embodiment;
Fig. 4 is a kind of application program access mechanism embodiment of this specification;
Fig. 5 is this specification a kind of electronic equipment embodiment.
Specific implementation mode
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this The every other embodiment that field those of ordinary skill is obtained without making creative work should all belong to this The range of specification protection.
What mobile Internet became at present is more and more important, and the terminal devices such as mobile phone are set as the Primary communication of mobile Internet It is standby, it has also become people's very important tool in the communication process of daily life and work is pacified once losing in mobile terminal The APP of dress is faced with by the risk of other people malicious operations, and in order to solve the above-mentioned technical problem, this specification embodiment provides A kind of application program access method and device.
A kind of application program access method provided first below this specification embodiment is introduced.
Embodiment one
As shown in Figure 1, this specification embodiment provides a kind of application program access method, the executive agent of this method can be with For terminal device, or can be executed jointly by terminal device and server, wherein the terminal device can be such as individual calculus The equipment such as machine can also such as mobile phone, tablet computer, smartwatch and personal digital assistant mobile terminal device, the terminal be set Standby can be the terminal device that user uses.The server can be independent server, can also be by multiple server groups At server cluster.This method can specifically include following steps:
In step s 102, target biometric information is obtained.
In this specification embodiment, target biometric information can be actively entered by user, in an application scenarios, The operating system that user can be directed to terminal device is actively entered target biometric information;In another application scenarios, use Open a terminal the application program in equipment at family, target biometric information is actively entered in the application program, for example, user beats " Alipay " installed in mobile phone is opened, the biological information input interface of " Alipay " is opened, carries out target biometric letter The input of breath.
In this specification embodiment, user can be prompted to input target biometric information by terminal device, be answered at one With in scene, user opens a terminal after equipment, and display reminding message is special to prompt user to input biology on the table for terminal device Reference ceases, and user inputs target biometric information for the prompting message;In another application scenarios, user opens a terminal After application program in equipment, application program pops up prompting message to prompt user to input biological information, and user is directed to should Prompting message inputs target biometric information.
In this specification embodiment, target biometric information is subsequently used for comparing the biological characteristic letter of standard as certification Breath.In practical applications, biological information may include at least one of following:Finger print information, voiceprint, face information and Iris information.
In this specification embodiment, when biological information is finger print information, it can be known by the fingerprint of terminal device Other device obtains target biometric information, wherein fingerprint identification device can be home keys, or has full frame fingerprint The display screen of identification function.
When biological information is voiceprint, target biometric letter can be obtained by the microphone of terminal device Breath.
When biological information is face information, target biometric letter can be obtained by the camera of terminal device Breath.
When biological information is iris information, target biometric letter can be obtained by the camera of terminal device Breath.
In this specification embodiment, target biometric information can be the biological characteristic letter uniquely stored in terminal device Breath.
In step S104, it sets target biometric information to the re-authentication of at least two functions in application program Information.
It is understood that user inputs login account and login password on the login interface of application program, using journey The login account and login password can be sent to server and verified by sequence, and after being verified, which logins successfully, Always it is in (online) state of login.
Currently, when user accesses to the various functions in the application program of login status, it can be without appointing What is verified, and various functions are directly accessed, although operation relatively directly exists by the risk of malicious operation in this way.And this explanation In book embodiment, re-authentication can be set simultaneously to multiple functions in application program, in the case, user steps on to being in It when above-mentioned function in the application program of record state accesses, needs to verify the identity of user, verifying the user is It is no that there are access rights can just access above-mentioned function only when being verified.
In addition, in order to avoid user is when reporting biological information to carry out re-authentication, the biology for needing to report is obscured Characteristic information (e.g. reports fingerprint or face information;Alternatively, reporting the fingerprint of thumbprint information or index finger Information), it, can be when re-authentication be arranged simultaneously to multiple functions in application program, using same in this specification embodiment One biological information sets target biometric information at least two work(in application program as re-authentication information The re-authentication information of energy.
In this specification embodiment, re-authentication information is for the foundation as re-authentication, specifically, in application program When in login status, if user accesses function in the application program, the biological information to current accessed user is needed Re-authentication is carried out, the foundation of re-authentication is re-authentication information.
In this specification embodiment, usually there are an application program multiple functions, function can specifically be divided into:Pay work( It can, check history message function, userspersonal information's setting function, address list look facility, address list authorization function, chat letter Look facility, dynamic publishing function are ceased, sweeps and sweeps function, game function and function of search etc..
In this specification embodiment, it is functional secondary target biometric information can be set to institute in application program Authentication information can also set target biometric information to the re-authentication information of partial function in application program.
In this specification embodiment, recognize when setting target biometric information to the secondary of partial function in application program When demonstrate,proving information, at least two functions can be randomly choosed, target biometric information is set as randomly choosing in application program At least two functions re-authentication information;At least two functions can also be selected, by target according to certain selection rule Biological information is set as the re-authentication information at least two functions of being chosen according to rule.
Specifically, selection rule may include:The function of user's property and privacy is arrived involved in preferential selection application program, Or the function etc. that user is commonly used in preferential selection application program.
Preferably, it is contemplated that payment function checks that the functions such as history message function and chat message look facility are usual It is related to the property and personal secrets of user, therefore, is setting target biometric information to partial function in application program Re-authentication information in the case of, it is this kind of in application program target biometric information can be set to and is related to user's The re-authentication information of the function of property and personal secrets, is revealed to avoid the property of user from suffering a loss with privacy.
In one example, for application program is GT grand touring APP, GT grand touring APP includes:" checking History Order " work( Energy, " payment " function, and " personal information setting " function etc., can be by the mesh after obtaining target biometric information Mark biological information is set as in GT grand touring APP " checking History Order " function, the re-authentication information of " payment " function.
In this specification embodiment, in order to meet the individual demand of user, can also at least two work(be selected by user Can, target biometric information is set to the re-authentication information at least two functions that user chooses, at this point, above-mentioned steps S104 can specifically include following steps:
Function selection request of the user for application program is received, function selection request is for selecting application program extremely Few two functions;
Set target biometric information to the re-authentication information at least two functions that the user chooses.
In this specification embodiment, before the selection that user carries out function, application program can also make prompt, prompt Which function user can select, with for reference, for example, prompt user selects include in application program to be related to user Property and personal secrets function.
In step s 106, it when receiving the access request that user triggers for objective function in application program, obtains The biological information of user, the objective function are any of above-mentioned at least two function.
In this specification embodiment, when receiving the access request that user triggers for objective function in application program, Reporting of user biological information can be prompted to carry out re-authentication, such as prompted by way of message notifying, be followed by Receive the biological information of reporting of user.
In this specification embodiment, in order to avoid frequently prompting user, the unfriendly of interaction is caused, when receiving user's needle To that when the access request of objective function triggering, can not make any prompt in application program, the biology for directly acquiring user is special Reference ceases, and in a typical application scenarios, by taking finger print information as an example, the terminal with full frame fingerprint identification function is set Standby, user clicks screen and triggers access request, which, can also be full frame by its while receiving access request Fingerprint identification function obtains the finger print information of the user so that its finger print information is obtained in the case where user has no perception, into And carry out re-authentication.
In this specification embodiment, when target biometric information is finger print information, if receiving user for application The access request that objective function triggers in program, then terminal device startup fingerprint identification device, obtains the finger print information of user.
When target biometric information is voiceprint, triggered for objective function in application program if receiving user Access request, then terminal device start microphone, obtain the sound of user, the sound of the user extracted from the sound got Line information.
When target biometric information is face information, triggered for objective function in application program if receiving user Access request, then terminal device start camera, obtain the facial image of user, from the facial image got extraction should The face information of user.
When target biometric information is iris information, triggered for objective function in application program if receiving user Access request, then terminal device start camera, obtain the eye image of user, from the eye image got extraction should The iris information of user.
In step S108, when the biological information of user and target biometric information matches, start target work( Energy.
In this specification embodiment, foundation of the target biometric information as re-authentication, if current accessed user Biological information and target biometric information matches, then illustrate that current accessed user has the power of access target function Limit, terminal device start the objective function, so that user accesses.
If the biological information of current accessed user is mismatched with target biometric information, illustrate the current accessed User does not have the permission of access target function, and terminal device does not start the objective function, at this point, this specification embodiment provides Application program access method, following steps can also be increased:
When the biological information of user and target biometric information mismatch, No starting objective function, to It avoids by malicious operation.
In addition, it is contemplated that environmental factor etc., the biological information of collected user is second-rate sometimes, leads to user Biological information and target biometric information mismatch, in this specification embodiment, terminal device can also prompt Current accessed user input password carry out certification again, if again certification identify, No starting objective function, to avoid by Malicious operation.
In one example, prompt user inputs finger print information to terminal device for the first time, is given birth to finger print information as target Object characteristic information is equipped with the first APP, the 2nd APP and the 3rd APP in terminal device, and the 3rd APP includes 3 functions, respectively First function, the second function and third function set target biometric information to the first function, the second function and third work( The re-authentication information of energy.
As shown in Fig. 2, when user A wants to access the third function 22 of the 3rd APP 21 in terminal device 20, user A can be with The 3rd APP21 is clicked, since the 3rd APP21 is usually login status (inputting its login password without user to be authenticated), Therefore it can be directly entered the interface of the 3rd APP21, user A can continue to click 22 triggering access request of third function, due to First function, the second function and third function are that the state that is not logged in (needs its biological information of reporting of user to carry out two Secondary certification), therefore the finger print information for obtaining current accessed user A carries out re-authentication, when certification by when, into third function Content page 23, so that user A accesses.
This specification embodiment provides a kind of application program access method, can authorize using biological information as application The re-authentication information of multiple functions in program is answered when the application program is in (online) state of login if user accesses this With the function in program, then need to carry out re-authentication to the biological information of the user, to verify whether the user has The permission of the function is accessed, only re-authentication passes through, and the user is just allowed to access the function, to reach when mobile terminal is lost Avoid the APP in the mobile terminal by the purpose of malicious operation when mistake.It, can will be with all one's life in addition, in this specification embodiment Object characteristic information is set as the re-authentication information of multiple functions simultaneously, without distinguishing for each function in multiple functions Once it is arranged, operation is fairly simple.
Embodiment two
As shown in figure 3, this specification embodiment provides another application program access method, it can in this specification embodiment To provide user's license grant clause, in the case that user receives license grant clause, just target biometric information is set as applying The re-authentication information of at least two functions in program.At this point, this method can specifically include following steps:
In step S300, the authorization requests of user's triggering are received, which is used to indicate target biometric Information is set as the re-authentication information of at least two functions in application program.
In this specification embodiment, user triggers authorization requests, and characterization user has agreed to license grant clause.
In this specification embodiment, authorization requests are actively triggered by user, in an application scenarios, user can be directed to The operating system of terminal device is actively entered triggering authorization requests;In another application scenarios, user opens a terminal in equipment Application program, actively trigger authorization requests in the application program, for example, user opens in mobile phone " Alipay " installed, The authorization requests for opening " Alipay " trigger interface, carry out the triggering of authorization requests.
In this specification embodiment, user can be prompted to trigger authorization requests by terminal device, in an application scenarios, User opens a terminal after equipment, terminal device on the table display reminding message with ask the user whether agree to license grant clause, if User agrees to license grant clause, then shows that user triggers authorization requests;In another application scenarios, user opens a terminal in equipment Application program after, application program pop up prompting message with ask the user whether agree to license grant clause, if user agree to authorize item Money then shows that user triggers authorization requests.
In this specification embodiment, biological information may include at least one of following:Finger print information, voiceprint, Face information and iris information.Target biometric information is subsequently used for comparing the biological information of standard as certification.
In step s 302, target biometric information is obtained.
In this specification embodiment, target biometric information can be actively entered by user, in an application scenarios, The operating system that user can be directed to terminal device is actively entered target biometric information;In another application scenarios, use Open a terminal the application program in equipment at family, target biometric information is actively entered in the application program, for example, user beats " Alipay " installed in mobile phone is opened, the biological information input interface of " Alipay " is opened, carries out target biometric letter The input of breath.
In this specification embodiment, user can be prompted to input target biometric information by terminal device, be answered at one With in scene, user opens a terminal after equipment, and display reminding message is special to prompt user to input biology on the table for terminal device Reference ceases, and user inputs target biometric information for the prompting message;In another application scenarios, user opens a terminal After application program in equipment, application program pops up prompting message to prompt user to input biological information, and user is directed to should Prompting message inputs target biometric information.
In this specification embodiment, when biological information is finger print information, it can be known by the fingerprint of terminal device Other device obtains target biometric information, wherein fingerprint identification device can be home keys, or has full frame fingerprint The display screen of identification function.When biological information is voiceprint, target can be obtained by the microphone of terminal device Biological information.When biological information is face information, target organism can be obtained by the camera of terminal device Characteristic information.When biological information is iris information, target biometric can be obtained by the camera of terminal device Information.
In this specification embodiment, target biometric information can be the biological characteristic letter uniquely stored in terminal device Breath.
In step s 304, target biometric information is set to the re-authentication of at least two functions in application program Information.
User inputs login account and login password on the login interface of application program, and application program can be by the login account Number and login password be sent to server and verified, after being verified, which logins successfully, and is in logs in always (online) state.It, can be without currently, when user accesses to the various functions in the application program of login status Any verification, directly accesses various functions, although operation relatively directly exists by the risk of malicious operation in this way.
And in this specification embodiment, re-authentication can be set simultaneously to multiple functions in application program, in this feelings Under condition, when user accesses to the above-mentioned function in the application program of login status, need to carry out the identity of user Verification, verifies whether the user there are access rights can just access above-mentioned function only when being verified.In addition, in order to It avoids user when reporting biological information to carry out re-authentication, obscures the biological information for needing to report (on being, for example, Report fingerprint or face information;Alternatively, reporting the finger print information of thumbprint information or index finger), it can be in correspondence When re-authentication being set simultaneously with multiple functions in program, using same biological information as re-authentication information, i.e., Set target biometric information to the re-authentication information of at least two functions in application program.
In this specification embodiment, re-authentication information is for the foundation as re-authentication, specifically, in application program When in login status, if user accesses function in the application program, the biological information to current accessed user is needed Re-authentication is carried out, the foundation of re-authentication is re-authentication information.
In this specification embodiment, usually there are an application program multiple functions, function can specifically be divided into:Pay work( It can, check history message function, userspersonal information's setting function, address list look facility, address list authorization function, chat letter Look facility, dynamic publishing function are ceased, sweeps and sweeps function, game function and function of search etc..
In this specification embodiment, it is functional secondary target biometric information can be set to institute in application program Authentication information can also set target biometric information to the re-authentication information of partial function in application program.
In this specification embodiment, recognize when setting target biometric information to the secondary of partial function in application program When demonstrate,proving information, at least two functions can be randomly choosed, target biometric information is set as randomly choosing in application program At least two functions re-authentication information.
Further, it is contemplated that payment function checks that the functions such as history message function and chat message look facility are logical Often it is related to the property and personal secrets of user, therefore, when setting target biometric information to part work(in application program When the re-authentication information of energy, it is preferred that it is this kind of in application program target biometric information can be set to and is related to use The re-authentication information of the property at family and the function of personal secrets, is let out to avoid the property of user from suffering a loss with privacy Dew.
In one example, for application program is GT grand touring APP, GT grand touring APP includes:" checking History Order " work( Energy, " payment " function, and " personal information setting " function etc., can be by the mesh after obtaining target biometric information Mark biological information is set as in GT grand touring APP " checking History Order " function, the re-authentication information of " payment " function.
In this specification embodiment, in order to meet the individual demand of user, can also at least two work(be selected by user Can, set target biometric information to the re-authentication information at least two functions that user chooses.
In this specification embodiment, before the selection that user carries out function, application program can also make prompt, prompt Which function user can select, with for reference, for example, prompt user selects include in application program to be related to user Property and personal secrets function.
In step S306, when receiving the access request that user triggers for objective function in application program, obtain The biological information of user, the objective function are any of above-mentioned at least two function.
In this specification embodiment, when receiving the access request that user triggers for objective function in application program, Reporting of user biological information can be prompted to carry out re-authentication, such as prompted by way of message notifying, be followed by Receive the biological information of reporting of user.
In this specification embodiment, in order to avoid frequently prompting user, the unfriendly of interaction is caused, when receiving user's needle To that when the access request of objective function triggering, can not make any prompt in application program, the biology for directly acquiring user is special Reference ceases, and in a typical application scenarios, by taking finger print information as an example, the terminal with full frame fingerprint identification function is set Standby, user clicks screen and triggers access request, which, can also be full frame by its while receiving access request Fingerprint identification function obtains the finger print information of the user so that its finger print information is obtained in the case where user has no perception, into And carry out re-authentication.
In this specification embodiment, when target biometric information is finger print information, if receiving user for application The access request that objective function triggers in program, then terminal device startup fingerprint identification device, obtains the finger print information of user.
When target biometric information is voiceprint, triggered for objective function in application program if receiving user Access request, then terminal device start microphone, obtain the sound of user, the sound of the user extracted from the sound got Line information.
When target biometric information is face information, triggered for objective function in application program if receiving user Access request, then terminal device start camera, obtain the facial image of user, from the facial image got extraction should The face information of user.
When target biometric information is iris information, triggered for objective function in application program if receiving user Access request, then terminal device start camera, obtain the eye image of user, from the eye image got extraction should The iris information of user.
In step S308, when the biological information of user and target biometric information matches, start target work( Energy.
In this specification embodiment, foundation of the target biometric information as re-authentication, if current accessed user Biological information and target biometric information matches, then illustrate that current accessed user has the power of access target function Limit, terminal device start the objective function, so that user accesses.
If the biological information of current accessed user is mismatched with target biometric information, illustrate the current accessed User does not have the permission of access target function, and terminal device does not start the objective function, at this point, this specification embodiment provides Application program access method, following steps can also be increased:
When the biological information of user and target biometric information mismatch, No starting objective function.
In addition, when the biological information of user and target biometric information mismatch, terminal device can also be It prompts current accessed user to input password and carries out certification again, if certification identifies again, No starting objective function.
It should be noted that in practical applications, above-mentioned steps S300's and S302 executes sequence, it can be according to Fig. 3 institutes That shows first carries out step S300, then executes step S302, i.e., first receives the authorization requests of user, then obtains target biometric letter Breath;Step S302 can also be first carried out, then executes step S300, i.e., first obtains target biometric information, then receive user's Authorization requests, this specification embodiment are not construed as limiting this.
This specification embodiment provides a kind of application program access method, can provide user's license grant clause, only when with When family is agreed to authorize, just authorize using biological information as the re-authentication information of multiple functions in application program, when this is answered When being in (online) state of login with program, if user accesses the function in the application program, the biology to the user is needed Characteristic information carries out re-authentication, and to verify whether the user has the permission for accessing the function, only re-authentication passes through, Allow the user to access the function, avoids the APP in the mobile terminal by malicious operation when mobile terminal is lost to reach Purpose.In addition, in this specification embodiment, same biological information can be set to the secondary of multiple functions simultaneously and recognized Information is demonstrate,proved, without being once arranged respectively for each function in multiple functions, operation is fairly simple.
It should be noted that this specification embodiment provide method, can be also used for installed in terminal device to The secondary login authentication of few two application programs, specifically, can be by the collected target organism of the operating system of terminal device Characteristic information is set as the authentication information of at least two application programs in the terminal device.In compared to the prior art, needle is needed It is authenticated the setting of information one by one to each application program, in this specification embodiment, multiple applications can be disposably set The authentication information of program, operation are fairly simple, time saving.
Embodiment three
It is the application program access method that this specification embodiment provides above, is based on same thinking, this specification is real It applies example and a kind of application program access mechanism is also provided, as shown in Figure 4.
The application program access mechanism includes:First acquisition module 401, setup module 402,403 and of the second acquisition module Starting module 404, wherein
First acquisition module 401, for obtaining target biometric information;
Setup module 402, for setting the target biometric information at least two functions in application program Re-authentication information;
Second acquisition module 403, for working as the access for receiving user and being triggered for objective function in the application program When request, the biological information of the user is obtained, the objective function is any of described at least two function;
Starting module 404 is used for when the biological information of the user and the target biometric information matches, Start the objective function.
This specification embodiment provides a kind of application program access method, can authorize using biological information as application The re-authentication information of multiple functions in program is answered when the application program is in (online) state of login if user accesses this With the function in program, then need to carry out re-authentication to the biological information of the user, to verify whether the user has The permission of the function is accessed, only re-authentication passes through, and the user is just allowed to access the function, to reach when mobile terminal is lost Avoid the APP in the mobile terminal by the purpose of malicious operation when mistake.It, can will be with all one's life in addition, in this specification embodiment Object characteristic information is set as the re-authentication information of multiple functions simultaneously, without distinguishing for each function in multiple functions Once it is arranged, operation is fairly simple.
In this specification embodiment, the application program access mechanism further includes:
Disabled module is used for when the biological information of the user and target biometric information mismatch, Objective function described in No starting.
In this specification embodiment, the application program access mechanism further includes:
Receiving module, the authorization requests for receiving user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program The re-authentication information of energy.
In this specification embodiment, the setup module 402, including:
Request reception unit selects request, the function selection request for receiving user for the function of application program At least two functions for selecting the application program;
Setting unit, for setting the target biometric information at least two functions that the user chooses Re-authentication information.
In this specification embodiment, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
Example IV
It is the application program access mechanism that this specification embodiment provides above, is based on same thinking, this specification is real It applies example and a kind of electronic equipment is also provided, as shown in Figure 5.
In hardware view, which includes processor, further includes optionally internal bus, network interface, memory. Wherein, memory may include memory, such as high-speed random access memory (Random-Access Memory, RAM), also may be used Can further include nonvolatile memory (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, the electricity Sub- equipment is also possible that the required hardware of other business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..For ease of indicating, only indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or a type of Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from then operation in corresponding computer program to memory is read in nonvolatile memory, in logical layer Application program access mechanism is formed on face.Processor executes the program that memory is stored, and specifically for executing following behaviour Make:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work( Energy.
This specification embodiment provides a kind of application program access method, can authorize using biological information as application The re-authentication information of multiple functions in program is answered when the application program is in (online) state of login if user accesses this With the function in program, then need to carry out re-authentication to the biological information of the user, to verify whether the user has The permission of the function is accessed, only re-authentication passes through, and the user is just allowed to access the function, to reach when mobile terminal is lost Avoid the APP in the mobile terminal by the purpose of malicious operation when mistake.It, can will be with all one's life in addition, in this specification embodiment Object characteristic information is set as the re-authentication information of multiple functions simultaneously, without distinguishing for each function in multiple functions Once it is arranged, operation is fairly simple.
Optionally, as one embodiment, the method further includes:
When the biological information of the user and the target biometric information mismatch, mesh described in No starting Mark function.
Optionally, it as one embodiment, sets in application program extremely the target biometric information to described Before the step of re-authentication information of few two functions, further include:
Receive the authorization requests of user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two work(in application program The re-authentication information of energy.
Optionally, described to set in application program at least the target biometric information to as one embodiment The re-authentication information of two functions, including:
The function selection request that user is directed to application program is received, the function selection request is described using journey for selecting At least two functions of sequence;
Set the target biometric information to the re-authentication information at least two functions that the user chooses.
Optionally, as one embodiment, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
The method that application program access mechanism disclosed in the above-mentioned embodiment illustrated in fig. 4 such as this specification executes can be applied to In processor, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal. During realization, each step of the above method can pass through the integrated logic circuit of the hardware in processor or software form Instruction is completed.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), it is application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in this specification embodiment disclosed Each method, step and logic diagram.General processor can be microprocessor or the processor can also be any conventional Processor etc..The step of method in conjunction with disclosed in this specification embodiment, can be embodied directly in hardware decoding processor execution Complete, or in decoding processor hardware and software module combine execute completion.Software module can be located at random storage Device, flash memory, read-only memory, this fields such as programmable read only memory or electrically erasable programmable memory, register at In ripe storage medium.The storage medium is located at memory, and processor reads the information in memory, is completed in conjunction with its hardware The step of stating method.
Certainly, other than software realization mode, other realization methods are not precluded in the electronic equipment of this specification, such as The mode etc. of logical device or software and hardware combining, that is to say, that the executive agent of following process flow is not limited to each Logic unit can also be hardware or logical device.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage One or more programs, the one or more program include instruction, and the instruction is when the portable electric for being included multiple application programs When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and it is following specifically for executing Method:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, obtain the user's Biological information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the target work( Energy.
In short, the foregoing is merely the preferred embodiment of this specification, it is not intended to limit the protection of this specification Range.For all spirit in this specification within principle, any modification, equivalent replacement, improvement and so on should be included in this Within the protection domain of specification.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Including so that process, method, commodity or equipment including a series of elements include not only those elements, but also wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that wanted including described There is also other identical elements in the process of element, method, commodity or equipment.
Each embodiment in this specification is described in a progressive manner, identical similar portion between each embodiment Point just to refer each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so description is fairly simple, related place is referring to embodiment of the method Part explanation.

Claims (12)

1. a kind of application program access method, the method includes:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, the biology of the user is obtained Characteristic information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the objective function.
2. according to the method described in claim 1, the method further includes:
When the biological information of the user and the target biometric information mismatch, target work(described in No starting Energy.
3. according to the method described in claim 1, setting in application program extremely the target biometric information to described Before the step of re-authentication information of few two functions, further include:
Receive the authorization requests of user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two functions in application program Re-authentication information.
4. according to the method described in claim 1, described set in application program at least the target biometric information to The re-authentication information of two functions, including:
Function selection request of the user for application program is received, the function selection request is for selecting the application program At least two functions;
Set the target biometric information to the re-authentication information at least two functions that the user chooses.
5. method according to any one of claims 1 to 4, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
6. a kind of application program access mechanism, described device include:
First acquisition module, for obtaining target biometric information;
Setup module, the re-authentication for setting the target biometric information at least two functions in application program Information;
Second acquisition module, for when receiving the access request that user triggers for objective function in the application program, The biological information of the user is obtained, the objective function is any of described at least two function;
Starting module, for when the biological information of the user is with the target biometric information matches, starting institute State objective function.
7. device according to claim 6, described device further include:
Disabled module, for when the biological information of the user is mismatched with the target biometric information, forbidding Start the objective function.
8. device according to claim 6, described device further include:
Receiving module, the authorization requests for receiving user's triggering;
The authorization requests, which are used to indicate, sets the target biometric information at least two functions in application program Re-authentication information.
9. device according to claim 6, the setup module, including:
Request reception unit selects request, the function selection request to be used for for receiving user for the function of application program Select at least two functions of the application program;
Setting unit, for setting the target biometric information to the secondary of at least two functions that the user chooses Authentication information.
10. according to claim 6 to 9 any one of them device, the biological information includes at least one of following:
Finger print information, voiceprint, face information and iris information.
11. a kind of electronic equipment, including:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, the biology of the user is obtained Characteristic information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the objective function.
12. a kind of computer storage media, the computer-readable recording medium storage one or more program, it is one or Multiple programs by the electronic equipment including multiple application programs when being executed so that the electronic equipment executes following operation:
Obtain target biometric information;
Set the target biometric information to the re-authentication information of at least two functions in application program;
When receiving the access request that user triggers for objective function in the application program, the biology of the user is obtained Characteristic information, the objective function are any of described at least two function;
When the biological information of the user and the target biometric information matches, start the objective function.
CN201810467177.0A 2018-05-16 2018-05-16 Application program access method and device Pending CN108647510A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810467177.0A CN108647510A (en) 2018-05-16 2018-05-16 Application program access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810467177.0A CN108647510A (en) 2018-05-16 2018-05-16 Application program access method and device

Publications (1)

Publication Number Publication Date
CN108647510A true CN108647510A (en) 2018-10-12

Family

ID=63756113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810467177.0A Pending CN108647510A (en) 2018-05-16 2018-05-16 Application program access method and device

Country Status (1)

Country Link
CN (1) CN108647510A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084020A (en) * 2019-05-11 2019-08-02 北京京投亿雅捷交通科技有限公司 A kind of recognition of face passenger information system and implementation method
WO2020103564A1 (en) * 2018-11-23 2020-05-28 阿里巴巴集团控股有限公司 Method, system and apparatus for enabling biological feature application function, and device
CN112073578A (en) * 2020-08-20 2020-12-11 上海连尚网络科技有限公司 Method and equipment for using or limiting application function in social application
WO2021134461A1 (en) * 2019-12-31 2021-07-08 江苏树实科技有限公司 Smart speaker, multi-voice assistant control method, and smart home system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9591481B1 (en) * 2012-03-15 2017-03-07 United Services Automobile Association (Usaa) Authentication and security features for a mobile application
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106778138A (en) * 2016-12-27 2017-05-31 东华互联宜家数据服务有限公司 The control method and device of software license limit

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9591481B1 (en) * 2012-03-15 2017-03-07 United Services Automobile Association (Usaa) Authentication and security features for a mobile application
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106778138A (en) * 2016-12-27 2017-05-31 东华互联宜家数据服务有限公司 The control method and device of software license limit

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020103564A1 (en) * 2018-11-23 2020-05-28 阿里巴巴集团控股有限公司 Method, system and apparatus for enabling biological feature application function, and device
TWI779230B (en) * 2018-11-23 2022-10-01 開曼群島商創新先進技術有限公司 Method, system, device and device for enabling biometric application function
CN110084020A (en) * 2019-05-11 2019-08-02 北京京投亿雅捷交通科技有限公司 A kind of recognition of face passenger information system and implementation method
WO2021134461A1 (en) * 2019-12-31 2021-07-08 江苏树实科技有限公司 Smart speaker, multi-voice assistant control method, and smart home system
CN112073578A (en) * 2020-08-20 2020-12-11 上海连尚网络科技有限公司 Method and equipment for using or limiting application function in social application
CN112073578B (en) * 2020-08-20 2022-07-12 上海连尚网络科技有限公司 Method and equipment for using or limiting application function in social application

Similar Documents

Publication Publication Date Title
US10541993B2 (en) Confidence-based authentication
EP3332372B1 (en) Apparatus and method for trusted execution environment based secure payment transactions
EP2933981B1 (en) Method and system of user authentication
US8510797B2 (en) Online user authentication
US8970348B1 (en) Using sequences of facial gestures to authenticate users
CN108647510A (en) Application program access method and device
US20130263240A1 (en) Method for authentication and verification of user identity
JP2006164237A (en) User authentication by combination of speaker reference and reverse turing test
US20130312073A1 (en) Methods and systems for authentication of multiple sign-in accounts
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
US20190213306A1 (en) System and method for identity authentication
US11769152B2 (en) Verifying user identities during transactions using identification tokens that include user face data
CN108960839B (en) Payment method and device
CN105701420B (en) A kind of management method and terminal of user data
US11822638B1 (en) Multi-channel authentication using smart cards
US11902275B2 (en) Context-based authentication of a user
US8984599B2 (en) Real time password generation apparatus and method
TW202040385A (en) System for using device identification to identify via telecommunication server and method thereof
CN105354459B (en) Information processing method and device and electronic equipment
AU2013205126A1 (en) Facial recognition streamlined login
US11301862B2 (en) Secure transfer of tokens between devices
WO2021244471A1 (en) Real-name authentication method and device
US20200201977A1 (en) Method for authenticating a first user and corresponding first device and system
Hossain et al. Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System
CN105590044A (en) Information authentication method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200923

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240221

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Applicant after: Advanced Nova Technology (Singapore) Holdings Ltd.

Country or region after: Singapore

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands

TA01 Transfer of patent application right