CN110837630B - Login method, image processing method and electronic device - Google Patents

Login method, image processing method and electronic device Download PDF

Info

Publication number
CN110837630B
CN110837630B CN201911097189.XA CN201911097189A CN110837630B CN 110837630 B CN110837630 B CN 110837630B CN 201911097189 A CN201911097189 A CN 201911097189A CN 110837630 B CN110837630 B CN 110837630B
Authority
CN
China
Prior art keywords
target application
login
login information
target image
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911097189.XA
Other languages
Chinese (zh)
Other versions
CN110837630A (en
Inventor
芮元乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201911097189.XA priority Critical patent/CN110837630B/en
Publication of CN110837630A publication Critical patent/CN110837630A/en
Application granted granted Critical
Publication of CN110837630B publication Critical patent/CN110837630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a login method, an image processing method and electronic equipment. The embodiment of the login method comprises the following steps: receiving a target image sent by second electronic equipment, wherein the target image comprises a login interface of a target application and carries encrypted login information; under the condition that a user is detected to check a target image, starting a target application, and decrypting login information to obtain decrypted login information; and logging in the target application according to the decrypted login information. The implementation mode ensures the safety of the account and improves the convenience of logging in the application.

Description

Login method, image processing method and electronic device
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a login method, an image processing method and electronic equipment.
Background
With the development of computer technology, the variety of Applications (APPs) suitable for electronic devices to run is increasing. When using these applications, a user is typically required to enter login information, such as an account password, to login to the application.
In the prior art, when a plurality of users share the same account, log in by using accounts of other users, or need to log in an application again when equipment is replaced, account information such as account numbers and passwords needs to be sent or shared to another equipment by one equipment. However, the login information is transmitted in a clear text form in this way, and is easily stolen, thereby reducing the security of the account. Meanwhile, when the opposite-end user obtains login information and logs in, the corresponding application needs to be searched first, and then the login information is manually input in a mode of copying the login information and the like, so that the login process of the application can be completed, and the operation process of logging in the application is not safe and convenient.
Disclosure of Invention
The embodiment of the invention provides a login method, an image processing method and electronic equipment, and aims to solve the technical problems that in the prior art, account security is reduced due to the fact that login information is transmitted in a plaintext form, and login application is low in convenience due to the fact that login information is manually input.
In a first aspect, an embodiment of the present invention provides a login method, applied to a first electronic device, including: receiving a target image sent by second electronic equipment, wherein the target image comprises a login interface of a target application and carries encrypted login information; under the condition that a user views a target image, starting a target application, and decrypting login information to obtain a decrypted login new; and logging in the target application according to the decrypted login information.
In a second aspect, an embodiment of the present invention provides an image processing method, applied to a second electronic device, including: in the process of logging in a target application by a user, acquiring a target image of a login interface containing the target application, and acquiring login information in the login interface; encrypting the login information to obtain encrypted login information; and sending the target image carrying the encrypted login information to the first electronic equipment.
In a third aspect, an embodiment of the present invention provides an electronic device, including: the receiving unit is configured to receive a target image sent by the second electronic device, the target image comprises a login interface of a target application, and the target image carries encrypted login information; the decryption unit is configured to start the target application under the condition that the user views the target image, and decrypt the login information to obtain decrypted login information; and a login unit configured to log in the target application according to the decrypted login information.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including: the device comprises an acquisition unit, a display unit and a display unit, wherein the acquisition unit is configured to acquire a target image containing a login interface of a target application and acquire login information in the login interface in the process of logging in the target application by a user; an encryption unit configured to encrypt the login information to obtain encrypted login information; and the sending unit is configured to send the target image carrying the encrypted login information to the first electronic equipment.
In a fifth aspect, an embodiment of the present invention provides an electronic device, which includes a processor, a memory, and a computer program stored on the memory and executable on the processor, and when executed by the processor, the computer program implements the steps of the method described in any one of the first aspect and the second aspect.
In a sixth aspect, the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the method as described in any one of the embodiments of the first or second aspect.
In the embodiment of the invention, the target application is started and decrypted under the condition that the user views the target image by receiving the target image which carries the encrypted login information and contains the login interface of the target application, so that the target application is logged in by utilizing the decrypted login information. Therefore, on one hand, when a plurality of users share the same account, use other accounts to log in or need to log in a certain application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured. On the other hand, the user can directly log in the target application when browsing the target image without manually starting the target application and inputting login information at a corresponding position, so that the convenience of login operation is improved.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a login method provided in an embodiment of the present invention;
FIG. 2 is a diagram illustrating a process for decrypting login information according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a process for logging into a target application according to an embodiment of the present invention;
FIG. 4 is a flow chart of an image processing method provided by an embodiment of the invention;
FIG. 5 is a schematic diagram illustrating a process of shooting a login interface of a target application according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device provided in an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of another electronic device provided in an embodiment of the invention;
fig. 8 is a hardware configuration diagram of an electronic device for implementing an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart of a login method according to an embodiment of the present invention is shown. The login method provided by the embodiment of the invention can be applied to the first electronic equipment. In practice, the first electronic device may be an electronic device such as a smart phone, a tablet computer, a laptop computer, or the like.
The process 100 of the login method provided by the embodiment of the invention comprises the following steps:
and step 101, receiving a target image sent by the second electronic equipment.
In this embodiment, the execution subject of the login method (the first electronic device described above) may receive the target image transmitted by the second electronic device. The target image can contain a login interface of the target application, and the target image carries encrypted login information.
Here, the target application may be any client application that can run on the electronic device. Such as video applications, meal ordering applications, shopping applications, instant messaging applications, and the like.
Here, the login interface of the target application may include a login information input area. The login information input area may be used for inputting login information. The encrypted login information may include an encrypted account and/or an encrypted password.
The encrypted registration information may be recorded in an Exif (Exchangeable image file format) information of the target image. In practice, the Exif information may record attribute information of an image (such as image resolution, image size, etc.) and photographing data (such as photographing time, exposure time, aperture value, etc.). The Exif information may be attached to JPEG, TIFF, RIFF, etc. files. Therefore, the encrypted login information is recorded in the Exif information of the target image, and the target image can be carried with the encrypted login information.
Here, the second electronic device may also be an electronic device such as a smartphone, a tablet, a laptop, etc. After receiving the target image, the execution body may store the target image in a local album, such as a password album.
In some optional implementations of the embodiment, the login information input area in the target image may be pre-set in advance. The preset processing may include, but is not limited to, a blurring process, a coloring process, an erasing process, and the like. The fuzzy processing can be executed by mosaic, blurring and the like, so that the login information in the fuzzy processing cannot be clearly presented. By presetting the login information in the target image, the leakage of account information can be avoided, and the account safety is further ensured.
And 102, starting the target application under the condition that the user is detected to view the target image, and decrypting the login information to obtain the decrypted login information.
In this embodiment, when it is detected that the user views the target image, the execution main body may start the target application, and decrypt the login information to obtain the decrypted login information. Here, the decryption algorithm corresponding to the encryption algorithm used when encrypting the login information may be used to decrypt the login information, such as RSA algorithm, DSA algorithm, and the like, and is not limited herein.
In one scenario, the target image may be stored in an album upon receipt. At this time, the user can trigger the starting of the target application and the decryption operation of the login information each time the user views the target image in the album.
In another scenario, the target image may be transmitted as a dialog message, by instant messaging, or the like. At this time, when the user triggers (e.g., clicks) the target image in the dialog, the start of the target application and the decryption operation of the login information may also be triggered.
In some optional implementation manners of this embodiment, the target image further carries target application start information for triggering the target application, such as a start instruction of the target application. The target application start information may be recorded in Exif information of the target image. In the case where the target application start information is detected, the execution subject may start the target application based on the target application start information.
In some optional implementation manners of this embodiment, in a case where a user views a target image, or in a case where the target image does not carry target application start information for triggering a target application, the execution subject may first identify a character in the target image. For example, a commonly used Character Recognition method such as an OCR (Optical Character Recognition) technique may be used to recognize characters in the target image. And starting the target application when the recognized character contains the keyword of the target application.
In practice, when recognizing characters by using an OCR technology, brightness detection may be performed on a target image first, and dark and bright patterns of a plurality of areas of the target image are detected, so as to determine the shape of the characters; thereafter, the character shape may be translated into a computer word using character recognition methods (e.g., Euclidean space alignment methods, dynamic program alignment methods, neural network-based character alignment methods, etc.).
In some optional implementation manners of this embodiment, before decryption, the execution subject may authenticate the user identity in a fingerprint authentication manner, so as to further ensure account security. Specifically, in the case where it is detected that the user views the target image, the execution subject described above may start the fingerprint authentication function. And when detecting that the fingerprint authentication passes, decrypting the login information. It should be noted that the method of authenticating the user before decryption is not limited to the fingerprint authentication method, and the user identity may also be authenticated by means of pattern password authentication, digital password authentication, voiceprint authentication, and the like. The embodiment of the present application does not limit the identity authentication method. The security of the account can be further ensured by authenticating the identity of the user before decryption.
As an example, fig. 2 is a schematic diagram of a process of decrypting the login information according to an embodiment of the present invention. As shown in fig. 2, the user views the target image by clicking on a thumbnail of the target image (e.g., "account Y" in fig. 2) in the password album. When the user clicks the target image, the fingerprint authentication function can be started, and a fingerprint input interface is popped up, and prompt information for prompting the user to input a fingerprint (for example, "please input a password" in fig. 2) can be presented in the fingerprint input interface. In the background of the fingerprint input interface, the encrypted character string can be presented, and the login information is prevented from being exposed before the user inputs the correct password. After the user inputs the correct fingerprint password, the login information can be decrypted.
And 103, logging in the target application according to the decrypted login information.
In this embodiment, the execution subject may log in the target application according to the decrypted login information. Here, after the target application is started, a login interface of the target application may be started. After a login interface of a target application is started, an account information input area in the login interface can be detected. Therefore, the decrypted login information can be input into the area, and the login of the target application is realized.
Specifically, the "account" character and the "password" character in the login interface may be first detected by OCR technology. Then, an input box within a preset range of the characters of the account number is used as an account number input area, and an input box within a preset range of the characters of the password is used as a password input area. Therefore, the decrypted account is input into the account input area, and the decrypted password is input into the password input area, so that the target application is logged in.
By way of example, FIG. 3 illustrates a schematic diagram of a process for logging into a target application, in accordance with an embodiment of the present invention. As shown in fig. 3, after the target application (i.e., "application Y") is started and the login interface of the target application is presented, the execution subject may automatically input or copy the decrypted account "123456" into the account input area. And inputting or copying the decrypted password into the password input area, wherein the input password is presented by the letter.
In some optional implementation manners of this embodiment, after the target application is started, the execution subject may match an interface of the target application with a login interface in the target image in real time. In practice, the interface of the target application and the login interface in the target image may be matched by calculating the similarity of pixels in a characteristic region (e.g., a preset region at the center). When the similarity is greater than a certain threshold, the two can be considered to be matched. In the case where the current interface of the target application matches the login interface in the target image, a login information input area in the current interface may be identified. Finally, the decrypted login information may be input to the login information input area.
In the method provided by the above embodiment of the present invention, the target image carrying the encrypted login information and including the login interface of the target application is received, and then the target application is started and the login information is decrypted under the condition that the user views the target image, so that the target application is logged in by using the decrypted login information. Therefore, on one hand, when a plurality of users share the same account, use other accounts to log in or need to log in a certain application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured. On the other hand, the user can directly log in the target application when browsing the target image without manually starting the target application and inputting login information at a corresponding position, so that the convenience of login operation is improved.
Further referring to fig. 4, which shows a flowchart of an image processing method provided by the embodiment of the present invention, the image processing method provided by the embodiment of the present invention may be applied to a second electronic device. In practice, the second electronic device may be an electronic device such as a smart phone, a tablet computer, a laptop computer, or the like.
The flow 400 of the image processing method provided by the embodiment of the invention comprises the following steps:
step 401, in the process of logging in the target application by the user, acquiring a target image including a login interface of the target application, and acquiring login information in the login interface.
In this embodiment, an executing body of the image processing method (such as the second electronic device described above) may acquire a target image including a login interface of a target application and acquire login information in the login interface in a process of logging in the target application by a user.
In some optional implementation manners of this embodiment, the target image may be obtained by screenshot. Specifically, in the process of logging in the target application by the user, the execution main body may receive login information input by the user, and record the login information. And simultaneously, in the process of logging in the target application by the user, screenshot is carried out on the login interface of the target application to obtain a target image containing the login interface of the target application.
In practice, when a user inputs login information such as an account number and a password of a target application, a floating window can be popped up to prompt the user whether to store the login information of the target application. If the user triggers the confirmation operation, the screenshot operation can be triggered.
In some optional implementations of the embodiment, the target image may be obtained by taking a photograph. In practice, the second electronic device may have a foldable display screen. One of the display screens may display a login interface for the target application. The camera installed in the other display screen can shoot the login interface, so that a target image is obtained. Then, the execution subject may recognize the registration information in the target image by an OCR technology. Specifically, brightness detection may be performed on the target image first, and dark and bright patterns of a plurality of areas of the target image are detected, so as to determine a character shape; thereafter, the character shape may be translated into a computer word using character recognition methods (e.g., Euclidean space alignment methods, dynamic program alignment methods, neural network-based character alignment methods, etc.).
By way of example, fig. 5 is a schematic diagram illustrating a process of shooting a login interface of a target application in the embodiment of the present invention. As shown in fig. 5, the second electronic device may have a foldable display screen. The login interface of the target application can be shot by adjusting the included angle between the two screens in the folding display screen. In practice, the shooting of the login interface can be continuously performed, and the last image is selected as the target image.
Step 402, encrypting the login information to obtain the encrypted login information.
In this embodiment, the execution body may encrypt the login information to obtain the encrypted login information. Here, an encryption option may be provided for user selection. The encryption options may include three options of encrypting the account, encrypting the password, and simultaneously encrypting the account and the password. The execution body can encrypt the corresponding information based on the encryption option triggered by the user.
It should be noted that various encryption algorithms can be used to encrypt the login information, such as an RSA encryption algorithm, a DSA encryption algorithm, and the like, which is not limited herein.
And step 403, sending the target image carrying the encrypted login information to the first electronic device.
In this embodiment, the execution subject may send the target image carrying the encrypted login information to the first electronic device. In practice, the encrypted login information may be recorded in the Exif information of the target image, so that the target image carries the encrypted login information.
In some optional implementation manners of this embodiment, before sending the target image, the execution main body may further obtain target application start information used for triggering the target application, such as a start instruction of the target application. Therefore, the target image carrying the encrypted login information and the encrypted target application starting information can be sent to the first electronic device. In practice, the target application start information may also be recorded in the Exif information of the target image, so that the target image carries the target application start information.
In some optional implementation manners of this embodiment, before sending the target image carrying the encrypted login information to the first electronic device, the execution main body may further perform preset processing on a login information input area in the target image. The preset processing may include, but is not limited to, a blurring process, a coloring process, an erasing process, and the like. The fuzzy processing can be executed by mosaic, blurring and the like, so that the login information in the fuzzy processing cannot be clearly presented. By presetting the login information in the target image, the leakage of account information can be avoided, and the account safety is further ensured.
In the method provided by the embodiment of the invention, the target image of the login interface containing the target application is acquired in the process of logging in the target application by the user, the login information in the login interface is acquired, and then the login information is encrypted, so that the target image carrying the encrypted login information is sent to the first electronic device. Therefore, when a plurality of users share the same account, use other accounts to log in or need to log in an application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured.
With further reference to fig. 6, as an implementation of the method shown in fig. 1, the present invention provides an embodiment of an electronic device, and the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 1.
As shown in fig. 6, the electronic device 600 according to the present embodiment includes: a receiving unit 601, configured to receive a target image sent by a second electronic device, where the target image includes a login interface of a target application and carries encrypted login information; a decryption unit 602, configured to, in a case that it is detected that the user views the target image, start the target application, and decrypt the login information to obtain decrypted login information; a login unit 603 configured to log in the target application according to the decrypted login information.
In some optional implementation manners of this embodiment, the target image further carries target application start information for triggering the target application; and, the decryption unit 602 is further configured to: and starting the target application under the condition that the target application starting information is detected.
In some optional implementations of this embodiment, the decryption unit 602 is further configured to: identifying characters in the target image; and starting the target application when the character contains the keyword of the target application.
In some optional implementations of this embodiment, the login unit 603 is further configured to: under the condition that the current interface of the target application is matched with the login interface in the target image, identifying a login information input area in the current interface; and inputting the decrypted login information into the login information input area.
The device provided by the above embodiment of the present invention receives the target image carrying the encrypted login information and including the login interface of the target application, then starts the target application and decrypts the login information under the condition that the user views the target image, so as to log in the target application by using the decrypted login information. Therefore, on one hand, when a plurality of users share the same account, use other accounts to log in or need to log in a certain application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured. On the other hand, the user can directly log in the target application when browsing the target image without manually starting the target application and inputting login information at a corresponding position, so that the convenience of login operation is improved.
With further reference to fig. 7, as an implementation of the method shown in fig. 4, the present invention provides an embodiment of an electronic device, and the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 4.
As shown in fig. 7, the electronic device 700 according to this embodiment includes: an obtaining unit 701 configured to obtain a target image including a login interface of a target application and obtain login information in the login interface in a process of logging in the target application by a user; an encryption unit 702 configured to encrypt the login information to obtain encrypted login information; a sending unit 703 configured to send the target image carrying the encrypted login information to the first electronic device.
In some optional implementations of this embodiment, the obtaining unit 701 is further configured to: and recording login information input by the user in the process of logging in the target application by the user, and carrying out screenshot on a login interface of the target application to obtain a target image.
In some optional implementations of this embodiment, the obtaining unit 701 is further configured to: shooting a login interface of the target application to obtain a target image in the process of logging in the target application by a user; and identifying the login information in the target image by an optical character identification technology.
In some optional implementations of this embodiment, the sending unit 703 is further configured to: acquiring target application starting information for triggering the target application; and sending the target image carrying the encrypted login information and the target application starting information to the first electronic equipment.
In some optional implementations of this embodiment, the apparatus further includes: and the preset processing unit is configured to perform preset processing on the login information input area in the target image.
The device provided by the embodiment of the invention acquires the target image of the login interface containing the target application in the process of logging in the target application by the user, acquires the login information in the login interface, and encrypts the login information, so that the target image carrying the encrypted login information is sent to the first electronic device. Therefore, when a plurality of users share the same account, use other accounts to log in or need to log in an application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured.
With further reference to fig. 8, a hardware structure of an electronic device for implementing various embodiments of the present invention is schematically illustrated.
The electronic device 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and a power supply 811. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 6 does not constitute a limitation of the electronic device, and that the electronic device may include more or fewer components than shown, or some components may be combined, or a different arrangement of components. In the embodiment of the present invention, the electronic device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal, a wearable device, a pedometer, and the like.
The processor 810 is configured to receive a target image sent by a second electronic device, where the target image includes a login interface of a target application, and the target image carries encrypted login information; under the condition that a user views the target image, starting the target application, and decrypting the login information to obtain decrypted login information; and logging in the target application according to the decrypted login information.
In the embodiment of the invention, the target application is started and decrypted under the condition that the user views the target image by receiving the target image which carries the encrypted login information and contains the login interface of the target application, so that the target application is logged in by utilizing the decrypted login information. Therefore, on one hand, when a plurality of users share the same account, use other accounts to log in or need to log in a certain application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured. On the other hand, the user can directly log in the target application when browsing the target image without manually starting the target application and inputting login information at a corresponding position, so that the convenience of login operation is improved.
In addition, the processor 810 may also be configured to, in a process that a user logs in the target application, obtain a target image including a login interface of the target application, and obtain login information in the login interface; encrypting the login information to obtain encrypted login information; and sending the target image carrying the encrypted login information to the first electronic equipment.
In the embodiment of the invention, the target image containing the login interface of the target application is obtained in the process of logging in the target application by the user, the login information in the login interface is obtained, and then the login information is encrypted, so that the target image carrying the encrypted login information is sent to the first electronic equipment. Therefore, when a plurality of users share the same account, use other accounts to log in or need to log in an application again when equipment is replaced, the login information is transmitted in a non-plaintext form, and the safety of the account is ensured.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 801 may be used for receiving and sending signals during a message sending and receiving process or a call process, and specifically, receives downlink data from a base station and then processes the received downlink data to the processor 810; in addition, the uplink data is transmitted to the base station. In general, radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. Further, the radio frequency unit 801 can also communicate with a network and other devices through a wireless communication system.
The electronic device provides wireless broadband internet access to the user via the network module 802, such as to assist the user in sending and receiving e-mails, browsing web pages, and accessing streaming media.
The audio output unit 803 may convert audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into an audio signal and output as sound. Also, the audio output unit 803 may also provide audio output related to a specific function performed by the electronic apparatus 800 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
The input unit 804 is used for receiving an audio or video signal. The input Unit 804 may include a Graphics Processing Unit (GPU) 8041 and a microphone 8042, and the Graphics processor 8041 processes image data of a still picture or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 806. The image frames processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or transmitted via the radio frequency unit 801 or the network module 802. The microphone 8042 can receive sound, and can process such sound into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 801 in case of a phone call mode.
The electronic device 800 also includes at least one sensor 805, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 8081 according to the brightness of ambient light and a proximity sensor that can turn off the display panel 8081 and/or the backlight when the electronic device 800 is moved to the ear. As one type of motion sensor, an accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of an electronic device (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), and vibration identification related functions (such as pedometer, tapping); the sensors 805 may also include fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc., which are not described in detail herein.
The display unit 806 is used to display information input by the user or information provided to the user. The display unit 806 may include a display panel 8081, and the display panel 8081 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 807 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the electronic apparatus. Specifically, the user input unit 807 includes a touch panel 8071 and other input devices 8072. The touch panel 8071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 8071 (e.g., operations by a user on or near the touch panel 8071 using a finger, a stylus, or any other suitable object or accessory). The touch panel 8071 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 810, receives a command from the processor 810, and executes the command. In addition, the touch panel 8071 can be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 8071, the user input unit 807 can include other input devices 8072. In particular, other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
Further, the touch panel 8071 can be overlaid on the display panel 8081, and when the touch panel 8071 detects a touch operation on or near the touch panel 8071, the touch operation can be transmitted to the processor 810 to determine the type of the touch event, and then the processor 810 can provide a corresponding visual output on the display panel 8081 according to the type of the touch event. Although the touch panel 8071 and the display panel 8081 are shown in fig. 6 as two separate components to implement the input and output functions of the electronic device, in some embodiments, the touch panel 8071 and the display panel 8081 may be integrated to implement the input and output functions of the electronic device, and the implementation is not limited herein.
The interface unit 808 is an interface for connecting an external device to the electronic apparatus 800. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 808 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the electronic device 800 or may be used to transmit data between the electronic device 800 and external devices.
The memory 809 may be used to store software programs as well as various data. The memory 809 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 809 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 810 is a control center of the electronic device, connects various parts of the whole electronic device by using various interfaces and lines, performs various functions of the electronic device and processes data by running or executing software programs and/or modules stored in the memory 809 and calling data stored in the memory 809, thereby monitoring the whole electronic device. Processor 810 may include one or more processing units; preferably, the processor 810 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 810.
The electronic device 800 may also include a power supply 811 (e.g., a battery) for powering the various components, and preferably, the power supply 811 may be logically coupled to the processor 810 via a power management system to manage charging, discharging, and power consumption management functions via the power management system.
In addition, the electronic device 800 includes some functional modules that are not shown, and are not described in detail herein.
Preferably, an embodiment of the present invention further provides an electronic device, which includes a processor 810, a memory 809, and a computer program stored in the memory 809 and capable of running on the processor 810, where the computer program, when executed by the processor 810, implements each process of the above login method or image processing method embodiment, and can achieve the same technical effect, and details are not repeated here to avoid repetition.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned login method or image processing method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A login method is applied to a first electronic device and comprises the following steps:
receiving a target image sent by second electronic equipment, wherein the target image comprises a login interface of a target application and carries encrypted login information;
under the condition that the user is detected to check the target image, starting the target application, and decrypting the login information to obtain decrypted login information;
logging in the target application according to the decrypted login information;
the target image also carries target application starting information used for triggering the target application; and
the starting the target application comprises:
and starting the target application under the condition that the target application starting information is detected.
2. The method of claim 1, wherein the launching the target application comprises:
identifying characters in the target image;
and starting the target application under the condition that the characters contain keywords of the target application.
3. The method according to claim 1, wherein said logging in the target application according to the decrypted login information comprises:
under the condition that the current interface of the target application is matched with the login interface in the target image, identifying a login information input area in the current interface;
and inputting the decrypted login information into the login information input area.
4. An image processing method applied to a second electronic device includes:
in the process of logging in a target application by a user, acquiring a target image of a login interface containing the target application, and acquiring login information in the login interface;
encrypting the login information to obtain encrypted login information;
sending the target image carrying the encrypted login information to first electronic equipment;
the sending the target image carrying the encrypted login information to the first electronic device includes:
acquiring target application starting information for triggering the target application;
and sending the target image carrying the encrypted login information and the target application starting information to the first electronic equipment.
5. The method according to claim 4, wherein the acquiring a target image of a login interface including a target application and acquiring login information in the login interface during the process of the user logging in the target application comprises:
and recording login information input by the user in the process of logging in the target application by the user, and carrying out screenshot on a login interface of the target application to obtain a target image.
6. The method according to claim 4, wherein the acquiring a target image of a login interface including a target application and acquiring login information in the login interface during the process of the user logging in the target application comprises:
shooting a login interface of the target application to obtain a target image in the process of logging in the target application by a user;
and identifying login information in the target image through an Optical Character Recognition (OCR) technology.
7. The method according to claim 4, wherein before sending the target image carrying the encrypted login information to the first electronic device, the method further comprises:
and carrying out preset processing on a login information input area in the target image.
8. An electronic device, comprising:
the receiving unit is configured to receive a target image sent by second electronic equipment, the target image comprises a login interface of a target application, and the target image carries encrypted login information;
the decryption unit is configured to start the target application and decrypt the login information to obtain decrypted login information under the condition that the user is detected to view the target image;
a login unit configured to log in the target application according to the decrypted login information;
the target image also carries target application starting information used for triggering the target application; and
the decryption unit is further configured to launch the target application in case the target application launch information is detected.
9. An electronic device, comprising:
the device comprises an acquisition unit, a display unit and a display unit, wherein the acquisition unit is configured to acquire a target image of a login interface containing a target application and acquire login information in the login interface in the process of logging in the target application by a user;
the encryption unit is configured to encrypt the login information to obtain encrypted login information;
a sending unit configured to send a target image carrying the encrypted login information to a first electronic device;
the sending unit is further configured to acquire target application starting information for triggering the target application; and sending the target image carrying the encrypted login information and the target application starting information to the first electronic equipment.
CN201911097189.XA 2019-11-11 2019-11-11 Login method, image processing method and electronic device Active CN110837630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911097189.XA CN110837630B (en) 2019-11-11 2019-11-11 Login method, image processing method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911097189.XA CN110837630B (en) 2019-11-11 2019-11-11 Login method, image processing method and electronic device

Publications (2)

Publication Number Publication Date
CN110837630A CN110837630A (en) 2020-02-25
CN110837630B true CN110837630B (en) 2022-02-08

Family

ID=69575098

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911097189.XA Active CN110837630B (en) 2019-11-11 2019-11-11 Login method, image processing method and electronic device

Country Status (1)

Country Link
CN (1) CN110837630B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113360038A (en) * 2021-05-31 2021-09-07 维沃移动通信(杭州)有限公司 Application function searching method and device and electronic equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102214116A (en) * 2010-04-01 2011-10-12 腾讯科技(深圳)有限公司 Method and equipment for realizing direct login in network application
CN104573416B (en) * 2013-10-25 2018-07-17 腾讯科技(深圳)有限公司 A kind of method and device for generating application installation package, executing application
CN104935558B (en) * 2014-03-21 2018-01-30 四三九九网络股份有限公司 A kind of network user fast registers and login method and system
CN106156598A (en) * 2016-06-30 2016-11-23 中国地质大学(武汉) A kind of Quick Response Code privacy logs in protection system and method
CN107451441A (en) * 2017-07-04 2017-12-08 广东欧珀移动通信有限公司 The accounts information acquisition methods and device of application program
CN108551521B (en) * 2018-03-16 2020-03-31 维沃移动通信有限公司 Login information prompting method and mobile terminal

Also Published As

Publication number Publication date
CN110837630A (en) 2020-02-25

Similar Documents

Publication Publication Date Title
CN107145795B (en) Screenshot method and device and computer equipment
EP3989089A1 (en) Face image transmission method and apparatus, numerical value transfer method and apparatus, and electronic device
CN108038393B (en) Application privacy protection method and mobile terminal
CN107784089B (en) Multimedia data storage method, processing method and mobile terminal
WO2015172515A1 (en) Iris recognition method and device for mobile terminal
CN109241775B (en) Privacy protection method and terminal
CN108052819B (en) Face recognition method, mobile terminal and computer readable storage medium
CN110457888B (en) Verification code input method and device, electronic equipment and storage medium
CN110188524B (en) Information encryption method, information decryption method and terminal
CN108923931B (en) Electronic certificate processing method and device and computer readable storage medium
CN110149628B (en) Information processing method and terminal equipment
CN110990849A (en) Encryption and decryption method for private data and terminal
CN108491713B (en) Safety reminding method and electronic equipment
CN111125770A (en) Privacy protection method and electronic equipment
CN107358083B (en) Information processing method, terminal and computer readable storage medium
CN107786739B (en) Information acquisition method and mobile terminal
CN110287719B (en) File encryption method and mobile terminal
CN107911563B (en) Image processing method and mobile terminal
CN108600492B (en) Screen unlocking method and terminal
CN108109188B (en) Image processing method and mobile terminal
CN110837630B (en) Login method, image processing method and electronic device
CN111159687B (en) Account information processing method, electronic equipment and server
CN110929238B (en) Information processing method and device
CN109446794B (en) Password input method and mobile terminal thereof
CN109547622B (en) Verification method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant