CN110866242B - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN110866242B
CN110866242B CN201911109006.1A CN201911109006A CN110866242B CN 110866242 B CN110866242 B CN 110866242B CN 201911109006 A CN201911109006 A CN 201911109006A CN 110866242 B CN110866242 B CN 110866242B
Authority
CN
China
Prior art keywords
application
identifier
authenticated
server
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911109006.1A
Other languages
Chinese (zh)
Other versions
CN110866242A (en
Inventor
戚明锋
何卓荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201911109006.1A priority Critical patent/CN110866242B/en
Publication of CN110866242A publication Critical patent/CN110866242A/en
Application granted granted Critical
Publication of CN110866242B publication Critical patent/CN110866242B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Stored Programmes (AREA)

Abstract

The application provides an information processing method and device, comprising the following steps: the server of the target application receives authentication information sent by the server of the application to be authenticated; judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment; and determining an authentication result of the application to be authenticated based on the judgment result. According to the method and the device, the application identifier which can be acquired by other applications on the terminal equipment can be sent to the terminal equipment under the condition that the unique identifier of the terminal equipment is not extracted, the application to be authenticated is authenticated through the application identifier, namely whether the application to be authenticated and the target application are installed on the same terminal equipment or not is judged, and operations such as advertisement tracking and the like are carried out on the basis of the authentication result, so that the privacy of a user is protected.

Description

Information processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information processing method and apparatus.
Background
At present, a terminal advertisement tracking mode is basically based on an API provided by a system, and mainly comprises an Android ID which can be uniquely positioned to a terminal device and a Google Advertising ID of an advertisement service officially released by Google. Whether the Android ID or the Google Advertising ID is used, even the IDs of various terminal devices in the past are obtained through the API, and a unique identifier capable of being located to the terminal device is obtained through the API, so that the specific terminal device can be tracked through the identifier.
However, since the unique identifier of the terminal device relates to the privacy information of the user, obtaining the unique identifier of the terminal device is not favorable for protecting the privacy of the user.
Disclosure of Invention
In view of this, the present application provides an information processing method and apparatus, which can send an application identifier, which can be acquired by other applications on a target application, to a terminal device of the target application without extracting a unique identifier of the terminal device, and accurately determine whether other applications are installed on the same terminal device where the target application is located through the application identifier, so as to perform accurate terminal advertisement tracking, thereby protecting privacy of a user.
In a first aspect, an embodiment of the present application provides an information processing method, including:
receiving authentication information sent by a server of an application to be authenticated;
judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment;
and determining an authentication result of the application to be authenticated based on the judgment result.
In a possible implementation manner, before receiving the authentication information sent by the server of the application to be authenticated, the method further includes:
receiving user login information sent by the target application;
and if the user login information passes the verification, sending the application identifier to the target application so that the target application stores the application identifier in the installed terminal equipment.
In one possible embodiment, the method further comprises:
and feeding back the authentication result to the server of the application to be authenticated, so that the server of the application to be authenticated can send preset information to the application to be authenticated according to the authentication result.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
In a second aspect, an embodiment of the present application further provides an information processing method, including:
sending user login information to a server of a target application;
receiving an application identifier sent by the server of the target application after the user login information is verified, wherein the application identifier is information generated by the server of the target application according to the identification information of the target application;
and storing the application identifier in the terminal equipment for installing the target application, and enabling the application identifier to be acquired by other applications installed on the terminal equipment.
In one possible embodiment, the other application obtains the application identifier by way of inter-process communication.
In one possible embodiment of the method according to the invention,
the storing the application identifier in the terminal device that installs the target application includes:
storing the application identifier in a private file storage area of the target application;
the method further comprises the following steps:
receiving an acquisition request for acquiring an application identifier sent by the other application; the acquisition request comprises an identity identifier of an application sending the acquisition request;
and if the identity identifier is a preset identity identifier, determining that the application is the application installed on the terminal equipment, and sending the application identifier to the application.
In a possible implementation, the storing the application identifier in the terminal device that installs the target application includes:
and storing the application identifier in a public file storage area of the terminal equipment.
In a third aspect, an embodiment of the present application further provides an information processing method, including:
receiving an application identifier acquired by an application to be authenticated from terminal equipment installed in the application to be authenticated, wherein the application identifier is information generated by a server of a target application according to identification information of the target application, is stored in the terminal equipment installed with the target application, and can be acquired by other applications installed on the terminal equipment;
and generating authentication information containing the application identifier based on the acquired application identifier, sending the generated authentication information to the server of the target application so as to enable the server of the target application to judge whether the authentication information contains the application identifier, and determining an authentication result of the application to be authenticated based on the judgment result.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
In one possible embodiment, the method further comprises:
and receiving an authentication result fed back by the server of the target application, and sending preset information to the application to be authenticated based on the authentication result.
In a possible implementation manner, before the receiving the application identifier obtained by the application to be authenticated from the terminal device installed in the application to be authenticated, the method further includes:
receiving user login information sent by an application to be authenticated;
and if the user login information passes the verification, receiving the application identifier acquired by the application to be authenticated from the installed terminal equipment.
In a fourth aspect, an embodiment of the present application further provides an information processing method, including:
acquiring an application identifier from terminal equipment for installing an application to be authenticated, wherein the application identifier is information generated according to identification information of a target application, is stored in the terminal equipment for installing the target application and can be acquired by other applications installed on the terminal equipment;
sending the application identifier to the server of the application to be authenticated, so that the server of the application to be authenticated generates authentication information containing the application identifier based on the obtained application identifier, and sending the generated authentication information to the server of the target application, so that the server of the target application judges whether the authentication information contains the application identifier.
In a possible implementation manner, the obtaining an application identifier from a terminal device that installs an application to be authenticated includes:
sending an acquisition request for acquiring an application identifier to a target application; the obtaining request comprises an identity identifier of an application to be authenticated which sends the obtaining request, so that the target application is determined to be the application installed on the terminal equipment which installs the target application based on whether the identity identifier is a preset identity identifier or not, and the application identifier is sent to the application to be authenticated;
and receiving the application identifier sent by the target application.
In one possible embodiment, the application identifier is obtained by means of inter-process communication.
In a fifth aspect, an embodiment of the present application further provides an information processing apparatus, including:
the first receiving module is used for receiving authentication information sent by a server of an application to be authenticated;
the first judging module is used for judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment;
and the determining module is used for determining the authentication result of the application to be authenticated based on the judgment result.
In a possible implementation, the apparatus further includes a first sending module, configured to:
receiving user login information sent by the target application;
and if the user login information passes the verification, sending the application identifier to the target application so that the target application stores the application identifier in the installed terminal equipment.
In one possible implementation, the identification information includes user account information.
In a possible implementation, the apparatus further includes a feedback module configured to:
and feeding back the authentication result to the server of the application to be authenticated, so that the server of the application to be authenticated can send preset information to the application to be authenticated according to the authentication result.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
In a sixth aspect, an embodiment of the present application further provides an information processing apparatus, including:
the second sending module is used for sending user login information to a server of the target application;
a second receiving module, configured to receive an application identifier sent by the server of the target application after the user login information is verified, where the application identifier is information generated by the server of the target application according to identification information of the target application;
and the storage module is used for storing the application identifier in the terminal equipment for installing the target application and enabling the application identifier to be acquired by other applications installed on the terminal equipment.
In one possible embodiment, the other application obtains the application identifier by way of inter-process communication.
In a possible embodiment, the storage module is specifically configured to:
storing the application identifier in a private file storage area of the target application;
the apparatus further comprises an authentication module to:
receiving an acquisition request for acquiring an application identifier sent by the other application; the acquisition request comprises an identity identifier of an application sending the acquisition request;
and if the identity identifier is a preset identity identifier, determining that the application is the application installed on the terminal equipment, and sending the application identifier to the application.
In a possible embodiment, the storage module is specifically configured to:
and storing the application identifier in a public file storage area of the terminal equipment.
In a seventh aspect, an embodiment of the present application further provides an information processing apparatus, including:
a third receiving module, configured to receive an application identifier obtained by an application to be authenticated from a terminal device in which the application is installed, where the application identifier is information generated by a server of a target application according to identification information of the target application, is stored in the terminal device in which the target application is installed, and can be obtained by another application installed on the terminal device;
and the generating module is used for generating authentication information containing the application identifier based on the acquired application identifier, sending the generated authentication information to the server of the target application so as to enable the server of the target application to judge whether the authentication information contains the application identifier or not, and determining the authentication result of the application to be authenticated based on the judgment result.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
In a possible implementation manner, the apparatus further includes a fourth receiving module, where the fourth receiving module is specifically configured to:
and receiving an authentication result fed back by the server of the target application, and sending preset information to the application to be authenticated based on the authentication result.
In a possible implementation, the apparatus further includes a processing module configured to:
receiving user login information sent by an application to be authenticated;
and if the user login information passes the verification, receiving the application identifier acquired by the application to be authenticated from the installed terminal equipment.
In an eighth aspect, an embodiment of the present application further provides an information processing apparatus, including:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring an application identifier from terminal equipment for installing an application to be authenticated, the application identifier is information generated according to identification information of a target application, is stored in the terminal equipment for installing the target application and can be acquired by other applications installed on the terminal equipment;
a fifth receiving module, configured to send the application identifier to the server of the application to be authenticated, so that the server of the application to be authenticated generates authentication information including the application identifier based on the obtained application identifier, and sends the generated authentication information to the server of the target application, so that the server of the target application determines whether the authentication information includes the application identifier.
In a possible implementation manner, the obtaining module is specifically configured to:
sending an acquisition request for acquiring an application identifier to a target application; the obtaining request comprises an identity identifier of an application to be authenticated which sends the obtaining request, so that the target application is determined to be the application installed on the terminal equipment which installs the target application based on whether the identity identifier is a preset identity identifier or not, and the application identifier is sent to the application to be authenticated;
and receiving the application identifier sent by the target application.
In one possible embodiment, the application identifier is obtained by means of inter-process communication.
In a ninth aspect, an embodiment of the present application further provides an electronic device, including: the system comprises a processor, a storage medium and a bus, wherein the storage medium stores machine-readable instructions executable by the processor, when the electronic device runs, the processor is communicated with the storage medium through the bus, and the processor executes the machine-readable instructions to execute the steps of the information processing method in any one of the possible implementation modes.
In a tenth aspect, the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program performs the steps of the information processing method in any one of the above possible implementation manners.
According to the information processing method and device provided by the embodiment of the application, the server of the target application firstly receives authentication information sent by the server of the application to be authenticated; judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment; and finally, determining an authentication result of the application to be authenticated based on the judgment result. Compared with the prior art, the method and the device have the advantages that the application identifier which can be acquired by other applications on the terminal equipment is sent to the terminal equipment where the target application is located under the condition that the unique identifier of the terminal equipment is not extracted, whether the other applications are installed on the same terminal equipment where the target application is located or not is accurately judged through the application identifier, accordingly, based on the judgment result, operations such as advertisement effect tracking, advertisement settlement or information popularization are carried out, and the privacy of a user is protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating an information processing method provided in an embodiment of the present application;
FIG. 2 is a flow chart of another information processing method provided by the embodiment of the application;
FIG. 3 is a flow chart of another information processing method provided by the embodiment of the application;
FIG. 4 is a flow chart of another information processing method provided by the embodiment of the application;
FIG. 5 is a flow chart illustrating another information processing method provided by an embodiment of the present application;
fig. 6 is a schematic structural diagram illustrating an information processing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram illustrating another information processing apparatus provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram illustrating another information processing apparatus provided in an embodiment of the present application;
fig. 9 is a schematic structural diagram illustrating another information processing apparatus provided in an embodiment of the present application;
fig. 10 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it should be understood that the drawings in the present application are for illustrative and descriptive purposes only and are not used to limit the scope of protection of the present application. Additionally, it should be understood that the schematic drawings are not necessarily drawn to scale. The flowcharts used in this application illustrate operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be performed out of order, and steps without logical context may be performed in reverse order or simultaneously. One skilled in the art, under the guidance of this application, may add one or more other operations to, or remove one or more operations from, the flowchart.
In addition, the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
In order to enable those skilled in the art to use the present disclosure, the following embodiments are given in conjunction with the specific application scenario "advertisement tracking for terminal devices". It will be apparent to those skilled in the art that the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the application. Although the present application is described primarily in the context of "advertisement tracking for terminal devices," it should be understood that this is merely one exemplary embodiment.
It should be noted that in the embodiments of the present application, the term "comprising" is used to indicate the presence of the features stated hereinafter, but does not exclude the addition of further features.
Research shows that, in the prior art, for a terminal device of an Android system, an API (Application Programming Interface) provided by the system is generally used to obtain a unique identifier of the device terminal for advertisement tracking, such as an Android ID (Android identity) or a Google Advertising ID (Google Advertising identity), however, since the unique identifier of the terminal device is privacy information of a user, obtaining the unique identifier of the terminal device is not beneficial to protecting the privacy of the user.
In view of this, embodiments of the present application provide an information processing method and apparatus, where an application identifier that can be acquired by other applications on a terminal device of a target application is sent to the terminal device of the target application, and whether the other applications are installed on the same terminal device where the target application is located is accurately determined through the application identifier, so as to perform accurate terminal advertisement tracking, and protect privacy of a user.
Referring to fig. 1, fig. 1 is a flowchart illustrating an information processing method according to an embodiment of the present disclosure, where the method may be executed by a server of a target application. As shown in fig. 1, the information processing method includes:
s101, receiving authentication information sent by a server of an application to be authenticated.
The server of the application to be authenticated can generate authentication information containing the application identifier based on the application identifier acquired by the application to be authenticated, and send the authentication information to the server of the target application.
In this step, the application to be authenticated may obtain the application identifier from a preset storage area in the terminal device in which the application is installed, and specifically, the preset area may be a private file storage area of another application or a public file storage area of the terminal device.
The application identifier and the target application correspond to each other, the target application can send a request to a server of the target application, the server of the target application sends a unique application identifier to the target application after receiving the request, the target application can store the unique application identifier in an application folder of the target application or a system public folder of the terminal device, the application identifier can be acquired by an application installed on the terminal device to which the target application belongs, that is, if the application identifier acquired by the application to be authenticated is a correct application identifier, it can be determined that the application to be authenticated is consistent with the terminal device to which the target application belongs, that is, the application to be authenticated is installed on the terminal device to which the target application belongs.
S102, judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated.
The application identifier is information generated according to the identification information of the target application, is stored in the terminal device where the target application is installed, and can be acquired by other applications installed on the terminal device.
In this step, the server of the target application may generate an application identifier according to the identification information of the target application, and send the application identifier to the target application, and the target application may store the application identifier in the terminal device where the target application is installed, and may be acquired by other applications in the terminal device.
Specifically, the server of the target application may determine whether the application identifier included in the authentication information is an application identifier corresponding to the target application, and if not, that is, the authentication information does not have an application identifier corresponding to the target application, it may be determined that the target application and the application to be identified are not on the same device terminal; if the application identifier is consistent with the application identifier corresponding to the target application, and the authentication message includes the application identifier corresponding to the target application, since the application identifier can be acquired by other applications on the terminal device on which the target application is installed, it can be considered that the application to be authenticated and the target application are installed on the same terminal device.
S103, determining an authentication result of the application to be authenticated based on the judgment result.
In this step, according to the result of the judgment, it can be determined whether the application to be authenticated and the target application are installed on the same terminal device, that is, the authentication result of the application to be authenticated, specifically, if the application to be authenticated and the target application are installed on the same terminal device, it can be determined that the authentication of the application to be authenticated is successful, so that the advertisement tracking, the information promotion and the like can be performed on the terminal device without acquiring the unique identifier of the terminal device, and the privacy of the user is protected.
In a possible implementation manner, before receiving the authentication information sent by the server of the application to be authenticated, the method further includes:
receiving user login information sent by the target application;
and if the user login information passes the verification, sending the application identifier to the target application so that the target application stores the application identifier in the installed terminal equipment.
In this step, the application identifier may be sent to the target application when the target application logs in the server, so that the security of the process of sending the application identifier may be improved.
In one possible implementation, the identification information includes user account information.
The identification information can carry user account information of the target application, the server of the target application can generate an application identifier according to the user account information of the target application, the application identifier can embody the corresponding target application, and whether the target application and the application to be authenticated are installed on the same terminal device can be judged through the application identifier.
Specifically, the application identifier generated according to the identification information may carry encrypted user account information or a character string corresponding to the user account information, so that the generated application identifier does not reveal privacy of the user account of the user, the unique identifier of the terminal device, and the like. The character string may be a character string corresponding to the user account information, which is randomly set.
In one possible embodiment, the method further comprises:
and feeding back the authentication result to the server of the application to be authenticated, so that the server of the application to be authenticated can send preset information to the application to be authenticated according to the authentication result.
In this step, after receiving the authentication result, the server of the application to be authenticated may determine the preset information to be sent to the application to be authenticated according to the authentication result, where the preset information may be information such as a virtual article, a character, a voice, and a video, and specifically, may send the preset information to the application to be authenticated when the authentication result is that the target application and the application to be authenticated are installed on the same terminal device.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
Specifically, the application to be authenticated may call a service component of the target application by using an IPC (cross-process communication) provided by the android system, and obtain the application identifier.
Referring to fig. 2, fig. 2 is a block diagram illustrating another information processing method according to an embodiment of the present disclosure, where the method may be executed by a target application. As shown in fig. 2, the information processing method includes:
s201, user login information is sent to a server of the target application.
S202, receiving an application identifier sent by the server of the target application after the user login information is verified.
The application identifier is information generated by the server of the target application according to the identification information of the target application.
In the step, the target application can send user login information to a server of the target application when logging in, and after successful logging in, the server of the target application can generate an application identifier according to identification information carried in the user login information and send the application identifier to the target application.
S203, storing the application identifier in the terminal equipment for installing the target application, and enabling the application identifier to be acquired by other applications installed on the terminal equipment.
In this step, after receiving the application identifier, the target application may permanently store the application identifier in the terminal device where the target application is installed, where the storage location may be a private file directory of the target application, and at this time, other applications on the terminal device do not have a right to read and write the application identifier and need to be acquired through an Application Programming Interface (API) of a specific component provided by the terminal system. In particular, the specific component may be a Content Provider in the android system. The particular component may provide a service that queries for a locally pre-saved application identifier and returns it to the visitor.
Further, a separate process may be set up by the content provider and the rights to its external calls opened, the process being specifically responsible for the acquisition of the application identifier. In this way, the speed of acquisition can be increased without starting other logic in the main program of the target application.
In one possible embodiment, the other application obtains the application identifier by way of inter-process communication.
In one possible embodiment, storing the application identifier in a terminal device that installs the target application includes:
storing the application identifier in a private file storage area of the target application;
the information processing method further includes:
receiving an acquisition request for acquiring an application identifier sent by the other application; the acquisition request comprises an identity identifier of an application sending the acquisition request;
and if the identity identifier is a preset identity identifier, determining that the application is the application installed on the terminal equipment, and sending the application identifier to the application.
In this step, other applications cannot directly acquire the application identifier, the target application may store the identity of the application installed on the terminal device to which the target application belongs, after receiving the acquisition request, the identity identifier carried in the acquisition request may be compared with the identity identifier stored in the target application, and if the identity identifier carried in the acquisition request exists in the identity identifier stored in the target application, the application identifier may be sent to the application.
In a possible implementation manner, the storing the application identifier in the terminal device that installs the target application includes:
and storing the application identifier in a public file storage area of the terminal equipment.
In this step, the location where the application identifier is stored is a public file storage area of the terminal device, and the application identifier may be obtained by all applications in the terminal device to which the application identifier belongs, without identity authentication or external interfaces.
Referring to fig. 3, fig. 3 is a block diagram illustrating another information processing method according to an embodiment of the present disclosure, where the method may be executed by a server of an application to be authenticated. As shown in fig. 3, the information processing method includes:
s301, receiving an application identifier acquired by the application to be authenticated from the terminal equipment installed in the application to be authenticated.
The application identifier is information generated by the server of the target application according to the identification information of the target application, is stored in the terminal device for installing the target application, and can be acquired by other applications installed on the terminal device.
In this step, the application identifier is obtained from the terminal device in which the application to be authenticated is installed, and when the target application and the application to be authenticated are installed in the same terminal device, the application identifier is also necessarily information generated by the server of the target application according to the identification information of the target application.
S302, based on the obtained application identifier, generating authentication information containing the application identifier, and sending the generated authentication information to the server of the target application, so that the server of the target application judges whether the authentication information contains the application identifier, and based on the judgment result, determines the authentication result of the application to be authenticated.
In this step, the authentication information generated by the server of the application to be identified may embody the acquired application identifier. The server of the target application can judge whether the received application identifier is consistent with the application identifier sent to the target application, and after the received application identifier is consistent with the application identifier sent to the target application, the server of the target application can determine that the target application and the application to be identified belong to the same equipment terminal, and sends an authentication result to the server of the application to be identified.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
In one possible embodiment, the method further comprises:
and receiving an authentication result fed back by the server of the target application, and sending preset information to the application to be authenticated based on the authentication result.
In a possible implementation manner, before receiving an application identifier obtained by an application to be authenticated from a terminal device in which the application is installed, the information processing method further includes:
receiving user login information sent by an application to be authenticated;
and if the user login information passes the verification, receiving the application identifier acquired by the application to be authenticated from the installed terminal equipment.
Referring to fig. 4, fig. 4 is a block diagram illustrating another information processing method according to an embodiment of the present disclosure, where the method may be executed by an application to be authenticated. As shown in fig. 4, the information processing method includes:
s401, obtaining an application identifier from the terminal equipment installed with the application to be authenticated.
The application identifier is information generated according to the identification information of the target application, is stored in the terminal device where the target application is installed, and can be acquired by other applications installed on the terminal device.
S402, sending the application identifier to the server of the application to be authenticated, so that the server of the application to be authenticated generates authentication information containing the application identifier based on the obtained application identifier, and sending the generated authentication information to the server of the target application, so that the server of the target application judges whether the authentication information contains the application identifier.
In a possible implementation manner, the obtaining an application identifier from a terminal device that installs an application to be authenticated includes:
sending an acquisition request for acquiring an application identifier to a target application; the obtaining request comprises an identity identifier of an application to be authenticated which sends the obtaining request, so that the target application is determined to be the application installed on the terminal equipment which installs the target application based on whether the identity identifier is a preset identity identifier or not, and the application identifier is sent to the application to be authenticated;
and receiving the application identifier sent by the target application.
In a possible implementation manner, the information processing method obtains the application identifier through an inter-process communication mode.
Referring to fig. 5, fig. 5 is a flowchart of another information processing method according to an embodiment of the present disclosure. As shown in fig. 5, the information processing method includes:
step 1, after receiving user login information sent by the application A, the server S1 performs identity authentication on the application A, generates an application identifier after the user login information passes the authentication, stores the application identifier and sends the application identifier to the application A.
Step 2, after receiving the application identifier, the application A stores the application identifier in the file directory Data and generates an application programming interface for providing the application identifier.
And step 3, the application B acquires the application identifier from the file directory Data through the application programming interface generated by the application A and sends the application identifier to the server S2.
Step 4, the server S2 receives the application identifier sent by the application B, generates authentication information, and sends the authentication information to the server S1.
And step 5, after receiving the authentication information, the server S1 determines whether the application B receives a correct application identifier, and if the application B receives a correct application identifier, determines preset information to be sent according to the browsing records of the application a and the application B, and sends the preset information to the server S2 or directly to the application a.
The server S1 corresponds to the server of the target application, the server S2 corresponds to the server of the application to be authenticated, the application a corresponds to the target application, the application B corresponds to the application to be authenticated, and the file directory Data corresponds to the predetermined storage area.
According to the information processing method provided by the embodiment of the application, a server of a target application firstly receives authentication information sent by a server of an application to be authenticated; judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment; and finally, determining an authentication result of the application to be authenticated based on the judgment result. Compared with the prior art, the method and the device have the advantages that the application identifier which can be acquired by other applications on the terminal equipment is sent to the terminal equipment of the target application under the condition that the unique identifier of the terminal equipment is not extracted, whether the other applications are installed on the same terminal equipment where the target application is located or not is accurately judged through the application identifier, accordingly, based on the judgment result, the advertisement effect tracking or the advertisement settlement is carried out, and the like, and the privacy of a user is protected.
Referring to fig. 6, fig. 6 is a diagram illustrating an information processing apparatus according to an embodiment of the present disclosure. As shown in fig. 6, the information processing apparatus 600 includes:
a first receiving module 610, configured to receive authentication information sent by a server of an application to be authenticated;
a first determining module 620, configured to determine whether the authentication information includes an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, where the application identifier is information generated according to identification information of a target application, and is stored in a terminal device in which the target application is installed and can be acquired by another application installed on the terminal device;
a determining module 630, configured to determine, based on a result of the determination, an authentication result of the application to be authenticated.
In a possible implementation manner, the information processing apparatus 600 further includes a first sending module 640, where the first sending module 640 is configured to:
receiving user login information sent by the target application;
and if the user login information passes the verification, sending the application identifier to the target application so that the target application stores the application identifier in the installed terminal equipment.
In one possible implementation, the identification information includes user account information.
In a possible implementation, the information processing apparatus 600 further includes a feedback module 650, where the feedback module 650 is configured to:
and feeding back the authentication result to the server of the application to be authenticated, so that the server of the application to be authenticated can send preset information to the application to be authenticated according to the authentication result.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
Referring to fig. 7, fig. 7 is a diagram illustrating another information processing apparatus 700 according to an embodiment of the present application, including:
a second sending module 710, configured to send user login information to a server of a target application;
a second receiving module 720, configured to receive an application identifier sent by the server of the target application after the user login information is verified, where the application identifier is information generated by the server of the target application according to the identification information of the target application;
the storage module 730 is configured to store the application identifier in the terminal device that installs the target application, and enable the application identifier to be acquired by another application installed on the terminal device.
In one possible embodiment, the other application obtains the application identifier by way of inter-process communication.
In a possible implementation, the storage module 730 is specifically configured to:
storing the application identifier in a private file storage area of the target application;
the apparatus further comprises an authentication module 740, the authentication module 740 configured to:
receiving an acquisition request for acquiring an application identifier sent by the other application; the acquisition request comprises an identity identifier of an application sending the acquisition request;
and if the identity identifier is a preset identity identifier, determining that the application is the application installed on the terminal equipment, and sending the application identifier to the application.
In a possible implementation, the storage module 730 is specifically configured to:
and storing the application identifier in a public file storage area of the terminal equipment.
Referring to fig. 8, fig. 8 is a schematic diagram illustrating another information processing apparatus according to an embodiment of the present disclosure. As shown in fig. 8, the information processing apparatus 800 includes:
a third receiving module 810, configured to receive an application identifier obtained by an application to be authenticated from a terminal device in which the application is installed, where the application identifier is information generated by a server of a target application according to identification information of the target application, and is stored in the terminal device in which the target application is installed and can be obtained by another application installed on the terminal device;
a generating module 820, configured to generate authentication information including the application identifier based on the obtained application identifier, and send the generated authentication information to the server of the target application, so that the server of the target application determines whether the authentication information includes the application identifier, and determines an authentication result of the application to be authenticated based on a result of the determination.
In a possible implementation manner, the application identifier is obtained by the way of inter-process communication of the application to be authenticated.
In a possible implementation manner, the information processing apparatus 800 further includes a fourth receiving module 830, where the fourth receiving module 830 is specifically configured to:
and receiving an authentication result fed back by the server of the target application, and sending preset information to the application to be authenticated based on the authentication result.
In a possible implementation, the information processing apparatus 800 further includes a processing module 840, where the processing module 840 is configured to:
receiving user login information sent by an application to be authenticated;
and if the user login information passes the verification, receiving the application identifier acquired by the application to be authenticated from the installed terminal equipment.
Referring to fig. 9, fig. 9 is a schematic diagram illustrating another information processing apparatus according to an embodiment of the present disclosure. As shown in fig. 9, the information processing apparatus 900 includes:
an obtaining module 910, configured to obtain an application identifier from a terminal device that installs an application to be authenticated, where the application identifier is information generated according to identification information of a target application, is stored in the terminal device that installs the target application, and can be obtained by another application installed on the terminal device;
a fifth receiving module 920, configured to send the application identifier to the server of the application to be authenticated, so that the server of the application to be authenticated generates authentication information including the application identifier based on the obtained application identifier, and sends the generated authentication information to the server of the target application, so that the server of the target application determines whether the authentication information includes the application identifier.
In a possible implementation manner, the obtaining module 910 is specifically configured to:
sending an acquisition request for acquiring an application identifier to a target application; the obtaining request comprises an identity identifier of an application to be authenticated which sends the obtaining request, so that the target application is determined to be the application installed on the terminal equipment which installs the target application based on whether the identity identifier is a preset identity identifier or not, and the application identifier is sent to the application to be authenticated;
and receiving the application identifier sent by the target application.
In a possible implementation, the obtaining module 910 obtains the application identifier through inter-process communication.
The information processing device provided by the embodiment of the application receives authentication information sent by a server of an application to be authenticated; judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment; and finally, determining an authentication result of the application to be authenticated based on the judgment result. Compared with the prior art, the method and the device have the advantages that the application identifier which can be acquired by other applications on the terminal equipment is sent to the terminal equipment of the target application under the condition that the unique identifier of the terminal equipment is not extracted, whether the other applications are installed on the same terminal equipment where the target application is located or not is accurately judged through the application identifier, accordingly, based on the judgment result, the advertisement effect tracking or the advertisement settlement is carried out, and the privacy of a user is protected.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 10, the electronic device 10 includes a processor 11, a memory 12, and a bus 13.
The memory 12 stores machine-readable instructions executable by the processor 11, when the electronic device 10 runs, the processor 11 communicates with the memory 12 through the bus 13, and when the machine-readable instructions are executed by the processor 11, the steps in the information processing method according to any of the above embodiments may be executed.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the information processing method according to any of the above embodiments may be executed.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (22)

1. An information processing method characterized by comprising:
receiving authentication information sent by a server of an application to be authenticated;
judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment;
and determining an authentication result of the application to be authenticated based on the judgment result.
2. The information processing method according to claim 1, wherein before receiving the authentication information sent by the server of the application to be authenticated, the method further comprises:
receiving user login information sent by the target application;
and if the user login information passes the verification, sending the application identifier to the target application so that the target application stores the application identifier in the installed terminal equipment.
3. The information processing method according to claim 1, wherein the identification information includes user account information.
4. The information processing method according to claim 1, further comprising:
and feeding back the authentication result to the server of the application to be authenticated, so that the server of the application to be authenticated can send preset information to the application to be authenticated according to the authentication result.
5. The information processing method according to claim 1, wherein the application identifier is obtained by means of inter-process communication of the application to be authenticated.
6. An information processing method characterized by comprising:
sending user login information to a server of a target application;
receiving an application identifier sent by the server of the target application after the user login information is verified, wherein the application identifier is information generated by the server of the target application according to the identification information of the target application;
and storing the application identifier in the terminal equipment for installing the target application, and enabling the application identifier to be acquired by other applications installed on the terminal equipment.
7. The information processing method according to claim 6, wherein the application identifier is obtained by way of inter-process communication by the other application.
8. The information processing method according to claim 6, wherein the storing the application identifier in a terminal device that installs the target application, includes:
storing the application identifier in a private file storage area of the target application;
the method further comprises the following steps:
receiving an acquisition request for acquiring an application identifier sent by the other application; the acquisition request comprises an identity identifier of an application sending the acquisition request;
and if the identity identifier is a preset identity identifier, determining that the other application is the application installed on the terminal equipment, and sending the application identifier to the other application.
9. The information processing method according to claim 6, wherein the storing the application identifier in a terminal device that installs the target application, includes:
and storing the application identifier in a public file storage area of the terminal equipment.
10. An information processing method characterized by comprising:
receiving an application identifier acquired by an application to be authenticated from terminal equipment installed in the application to be authenticated, wherein the application identifier is information generated by a server of a target application according to identification information of the target application, is stored in the terminal equipment installed with the target application, and can be acquired by other applications installed on the terminal equipment;
and generating authentication information containing the application identifier based on the acquired application identifier, sending the generated authentication information to the server of the target application so as to enable the server of the target application to judge whether the authentication information contains the application identifier, and determining an authentication result of the application to be authenticated based on the judgment result.
11. The information processing method according to claim 10, wherein the application identifier is obtained by means of inter-process communication of the application to be authenticated.
12. The method of claim 10, further comprising:
and receiving an authentication result fed back by the server of the target application, and sending preset information to the application to be authenticated based on the authentication result.
13. The information processing method according to claim 10, wherein before receiving the application identifier obtained by the application to be authenticated from the terminal device on which the application is installed, the method further comprises:
receiving user login information sent by an application to be authenticated;
and if the user login information passes the verification, receiving the application identifier acquired by the application to be authenticated from the installed terminal equipment.
14. An information processing method characterized by comprising:
acquiring an application identifier from terminal equipment for installing an application to be authenticated, wherein the application identifier is information generated according to identification information of a target application, is stored in the terminal equipment for installing the target application and can be acquired by other applications installed on the terminal equipment;
sending the application identifier to the server of the application to be authenticated, so that the server of the application to be authenticated generates authentication information containing the application identifier based on the obtained application identifier, and sending the generated authentication information to the server of the target application, so that the server of the target application judges whether the authentication information contains the application identifier.
15. The method according to claim 14, wherein the obtaining the application identifier from the terminal device installing the application to be authenticated comprises:
sending an acquisition request for acquiring an application identifier to a target application; the obtaining request comprises an identity identifier of an application to be authenticated which sends the obtaining request, so that the target application is determined to be the application installed on the terminal equipment which installs the target application based on whether the identity identifier is a preset identity identifier or not, and the application identifier is sent to the application to be authenticated;
and receiving the application identifier sent by the target application.
16. The information processing method according to claim 14, wherein the application identifier is obtained by means of inter-process communication.
17. An information processing apparatus characterized by comprising:
the first receiving module is used for receiving authentication information sent by a server of an application to be authenticated;
the first judging module is used for judging whether the authentication information contains an application identifier obtained by the server of the application to be authenticated based on the application to be authenticated, wherein the application identifier is information generated according to the identification information of the target application, is stored in the terminal equipment for installing the target application and can be obtained by other applications installed on the terminal equipment;
and the determining module is used for determining the authentication result of the application to be authenticated based on the judgment result.
18. An information processing apparatus characterized by comprising:
the second sending module is used for sending user login information to a server of the target application;
a second receiving module, configured to receive an application identifier sent by the server of the target application after the user login information is verified, where the application identifier is information generated by the server of the target application according to identification information of the target application;
and the storage module is used for storing the application identifier in the terminal equipment for installing the target application and enabling the application identifier to be acquired by other applications installed on the terminal equipment.
19. An information processing apparatus characterized by comprising:
a third receiving module, configured to receive an application identifier obtained by an application to be authenticated from a terminal device in which the application is installed, where the application identifier is information generated by a server of a target application according to identification information of the target application, is stored in the terminal device in which the target application is installed, and can be obtained by another application installed on the terminal device;
and the generating module is used for generating authentication information containing the application identifier based on the acquired application identifier, sending the generated authentication information to the server of the target application so as to enable the server of the target application to judge whether the authentication information contains the application identifier or not, and determining the authentication result of the application to be authenticated based on the judgment result.
20. An information processing apparatus characterized by comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring an application identifier from terminal equipment for installing an application to be authenticated, the application identifier is information generated according to identification information of a target application, is stored in the terminal equipment for installing the target application and can be acquired by other applications installed on the terminal equipment;
a fifth receiving module, configured to send the application identifier to the server of the application to be authenticated, so that the server of the application to be authenticated generates authentication information including the application identifier based on the obtained application identifier, and sends the generated authentication information to the server of the target application, so that the server of the target application determines whether the authentication information includes the application identifier.
21. An electronic device, comprising: a processor, a storage medium and a bus, the storage medium storing machine-readable instructions executable by the processor, the processor and the storage medium communicating via the bus when the electronic device is operating, the processor executing the machine-readable instructions to perform the steps of the information processing method according to any one of claims 1 to 16.
22. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the information processing method according to any one of claims 1 to 16.
CN201911109006.1A 2019-11-13 2019-11-13 Information processing method and device Active CN110866242B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911109006.1A CN110866242B (en) 2019-11-13 2019-11-13 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911109006.1A CN110866242B (en) 2019-11-13 2019-11-13 Information processing method and device

Publications (2)

Publication Number Publication Date
CN110866242A CN110866242A (en) 2020-03-06
CN110866242B true CN110866242B (en) 2022-04-12

Family

ID=69654155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911109006.1A Active CN110866242B (en) 2019-11-13 2019-11-13 Information processing method and device

Country Status (1)

Country Link
CN (1) CN110866242B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453200A (en) * 2015-08-06 2017-02-22 腾讯科技(深圳)有限公司 Data service accessing method and terminal
WO2017111483A1 (en) * 2015-12-23 2017-06-29 주식회사 케이티 Biometric data-based authentication device, control server and application server linked to same, and method for operating same
CN107645486A (en) * 2016-12-28 2018-01-30 平安科技(深圳)有限公司 Login authentication method and device
CN108156268A (en) * 2016-12-05 2018-06-12 腾讯科技(深圳)有限公司 Acquisition methods and server, the terminal device of device identification
CN109474838A (en) * 2018-11-01 2019-03-15 腾讯科技(深圳)有限公司 A kind of data processing method, equipment, system and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10405179B2 (en) * 2016-11-30 2019-09-03 Facebook, Inc. Automatic login to social-network from executable

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106453200A (en) * 2015-08-06 2017-02-22 腾讯科技(深圳)有限公司 Data service accessing method and terminal
WO2017111483A1 (en) * 2015-12-23 2017-06-29 주식회사 케이티 Biometric data-based authentication device, control server and application server linked to same, and method for operating same
CN108156268A (en) * 2016-12-05 2018-06-12 腾讯科技(深圳)有限公司 Acquisition methods and server, the terminal device of device identification
CN107645486A (en) * 2016-12-28 2018-01-30 平安科技(深圳)有限公司 Login authentication method and device
CN109474838A (en) * 2018-11-01 2019-03-15 腾讯科技(深圳)有限公司 A kind of data processing method, equipment, system and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Authentication techniques for e-commerce applications: A review;Neha et al;《IEEE》;20170116;693-698 *
高级安全认证的应用服务器与客户端互信任机制;蒋涛 等;《计算机工程》;20050930;第31卷(第17期);129-130 *

Also Published As

Publication number Publication date
CN110866242A (en) 2020-03-06

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
US10171449B2 (en) Account login method and device
CN108683667B (en) Account protection method, device, system and storage medium
EP2273417A2 (en) Device authority for authenticating a user of an on-line service
US9734091B2 (en) Remote load and update card emulation support
CN109033885B (en) Data response method, terminal equipment and server
CN106034134B (en) Method, auxiliary method and device for carrying out identity authentication request in webpage application program
US9483636B2 (en) Runtime application integrity protection
EP3007061A1 (en) Application execution program, application execution method, and information processing terminal device in which application is executed
EP3200492A1 (en) Authentication method, wireless router and computer storage medium
EP3176719B1 (en) Methods and devices for acquiring certification document
KR20070092690A (en) System and method for providing virtual discernment information
CN109474600B (en) Account binding method, system, device and equipment
US10158990B2 (en) SMS message reading control method and terminal
CN110334531B (en) Virtual machine key management method, master node, system, storage medium and device
CN110008758B (en) ID obtaining method and device, electronic equipment and storage medium
CN112199644A (en) Mobile terminal application program safety detection method, system, terminal and storage medium
EP3683702A1 (en) Method and apparatus for securely calling fingerprint information, and mobile terminal
CN106685945B (en) Service request processing method, service handling number verification method and terminal thereof
CN108322886B (en) Authentication method and device for terminal positioning data
WO2016197827A1 (en) Method and apparatus for processing malicious bundled software
CN114282212A (en) Rogue software identification method and device, electronic equipment and storage medium
CN113541966A (en) Authority management method, device, electronic equipment and storage medium
CN110866242B (en) Information processing method and device
JP2003337749A (en) Secure device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant