CN113986075A - Information display method and device, verification method and device and electronic equipment - Google Patents

Information display method and device, verification method and device and electronic equipment Download PDF

Info

Publication number
CN113986075A
CN113986075A CN202111234037.7A CN202111234037A CN113986075A CN 113986075 A CN113986075 A CN 113986075A CN 202111234037 A CN202111234037 A CN 202111234037A CN 113986075 A CN113986075 A CN 113986075A
Authority
CN
China
Prior art keywords
information
target
input
verification
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111234037.7A
Other languages
Chinese (zh)
Inventor
黄树云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN202111234037.7A priority Critical patent/CN113986075A/en
Publication of CN113986075A publication Critical patent/CN113986075A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses an information display method and device, a verification method and device and electronic equipment, and belongs to the technical field of communication. The information display method is applied to first electronic equipment and comprises the following steps: receiving a first input of a target application icon by a user; responding to the first input, and displaying a target covering layer, wherein the target covering layer is used for shielding an application interface corresponding to the target application icon; receiving a second input of the user to the target covering layer; in response to the second input, displaying the application interface if the verification passes.

Description

Information display method and device, verification method and device and electronic equipment
Technical Field
The application belongs to the technical field of communication, and particularly relates to an information display method and device, a verification method and device and electronic equipment.
Background
After the user changes the phone, the old mobile phone still stores the user data. In the related art, when a user changes the phone and the old mobile phone is not formatted, anyone can easily open the old mobile phone to browse the user data stored in the old mobile phone, thereby revealing the privacy of the user.
Disclosure of Invention
The embodiment of the application aims to provide an information display method and device, a verification method and device and electronic equipment, and the problem that user privacy is revealed can be solved.
In a first aspect, an embodiment of the present application provides an information display method, which is applied to a first electronic device, and the method includes:
receiving a first input of a target application icon by a user;
responding to the first input, and displaying a target covering layer, wherein the target covering layer is used for shielding an application interface corresponding to the target application icon;
receiving a second input of the user to the target covering layer;
in response to the second input, displaying the application interface if the verification passes.
In a second aspect, an embodiment of the present application provides a verification method, which is applied to a second electronic device, and the method includes:
receiving first information sent by first electronic equipment;
generating second information under the condition that the verification is passed;
and sending the second information to the first electronic equipment.
In a third aspect, an embodiment of the present application provides an information display apparatus, applied to a first electronic device, the apparatus including:
the first receiving module is used for receiving a first input of a target application icon by a user;
the first display module is used for responding to the first input and displaying a target covering layer, and the target covering layer is used for shielding an application interface corresponding to the target application icon;
the second receiving module is used for receiving a second input of the user to the target covering layer;
and the second display module is used for responding to the second input and displaying the application interface under the condition that the verification is passed.
In a fourth aspect, an embodiment of the present application provides an authentication apparatus, which is applied to a second electronic device, and includes:
the third receiving module is used for receiving the first information sent by the first electronic equipment;
the first processing module is used for generating second information under the condition that the verification is passed;
and the first sending module is used for sending the second information to the first electronic equipment.
In a fifth aspect, the present application provides an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, the program or instructions implement the steps of the method according to the first aspect or the second aspect.
In a sixth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first or second aspect.
In a seventh aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and the processor is configured to execute a program or instructions to implement the method according to the first aspect or the second aspect.
In the embodiment of the application, the target cover layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being leaked, and the privacy of a user can be better protected; in addition, by carrying out verification operation, the target masking layer is eliminated and the application interface is displayed under the condition that the verification is passed, so that the reliability and flexibility of the verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
Drawings
Fig. 1 is a schematic flowchart of an information display method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram illustrating a verification method provided in an embodiment of the present application;
FIG. 3 is a schematic interface diagram of an information display method or a verification method according to an embodiment of the present disclosure;
fig. 4 is a second schematic interface diagram of an information display method or a verification method according to an embodiment of the present disclosure;
fig. 5 is a third schematic interface diagram of an information display method or a verification method according to an embodiment of the present disclosure;
fig. 6 is a fourth schematic interface diagram of an information display method or a verification method provided in the embodiment of the present application;
fig. 7 is a fifth schematic interface diagram of an information display method or a verification method provided in the embodiment of the present application;
fig. 8 is a schematic structural diagram of an information display device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an authentication device provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 11 is a hardware schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present disclosure.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The information display method, the authentication method, the information display apparatus, the authentication apparatus, the electronic device, and the readable storage medium according to the embodiments of the present application are described in detail below with reference to the accompanying drawings.
The information display method and the verification method can be applied to the terminal, and can be specifically executed by hardware or software in the terminal. The execution subject of the information display method and the authentication method may be a terminal, or a control device of the terminal, or the like.
The terminal includes, but is not limited to, a mobile phone or other portable communication device such as a tablet computer having a touch sensitive surface (e.g., a touch screen display and/or a touch pad). It should also be understood that in some embodiments, the terminal may not be a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the following various embodiments, a terminal including a display and a touch-sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and joystick.
It should be noted that, when a user changes a terminal, information transfer between at least two terminals is often involved, for example, information on a terminal a (e.g., an old mobile phone) is transferred to a terminal B (e.g., a new mobile phone), and in a case where data on the terminal a is not manually deleted, after the terminal a is opened, the user may optionally refer to history information corresponding to each application stored on the terminal a.
The embodiment of the application provides an information display method, and an execution main body of the information display method can be a terminal, including but not limited to a mobile terminal, such as a mobile phone, a notebook computer, a camera, a vehicle-mounted electronic device, a watch and the like, a non-mobile terminal, such as a desktop computer and the like, or a control device of the terminal and the like.
The information display method is applied to the first electronic device, namely the terminal A (such as an old mobile phone) as described above.
As shown in fig. 1, the information display method includes: step 110, step 120, step 130 and step 140.
110, receiving a first input of a target application icon by a user through a terminal A;
in this step, the application icon is an icon of an application installed on the terminal a and migrating history information to the terminal B.
The application program can be a social application, a music application, a video application, a news application, and the like.
The target application icon is an icon corresponding to an application program to be referred by a user among the plurality of application programs.
The first input is used to determine a target application icon.
The first input may be expressed in at least one of the following ways:
first, the first input may be represented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, receiving the first input of the user may be represented by receiving a touch operation of the user on a display area of a display screen of the terminal.
In order to reduce the misoperation rate of the user, the action area of the first input can be limited in a specific area, for example, in a state of displaying a desktop, an application icon is displayed on a current interface, and a target application icon is touched, so that the first input can be realized; or setting the first input as a continuous multi-tap operation on a target application icon of the display area within a target time interval.
Second, the first input may be represented as a physical key input.
In this embodiment, the body of the terminal is provided with physical keys, such as a mouse or a keyboard, for receiving a first input of the user, which may be expressed as receiving a first input of the user pressing the corresponding physical key; the first input may also be a combined operation of pressing a plurality of physical keys simultaneously.
Third, the first input may be represented as a voice input.
In this embodiment, the terminal may trigger the start of application a upon receiving a voice such as "open application a".
Of course, in other embodiments, the first input may also be expressed in other forms, including but not limited to a somatosensory gesture input, and the like, which may be determined according to actual needs, and the embodiments of the present application do not limit this.
Step 120, the terminal A responds to the first input and displays a target cover layer, wherein the target cover layer is used for shielding an application interface corresponding to the target application icon;
in this step, the target mask layer may be represented as a semi-transparent layer, or as an application lock state, or may also be represented in another form to shield the application interface corresponding to the target application icon.
It can be understood that, in the related art, after the user clicks the target application icon, the terminal will automatically display the application interface corresponding to the target application icon, which may easily cause privacy disclosure of the user in some cases.
In the application, the target cover layer is arranged to shield the application interface corresponding to the target application icon, and after the user clicks the target application icon, the application interface corresponding to the target application icon cannot be directly consulted, so that the privacy of the user can be effectively protected.
In some embodiments, step 120 includes displaying the application interface in response to the first input, and overlaying a target mask layer over layers of the application interface, the target mask layer being a semi-transparent masking mask layer.
In this embodiment, the target mask layer is a semi-transparent mask layer that is superimposed on the layer where the application interface is located and covers the layer of the application interface, as shown in fig. 3, the shielding mask layer may shield the content of the application interface, and in the case that the target mask layer is displayed, the user cannot clearly refer to the content of the application interface.
For example, a user clicks an application icon a corresponding to a social class application a in a plurality of applications installed on a terminal a to implement a first input, the terminal displays a target cover layer as shown in fig. 3 in response to the first input, and a layer corresponding to an application interface of the application a is displayed below a layer of the target cover layer.
According to the information display method provided by the embodiment of the application, the semi-transparent shielding cover layer is superposed and displayed on the layer of the application interface corresponding to the target application icon, so that the content of the application interface can be effectively hidden, and the information leakage of a user can be prevented.
Of course, in other embodiments, the user clicks the application icon a on the terminal a, and the terminal may further display an application lock interface, where the application lock interface is used to shield the application interface of the application program a, that is, the user cannot refer to the application interface of the application program a in the application lock interface.
Step 130, the terminal A receives a second input of the user to the target masking layer;
in this step, the second input is used to trigger a verification operation.
The second input may be touch input, physical key input, voice input, somatosensory gesture input, and the like, which are the same as the first input, and is not described in detail herein.
In this embodiment, the verification operation is used for the terminal a to confirm whether to eliminate the target cover layer and to clearly display the application interface corresponding to the target application icon.
For example, the user may click on any location on the target skin to effect the second input; or the user may implement the second input by inputting the target graphic on the target overlay; or the user may also implement the second input by executing a target slide rule on the target cover layer. The specific implementation process will be described in the following embodiments, which will not be described herein.
It should be noted that the verification operation in step 140 is different for the second input with different expressions.
And 140, responding to the second input, and displaying the application interface under the condition that the verification is passed.
In this step, the application interface is the application interface of the application program corresponding to the target application icon, and on the application interface, the user can look up the history information and can also perform other human-computer interaction operations, such as sending information to the opposite terminal.
It can be understood that different application programs correspond to different application interfaces, but any application program corresponds to an application interface that includes history information of the user.
For example, the application interface corresponding to the social application program may be a chat interface and an address list interface, where the application interface includes historical chat information of the user, friend information, and the like; the application interfaces corresponding to the video application programs can be a video playing interface and a focus interface, and the application interfaces comprise historical browsing information, consumption information and the like of the user; the application interface corresponding to the shopping application program can be a home page recommendation interface, a history browsing interface and the like, and the application interface comprises history purchasing information, consumption information and the like of the user.
Fig. 7 shows an application interface of a social application program a, which includes historical chat information of a user, such as chat objects of the user and chat records between the user and each chat object.
In the actual execution process, after the user transfers the information of the application program a stored in the terminal a to the terminal B, the user clicks the application icon a on the terminal a again, the terminal a displays a target mask layer on the application interface layer shown in fig. 7 in an overlapping manner, so as to form a display interface shown in fig. 3, and under the interface, the user cannot clearly look up the chat object and the chat record on the application program a.
And the user executes a second input on the target covering layer shown in the figure 3, the terminal A responds to the second input, adopts different verification modes to perform verification operation based on different forms of second input, and in the case of passing the verification, eliminates the target covering layer and redisplays the application interface shown in the figure 7.
According to the information display method provided by the embodiment of the application, the target cover layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being leaked, and the user privacy can be better protected; in addition, by carrying out verification operation, the target masking layer is eliminated and the application interface is displayed under the condition that the verification is passed, so that the reliability and flexibility of the verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
The authentication operation of the present application is specifically described below from three implementation perspectives.
Firstly, verification is carried out by scanning the two-dimensional code.
In some embodiments, step 140 comprises:
the terminal A responds to the second input and controls the camera to collect information of a target image displayed on the second electronic equipment;
and displaying the application interface under the condition that the information of the target image is consistent with the target verification information.
Wherein the second electronic device is the terminal B as described above.
The target image is an image generated by and displayed on terminal B corresponding to the target application icon.
It can be understood that different application icons correspond to different images, and the images carry information of application programs corresponding to the application icons.
The target image is an image corresponding to a target application icon to be referred by a user, and the target image comprises information for performing verification operation.
For example, the target image may be a two-dimensional code or a barcode.
The target authentication information is used to perform an authentication operation.
It should be noted that the target authentication information is different for different authentication methods. For example, in the case of verification by a two-dimensional code, the target verification information may include device numbers of the terminal a and the terminal B, and an identifier of an application program corresponding to the target application icon, and the like.
For example, the target verification information may be "xxx _ yyy _ com.xxx.xxx", where xxx represents the device number of terminal a, yyy represents the device number of terminal B, and com.xxx.xxx identifies the target packet name, which is used to indicate that the information in application a in terminal B with device number yyyy is transmitted from terminal a with device number xxx.
The target authentication information is stored in the terminal a in advance and transmitted to the terminal B through the terminal a. The generation manner of the target verification information will be described in the following embodiments, which will not be described herein.
In the actual execution process, the terminal a controls a camera arranged on the terminal a to start and scan a target image displayed on the terminal B, so as to generate information corresponding to the target image.
After the information corresponding to the target image is generated, the terminal A compares the information with the target verification information stored in the terminal A, and under the condition that the information in the target image is consistent with the target verification information, the verification is determined to be passed, the target cover layer is eliminated, and the application interface is displayed.
For example, after the user completes the operation of changing the machine and transfers the chat record on the application program a of the terminal a to the terminal B, the user clicks the application icon a on the terminal a to implement the first input, and the terminal a displays a semi-transparent target mask layer on the layer displaying the application interface of the application program a in response to the first input.
At this time, the user cannot directly operate the application interface of the application program a, and cannot clearly see the content on the application interface.
When a user needs to remove a target cover layer, a verification operation needs to be performed first.
For example, the user may open the machine changing software on the terminal B, generate the two-dimensional code corresponding to the application a based on the target verification information stored in the terminal B by using the machine changing software, and display the two-dimensional code on the terminal B. The two-dimensional code carries the device number of the terminal a, the device number of the terminal B, and identification information corresponding to the application program a, such as "xxx _ yyy _ com.
The user clicks any position of the target mask layer on the terminal a to realize the second input, and the terminal a starts a rectangular frame as shown in fig. 4 in the target mask layer in response to the second input, and starts the camera.
The user scans the rectangular frame aiming at the two-dimensional code displayed on the terminal B so as to acquire information carried by the two-dimensional code.
If the scanned information is "xxx _ yyy _ com.xxx.xxx", the terminal a compares the information with the target verification information, and determines that the information is the same as the target verification information, the verification is passed, the target cover layer is removed, and the application interface shown in fig. 7 is displayed.
Of course, in other embodiments, the terminal a may also directly jump to the shooting interface to collect the image information in response to the second input, which is not limited in this application.
According to the information display method provided by the embodiment of the application, the verification operation is performed in a two-dimensional code scanning mode, the verification steps are effectively simplified, the verification operation is simple and quick, and the use experience of a user is improved.
And secondly, verifying by executing a specific sliding rule.
In some embodiments, step 140 comprises:
the terminal A responds to the second input, and generates first information under the condition that the second input is a target input;
sending first information to a second electronic device;
receiving second information sent by second electronic equipment, wherein the second information is generated by the second electronic equipment under the condition that the first information is matched with the target verification information;
and displaying the application interface in response to the second information.
In this embodiment, the second electronic device is terminal B as described above.
The target input is a preset sliding rule, and the target input can be customized based on a user.
For example, the target input may appear as a number of up and down slides within the target period, or may appear as a slide on the target mask in accordance with the target graphic, such as a "zigzag" slide; or may be represented by other sliding rules, which are not limited in this application.
And under the condition that the second input of the user is consistent with the preset sliding rule, the terminal A generates the first information.
In this embodiment, the first information is encrypted target authentication information generated by the terminal a.
The target verification information is sent from the terminal A to the terminal B and is stored in the terminal A and the terminal B in advance respectively.
Also, the target authentication information is different for different authentication modes. For example, in the case of performing a specific sliding rule verification, the target verification information may include device numbers of the terminal a and the terminal B, and an identification of an application program corresponding to the target application icon, and the like.
For example, the target verification information may be "xxx _ yyy _ com.xxx.xxx", where xxx represents the device number of terminal a, yyy represents the device number of terminal B, and com.xxx.xxx identifies the target packet name, which is used to indicate that the information in application a in terminal B with device number yyyy is transmitted from terminal a with device number xxx.
After generating the first information, the terminal a broadcasts the first information to all around.
For example, the broadcast may be made via a wireless network, such as bluetooth or WIFI.
And after receiving the first information, the terminal B decrypts the first information, compares the decrypted first information with the target verification information stored in the terminal B, determines that the verification is successful under the condition that the decrypted first information is consistent with the target verification information, generates second information and sends the second information to the terminal A.
The second information is generated by the terminal B and used for representing the successful verification.
And the terminal A receives the second information, responds to the second information, removes the target covering layer and displays the application interface.
For example, in the actual execution process, the user swipes up and down 5 times on the target mask layer above the application interface of the application program a of the terminal a as shown in fig. 3 to realize the second input.
And the terminal A compares the second input with a sliding rule preset by the user, encrypts target verification information 'xxx _ yy _ com.xxx.xxx.xxx' corresponding to the application program A stored in the terminal A under the condition that the second input is consistent with the sliding rule preset by the user to generate first information, and broadcasts the first information through WIFI.
And at least one terminal such as a terminal B, a terminal C and a terminal D under the same WIFI respectively receives the first information, decrypts the first information, and compares the decrypted first information with the target verification information stored in the local terminal.
And the terminal C and the terminal D confirm after comparison, and if the first information is not matched with the target verification information stored in the local terminal, the verification is not confirmed to be passed, and the verification is finished.
And after the terminal B is compared and confirmed, the first information is matched with the target verification information stored in the local terminal, the verification is confirmed to be passed, the terminal B generates second information, and the second information is returned to the terminal A.
After receiving the second information for confirming that the verification is successful, the terminal a removes the target cover layer to display a clear application interface of the application program a as shown in fig. 7.
According to the information display method provided by the embodiment of the application, the operation steps of a user can be further reduced by executing the specific sliding rule for verification, and the rapidness and the sensitivity of verification operation are improved; and the problem that the verification operation cannot be performed due to the fact that the terminal B is not at the hand of the user is solved, and the method has higher universality and convenience.
And thirdly, verifying through an input graph.
In some embodiments, the second input is for inputting the first information, the target authentication information includes first sub-authentication information and second sub-authentication information, and in response to the second input, step 140 includes:
the terminal A responds to the second input, and sends the first information to the second electronic equipment under the condition that the first information is consistent with the first sub-verification information;
receiving second information sent by second electronic equipment, wherein the second information is generated by the second electronic equipment under the condition of passing verification;
and displaying the application interface under the condition that the second information comprises the first sub-verification information and the second sub-verification information.
In this embodiment, the second electronic device is terminal B as described above.
The first information is information input by a user.
The first information may be represented as any part of a pair of keys and secret keys, or may also be represented as any graph of a pair of preset graph combinations, or may also be represented in other forms, and the present application is not limited herein.
The second information is information of target authentication stored in the terminal B.
The second information and the expression form of the first information should have a corresponding relationship. For example: in the case where the first information is a key, the second information may be information including a key and a secret key; in the case where the first information is one of a pair of preset pattern combinations, the second information may be the preset pattern combination.
Similarly, the target authentication information is transmitted from the terminal a to the terminal B, and is stored in the terminal a and the terminal B, respectively, in advance.
The target authentication information is different for different authentication modes. For example, in the case of authentication by input graphics, the target authentication information may be expressed as a pair of a key and a secret key, or may also be expressed as a pair of preset graphics combinations.
In this embodiment, the target verification information may be user-defined.
It should be noted that, before the second electronic device generates the second information, the received first information needs to be verified.
In the actual implementation process, after receiving the first information, the terminal B compares the first information with the target verification information stored in the terminal B, and if the first information matches the target verification information stored in the terminal B, the verification is confirmed to be passed, and a verification interface is displayed to receive a fifth input of the user.
Wherein the fifth input is for inputting third information.
The fifth input may be a touch input, an entity key input, a voice input, a somatosensory gesture input, and the like, which are the same as the first input, and the details are not repeated in this application.
The third information is expressed in the same form as the first information, and in the case that the first information is a secret key, the third information may be a secret key; or in the case where the first information is one of a pair of preset pattern combinations, the third information may be the other of the pair of preset pattern combinations.
The terminal B compares the third information with the target authentication information stored in the terminal B in response to the fifth input after receiving the fifth input by the user.
The terminal B generates the second information in a case where it is determined that the third information matches the target authentication information stored in the terminal B.
The second information is the target verification information stored in the terminal B.
It can be understood that, between terminals having a pairing relationship, the stored target authentication information is the same; the stored target verification information is different between terminals without pairing relationship.
And after receiving the second information sent by the terminal B, the terminal A compares the second information with the target verification information stored in the terminal A, and if the second information is the same as the target verification information, the terminal A confirms that the verification is passed.
Or, in the case where the two are different, if the verification is not confirmed, the target skin layer is kept displayed.
According to the information display method provided by the embodiment, the interestingness and playability of the verification operation can be improved by inputting the graphs for verification, so that the use experience of a user is improved.
The following describes the implementation process of the above embodiment by taking the target verification information as a pair of preset pattern combinations.
In some embodiments, the target authentication information is a pair of preset pattern combinations, where it should be noted that the target authentication information in the terminals having the matching relationship is the same, for example, the first sub-authentication information and the second sub-authentication information stored in the terminal a and the terminal B are respectively the same.
The target authentication information in each terminal having no matching relationship is different from each other, for example, in the case where the terminal a and the terminal C have no matching relationship, at least one of the first sub-authentication information and the second sub-authentication information stored in the terminal a and the terminal C is different.
In actual execution, the user enters the first information through the second input.
The terminal a compares the first information with the target authentication information stored in the terminal a, and if the first information is identical to the first sub-authentication information, confirms that the authentication is passed, and broadcasts the first information to the terminal B.
The terminal B compares the first information with the target authentication information stored in the terminal B after receiving the first information, confirms that the authentication is passed in case that the first information is identical with the first sub-authentication information among the target authentication information stored in the terminal B, displays an authentication interface to receive a fifth input of the user,
wherein the fifth input is for inputting third information.
The fifth input may be a touch input, an entity key input, a voice input, a somatosensory gesture input, and the like, which are the same as the first input, and the details are not repeated in this application.
The terminal B compares the third information with the second sub authentication information among the target authentication information stored in the terminal B in response to the fifth input after receiving the fifth input by the user.
In a case where it is determined that the third information coincides with the second sub-authentication information, the second information is generated.
The second information is the same as the target authentication information stored in the terminal B, and includes first sub-authentication information and second sub-authentication information stored in the terminal B.
And after the terminal B generates the second information, the second information is sent to the terminal A.
And the terminal A receives the second information, compares the first sub-verification information and the second sub-verification information in the second information with the first sub-verification information and the second sub-verification information stored in the terminal A respectively, and if the first sub-verification information and the second sub-verification information are the same, determines that the verification is passed, removes the target masking layer and displays the application interface.
For example, before the user changes the machine, the user sets target authentication information in the terminal a in advance, such as a pair of combined graphics of "circle + triangle", and the terminal a stores the target authentication information in the terminal a.
And in the process of changing the machine by the user, the terminal sends the target verification information and the information to be transferred to the terminal B, and the terminal B stores the information.
When a user needs to look up history information corresponding to an application program A on a terminal A, the user clicks an application icon A on the terminal A to realize first input, and the terminal A responds to the first input and displays a semi-transparent target cover layer on a layer displaying an application interface of the application program A in an overlapping mode.
At this time, the user cannot directly operate the application interface of the application program a, and cannot clearly see the content on the application interface.
The user draws a triangle graphic as shown in fig. 5 on the target overlay to implement the second input.
And the terminal A responds to the second input, compares the triangular graph with the first sub-verification information stored in the terminal A, determines that the verification is passed under the condition that the triangular graph and the first sub-verification information are both identified to be triangular, and broadcasts the triangular graph to the terminal B.
The broadcast mode is the same as the above embodiment, and the broadcast can be performed through bluetooth or a wireless network, which is not described herein.
And the terminal B receives the broadcast, compares the triangular graph carried in the broadcast with the first sub-verification information stored in the terminal B, and displays a verification interface if the verification is determined to be passed under the condition that the triangle is identified.
At this time, the user draws a circle as shown in fig. 6 at the authentication interface of the terminal B to realize the fifth input.
The terminal B determines the circle as the third information in response to the fifth input, and compares the third information with the second sub-authentication information stored in the terminal B. If both are circular, the terminal B confirms that the verification is passed, and transmits a pair of combined graphics, i.e., "circular + triangular", which is the target verification information stored in the terminal, to the terminal a as second information.
It should be noted that the users corresponding to the terminal B and the terminal a may be the same user, or may be different users.
And after receiving the second information, the terminal A compares the second information with the target verification information stored in the terminal A, and under the condition that a group of graphs of 'round + triangle' are identified, if the verification is passed, the target covering layer is removed, and a clear application interface of the application program A is displayed.
At this time, the user can refer to the history information on the application a on the terminal a and perform other operations such as information transmission and the like.
According to the information display method provided by the embodiment, the target verification information is set as a group of graphs, and verification is confirmed to pass only when the terminal A and the terminal B both pass the graph verification, so that the reliability of verification operation is improved, and the privacy of information is ensured; the interestingness and playability of the user in the human-computer interaction process are enhanced, and the use experience of the user is improved.
It should be noted that, in the user switching process, it is necessary to first transfer the information in the terminal a to the terminal B, according to some embodiments of the present application, before step 110, the method further includes:
receiving a third input of the user;
responding to the third input, generating a target information packet corresponding to the target application icon, and sending the target information packet to the second electronic device, wherein the target information packet comprises: information to be transferred and target verification information.
It can be understood that the user can open the switch software when the terminal a is in normal operation.
In some embodiments, the switch software may be a specific application installed on the terminal a, for performing a switch operation; in other embodiments, the switch software may be a target application that has the functionality of data transfer itself.
In the above embodiment, the third input is used to initiate an information transfer operation.
The third input may be a touch input, an entity key input, a voice input, a somatosensory gesture input, and the like, which are the same as the first input, and the description of the third input is omitted in this application.
The second electronic device is terminal B as described above.
The information to be transferred is history information of the application program stored on the terminal a and corresponding to the target application icon, such as a chat record or application data.
The target verification information can be automatically generated for the terminal or can be set for the user in a self-defining way.
As described above, the target authentication information is different for different authentication manners. For example, in the case of verification by a two-dimensional code, the target verification information may be the device numbers of terminal a and terminal B; or, in the case of passing the input pattern verification, the target verification information may be a pair of preset patterns; alternatively, in the case of verification by performing a specific slide rule, the target verification information may be text information or the like.
In the actual execution process, when the user needs to transfer the information (including the chat object, the chat record and the like) on the social application program a in the terminal a to the terminal B, the user can realize a third input by clicking the switch software in the terminal a, so as to transfer the history information in the application program a in the terminal a to the terminal B.
In the case of adopting the verification by the two-dimensional code, the terminal a generates a target information packet including target verification information and information to be transferred in response to the third input.
The information to be transferred includes history information in the application a, and the target verification information includes a device number of the terminal a, a device number of the terminal B, and an identifier corresponding to the target application, such as: xxx _ yyy _ com.xxx.xxx, where xxx denotes the device number of terminal a, yyy denotes the device number of terminal B, and com.xxx.xxx identifies the destination packet name, which is used to indicate that the data in application a in terminal B with device number yyy is transmitted from terminal a with device number xxx.
In other embodiments, in the case of verification by the input graphic, the third input further comprises a first sub-input and a second sub-input, wherein the first sub-input is used for initiating the information transfer operation and the second sub-input is used for inputting the target graphic.
For example, the user clicks the switch software in terminal a to realize the first sub-input for migrating the history information in application a in terminal a to terminal B.
The user realizes the second sub-input by inputting a target graphic, such as "triangle + circle", on the screen.
The terminal a determines the target figure as the target authentication information in response to the second sub-input.
And the terminal A responds to the first sub-input, generates a target information packet comprising target verification information and information to be transferred, and sends the target information packet to the terminal B.
The information to be transferred comprises historical information in the application program A, and the target verification information comprises a pair of target graphs of 'triangle + circle'.
In some embodiments, the third input further comprises a third sub-input and a fourth sub-input, wherein the third sub-input is used for starting the information transfer operation, and the fourth sub-input is used for determining the target input.
Wherein the target input is a sliding rule preset by a user. For example, the sliding is performed up and down for 5 times, or a five-pointed star is drawn, or other sliding rules may be adopted, which is not limited in the present application.
For example, the user determines the target input as sliding up and down a plurality of times by making a plurality of slides on the screen to realize the fourth sub-input.
And the user clicks the switch software in the terminal A to realize the third sub-input, so that the history information in the application program A in the terminal A is migrated to the terminal B.
The terminal a responds to the third sub-input, and generates a target information packet including target verification information and information to be transferred, where the information to be transferred includes history information in the application a, and the target verification information includes a device number of the terminal a, a device number of the terminal B, and an identifier corresponding to the target application, such as: xxx _ yyy _ com.xxx.xxx, where xxx denotes the device number of terminal a, yyy denotes the device number of terminal B, and com.xxx.xxx identifies the destination packet name, which is used to indicate that the data in application a in terminal B with device number yyy is transmitted from terminal a with device number xxx.
According to the information display method provided by the embodiment of the application, in the information transfer process, the target verification information is set, so that the subsequent verification operation can be smoothly carried out, information leakage is prevented, and the privacy of information is improved.
It should be noted that, in the information display method provided in the embodiment of the present application, the execution main body may be an information display device, or a control module for executing the information display method in the information display device. In the embodiment of the present application, a method for executing information display by an information display device is taken as an example, and an information display device provided in the embodiment of the present application is described.
The embodiment of the present application further provides an information display apparatus, which is applied to the first electronic device, that is, the terminal a as described above.
As shown in fig. 8, the information display apparatus includes: a first receiving module 810, a first display module 820, a second receiving module 830, and a second display module 840.
A first receiving module 810, configured to receive a first input of a target application icon by a user;
a first display module 820, configured to display, in response to a first input, a target cover layer, where the target cover layer is used to shield an application interface corresponding to a target application icon;
a second receiving module 830, configured to receive a second input of the target skin layer from the user;
and a second display module 840, configured to display the application interface in response to the second input in case that the verification is passed.
According to the information display device provided by the embodiment of the application, the target covering layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being leaked, and the user privacy can be better protected; in addition, by carrying out verification operation, the target masking layer is eliminated and the application interface is displayed under the condition that the verification is passed, so that the reliability and flexibility of the verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
In some embodiments, the first display module 820 is further configured to: and responding to the first input, displaying the application interface, and superposing a target mask layer above the layer of the application interface, wherein the target mask layer is a semitransparent shielding mask layer.
In some embodiments, the apparatus further comprises a fourth receiving module,
the fourth receiving module is used for responding to the second input and controlling the camera to collect the information of the target image displayed on the second electronic equipment;
a second display module 840, further configured to: and displaying the application interface under the condition that the information of the target image is consistent with the target verification information.
In some embodiments, the apparatus further comprises: the second processing module, the second sending module and the fifth receiving module;
the second processing module is used for responding to the second input and generating first information under the condition that the second input is the target input;
the second sending module is used for sending the first information to the second electronic equipment;
the fifth receiving module is used for receiving second information sent by the second electronic equipment, wherein the second information is generated by the second electronic equipment under the condition that the first information is matched with the target verification information;
a second display module 840, further configured to: and displaying the application interface in response to the second information.
In some embodiments, the second input is for inputting the first information, the target authentication information includes first sub-authentication information and second sub-authentication information, the apparatus further comprises: a third sending module and a sixth receiving module;
the third sending module is used for responding to the second input and sending the first information to the second electronic equipment under the condition that the first information is consistent with the first sub-verification information;
the sixth receiving module is used for receiving second information sent by the second electronic device, wherein the second information is generated by the second electronic device under the condition that the second electronic device passes the verification;
a second display module 840, further configured to: and displaying the application interface under the condition that the second information comprises the first sub-verification information and the second sub-verification information.
In some embodiments, the apparatus further comprises:
the seventh receiving module is used for receiving a third input of the user before receiving the first input of the target application icon by the user;
a third processing module, configured to generate, in response to a third input, a target information packet corresponding to the target application icon, and send the target information packet to the second electronic device, where the target information packet includes: information to be transferred and target verification information.
The information display device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The information display device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an IOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The information display device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 1 and fig. 3 to fig. 7, and is not described here again to avoid repetition.
The embodiment of the application also provides a verification method.
The execution subject of the authentication method may be a terminal, including but not limited to a mobile terminal, such as a mobile phone, a notebook computer, a camera, a vehicle-mounted electronic device, a watch, and the like, a non-mobile terminal, such as a desktop computer, and the like, or a control device of the terminal, and the like.
The authentication method is applied to the second electronic device, terminal B as described above.
As shown in fig. 2, the authentication method includes: step 210, step 220 and step 230.
Step 210, receiving first information sent by first electronic equipment by a terminal B;
in this step, the first electronic device is terminal a.
The first information is information sent to the terminal B by the terminal A, and the first information can be encrypted target verification information generated by the terminal A; alternatively, the first information may also be information input by the user to the terminal a.
It will be appreciated that the first information is presented in a different form under different authentication regimes. In the following embodiments, the expression forms will be described from different angles, which is not described herein again.
Step 220, generating second information by the terminal B under the condition that the verification is passed;
in this step, the terminal B receives the first information, compares the first information with the target authentication information stored in the terminal B, and generates the second information in the case where the authentication is passed.
The second information may be represented as information for representing successful verification, or may also be represented as target verification information stored in the terminal B.
Likewise, the second information may be presented in a different form under different authentication modes.
The target authentication information is information that is transmitted from the terminal a to the terminal B and is stored in the terminal B in advance for performing an authentication operation.
The target authentication information is different for different authentication modes.
For example, in the case of performing a specific sliding rule verification, the target verification information may include device numbers of the terminal a and the terminal B, and an identification of an application program corresponding to the target application icon, and the like.
Alternatively, in the case of authentication by an input graphic, the target authentication information may be a pair of graphics preset in advance for the user, such as "triangle + circle".
Step 230, the terminal B sends the second information to the first electronic device.
In this step, in the case where the terminal B determines that the authentication is successful, the second information is transmitted to the terminal a.
According to the different representation forms of the second information, the terminal a performs different operations to execute step 140. And will not be described in detail herein.
According to the verification method provided by the embodiment of the application, the verification operation is realized through the information interaction between the terminal A and the terminal B, so that the problem that the verification operation cannot be performed due to the fact that the terminal B is not at the hand of a user is solved, and the method has higher universality and convenience.
The following describes the verification method of this embodiment from two implementation points.
First, by performing a specific sliding rule verification.
In some embodiments, step 220 comprises: and the terminal B generates second information under the condition that the first information is consistent with the target verification information.
In this embodiment, the second information is information for characterizing the success of the verification.
In the actual execution process, after the terminal B receives the first information, the first information is decrypted, the decrypted first information is compared with the target verification information stored in the terminal B, and under the condition that the decrypted first information is consistent with the target verification information, the verification is determined to be successful, the second information is generated, and the second information is sent to the terminal A.
According to the verification method provided by the embodiment of the application, the operation steps of a user can be further reduced by executing the specific sliding rule for verification, and the rapidness and the sensitivity of verification operation are improved; and the problem that the verification operation cannot be performed due to the fact that the terminal B is not at the hand of the user is solved, and the method has higher universality and convenience.
And II, verifying through an input graph.
In some embodiments, the target authentication information includes first sub-authentication information and second sub-authentication information, step 220, including:
the terminal B displays a verification interface under the condition that the first information is the first sub-verification information;
receiving a fifth input of the user to the verification interface, wherein the fifth input is used for inputting third information;
in response to the fifth input, in a case where the third information is the second sub-authentication information, the second information is generated.
In this embodiment, the second information is target authentication information stored in the terminal B.
In actual execution, the terminal a compares the first information with the target authentication information stored in the terminal a, and in the case where the first information is identical to the first sub-authentication information, confirms that the authentication is passed, and broadcasts the first information to the terminal B.
The terminal B compares the first information with the target authentication information stored in the terminal B after receiving the first information, confirms that the authentication is passed in case that the first information is identical with the first sub-authentication information among the target authentication information stored in the terminal B, displays an authentication interface to receive a fifth input of the user,
wherein the fifth input is for inputting third information.
The fifth input may be a touch input, an entity key input, a voice input, a somatosensory gesture input, and the like, which are the same as the first input, and the details are not repeated in this application.
The terminal B compares the third information with the second sub authentication information among the target authentication information stored in the terminal B in response to the fifth input after receiving the fifth input by the user.
In a case where it is determined that the third information coincides with the second sub-authentication information, the second information is generated.
The second information is the same as the target authentication information stored in the terminal B, and includes first sub-authentication information and second sub-authentication information stored in the terminal B.
And after the terminal B generates the second information, the second information is sent to the terminal A.
According to the verification method provided by the embodiment of the application, the interestingness and playability of verification operation can be improved by inputting the graphs for verification, so that the use experience of a user can be improved.
The embodiment of the present application further provides a verification apparatus, which is applied to a second electronic device, that is, the terminal B as described above.
As shown in fig. 9, the authentication apparatus includes: a third receiving module 910, a first processing module 920 and a first transmitting module 930.
A third receiving module 910, configured to receive a first message sent by a first electronic device;
a first processing module 920, configured to generate second information if the verification passes;
a first sending module 930 configured to send the second information to the first electronic device.
According to the verification device provided by the embodiment of the application, the verification operation is realized through the information interaction between the terminal A and the terminal B, so that the problem that the verification operation cannot be performed due to the fact that the terminal B is not at the hand of a user is solved, and the verification device has higher universality and convenience.
In some embodiments, the first processing module 920 is further configured to: and generating second information under the condition that the first information is consistent with the target verification information.
In some embodiments, the target authentication information includes first sub-authentication information and second sub-authentication information, the apparatus further comprising: a third display module and an eighth receiving module;
the third display module is used for displaying the verification interface under the condition that the first information is the first sub-verification information;
the eighth receiving module is used for receiving a fifth input of the user to the verification interface, wherein the fifth input is used for inputting third information;
the first processing module 920 is further configured to: in response to the fifth input, in a case where the third information is the second sub-authentication information, the second information is generated.
The verification device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The authentication device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an IOS operating system, or other possible operating systems, which is not specifically limited in the embodiments of the present application.
The verification device provided in the embodiment of the present application can implement each process implemented by the method embodiments of fig. 2 to fig. 7, and is not described here again to avoid repetition.
Optionally, as shown in fig. 10, an electronic device 1000 is further provided in this embodiment of the present application, and includes a processor 1001, a memory 1002, and a program or an instruction stored in the memory 1002 and executable on the processor 1001, where the program or the instruction is executed by the processor 1001 to implement each process of the above-mentioned information display method or the verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, it is not described here again.
It should be noted that the electronic device in the embodiment of the present application includes the mobile electronic device and the non-mobile electronic device described above.
Fig. 11 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 1100 includes, but is not limited to: radio frequency unit 1101, network module 1102, audio output unit 1103, input unit 1104, sensor 1105, display unit 1106, user input unit 1107, interface unit 1108, memory 1109, processor 1110, and the like.
Those skilled in the art will appreciate that the electronic device 1100 may further include a power source (e.g., a battery) for supplying power to the various components, and the power source may be logically connected to the processor 1110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system. The electronic device structure shown in fig. 11 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than those shown, or combine some components, or arrange different components, and thus, the description is not repeated here.
The user input unit 1107 is configured to receive a first input of the target application icon from the user;
the display unit 1106 is used for responding to the first input and displaying a target cover layer, wherein the target cover layer is used for shielding an application interface corresponding to a target application icon;
a user input unit 1107, configured to receive a second input of the target mask layer from the user;
and the display unit 1106 is also used for responding to the second input and displaying the application interface under the condition that the verification is passed.
According to the electronic equipment provided by the embodiment of the application, the target cover layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being leaked, and the user privacy can be better protected; in addition, by carrying out verification operation, the target masking layer is eliminated and the application interface is displayed under the condition that the verification is passed, so that the reliability and flexibility of the verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
Optionally, the display unit 1106 is further configured to: and responding to the first input, displaying the application interface, and superposing a target mask layer above the layer of the application interface, wherein the target mask layer is a semitransparent shielding mask layer.
Alternatively,
the input unit 1104 is used for responding to a second input and controlling the camera to collect information of a target image displayed on the second electronic equipment;
a display unit 1106, further configured to: and displaying the application interface under the condition that the information of the target image is consistent with the target verification information.
Alternatively,
a processor 1110 for generating first information in response to the second input in case the second input is a target input;
a network module 1102, configured to send first information to a second electronic device;
the input unit 1104 is further configured to receive second information sent by the second electronic device, where the second information is generated by the second electronic device when the first information matches the target verification information;
a display unit 1106, further configured to: and displaying the application interface in response to the second information.
Optionally, the second input is for inputting first information, the target authentication information comprises first sub-authentication information and second sub-authentication information,
the network module 1102 is further configured to send, in response to the second input, the first information to the second electronic device if the first information is consistent with the first sub-verification information;
the input unit 1104 is further configured to receive second information sent by the second electronic device, where the second information is generated by the second electronic device when the second electronic device passes the verification;
a display unit 1106, further configured to: and displaying the application interface under the condition that the second information comprises the first sub-verification information and the second sub-verification information.
Alternatively,
a user input unit 1107, further configured to receive a third input from the user before receiving the first input from the user to the target application icon;
the processor 1110 is further configured to generate, in response to the third input, a target information packet corresponding to the target application icon, and send the target information packet to the second electronic device, where the target information packet includes: information to be transferred and target verification information.
According to the electronic equipment provided by the embodiment of the application, different verification modes are provided to realize verification operation, so that the flexibility and the interestingness of man-machine interaction are remarkably improved, the operation steps of a user are simplified, and the use experience of the user is improved.
Alternatively, the first and second electrodes may be,
an input unit 1104, configured to receive first information sent by a first electronic device;
a processor 1110 for generating second information in case of passing the verification;
the network module 1102 is configured to send the second information to the first electronic device.
According to the electronic equipment provided by the embodiment of the application, the verification operation is realized through the information interaction between the terminal A and the terminal B, so that the problem that the verification operation cannot be performed due to the fact that the terminal B is not at the hand of a user is solved, and the electronic equipment has higher universality and convenience.
Optionally, the processor 1110 is further configured to: and generating second information under the condition that the first information is consistent with the target verification information.
Optionally, the target authentication information includes first sub-authentication information and second sub-authentication information,
a display unit 1106, configured to display a verification interface if the first information is the first sub-verification information;
the user input unit 1107 is further configured to receive a fifth input of the user to the verification interface, where the fifth input is used to input third information;
processor 1110 is further configured to: in response to the fifth input, in a case where the third information is the second sub-authentication information, the second information is generated.
According to the electronic equipment provided by the embodiment of the application, different verification modes are provided to realize verification operation, so that the flexibility and the interestingness of man-machine interaction are remarkably improved, the operation steps of a user are simplified, and the use experience of the user is improved.
It should be understood that in the embodiment of the present application, the input Unit 1104 may include a Graphics Processing Unit (GPU) 11041 and a microphone 11042, and the Graphics processor 11041 processes image data of still pictures or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 1106 may include a display panel 11061, and the display panel 11061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1107 includes a touch panel 11071 and other input devices 11072. A touch panel 11071, also called a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 11072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein. The memory 1109 may be used for storing software programs and various data including, but not limited to, application programs and an operating system. Processor 1110 may integrate an application processor that handles primarily operating systems, user interfaces, applications, etc. and a modem processor that handles primarily wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 1110.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the above-mentioned information display method or the verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the above information display method or verification method embodiment, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatus of the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions involved, e.g., the methods described may be performed in an order different than that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a computer software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (such as a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. An information display method is applied to first electronic equipment, and is characterized by comprising the following steps:
receiving a first input of a target application icon by a user;
responding to the first input, and displaying a target covering layer, wherein the target covering layer is used for shielding an application interface corresponding to the target application icon;
receiving a second input of the user to the target covering layer;
in response to the second input, displaying the application interface if the verification passes.
2. The information display method according to claim 1, wherein the displaying the application interface in the case where the verification is passed in response to the second input includes:
responding to the second input, and controlling the camera to collect information of a target image displayed on the second electronic equipment;
and displaying the application interface under the condition that the information of the target image is consistent with the target verification information.
3. The information display method according to claim 1, wherein the displaying the application interface in the case where the verification is passed in response to the second input includes:
in response to the second input, generating first information if the second input is a target input;
sending the first information to a second electronic device;
receiving second information sent by the second electronic device, wherein the second information is generated by the second electronic device under the condition that the first information is matched with target verification information;
and responding to the second information, and displaying the application interface.
4. The information display method according to claim 1, wherein the second input is used for inputting first information, target authentication information includes first sub authentication information and second sub authentication information, and the displaying the application interface in the case where the authentication is passed in response to the second input includes:
in response to the second input, sending the first information to a second electronic device if the first information is consistent with the first sub-verification information;
receiving second information sent by the second electronic device, wherein the second information is generated by the second electronic device under the condition that the second electronic device passes verification;
displaying the application interface in a case that the second information includes the first sub-authentication information and the second sub-authentication information.
5. The information display method of any of claims 1-4, wherein prior to the receiving a first input of a target application icon by a user, the method further comprises:
receiving a third input of the user;
responding to the third input, generating a target information packet corresponding to the target application icon, and sending the target information packet to a second electronic device, wherein the target information packet comprises: information to be transferred and target verification information.
6. An authentication method applied to a second electronic device, the method comprising:
receiving first information sent by first electronic equipment;
generating second information under the condition that the verification is passed;
and sending the second information to the first electronic equipment.
7. The authentication method according to claim 6, wherein in case of passing the authentication, generating the second information comprises:
and generating the second information under the condition that the first information is consistent with target verification information.
8. The authentication method according to claim 7, wherein the target authentication information includes first sub-authentication information and second sub-authentication information, and the generating the second information in case of passing the authentication comprises:
displaying a verification interface under the condition that the first information is the first sub-verification information;
receiving a fifth input of the verification interface by the user, wherein the fifth input is used for inputting third information;
in response to the fifth input, generating the second information if the third information is the second sub-authentication information.
9. An information display device applied to a first electronic device, comprising:
the first receiving module is used for receiving a first input of a target application icon by a user;
the first display module is used for responding to the first input and displaying a target covering layer, and the target covering layer is used for shielding an application interface corresponding to the target application icon;
the second receiving module is used for receiving a second input of the user to the target covering layer;
and the second display module is used for responding to the second input and displaying the application interface under the condition that the verification is passed.
10. An authentication apparatus applied to a second electronic device, comprising:
the third receiving module is used for receiving the first information sent by the first electronic equipment;
the first processing module is used for generating second information under the condition that the verification is passed;
and the first sending module is used for sending the second information to the first electronic equipment.
CN202111234037.7A 2021-10-22 2021-10-22 Information display method and device, verification method and device and electronic equipment Pending CN113986075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111234037.7A CN113986075A (en) 2021-10-22 2021-10-22 Information display method and device, verification method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111234037.7A CN113986075A (en) 2021-10-22 2021-10-22 Information display method and device, verification method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN113986075A true CN113986075A (en) 2022-01-28

Family

ID=79740414

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111234037.7A Pending CN113986075A (en) 2021-10-22 2021-10-22 Information display method and device, verification method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113986075A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140184911A1 (en) * 2012-12-28 2014-07-03 Behavioral Technologies LLC Screen time control device and method
US20160307002A1 (en) * 2014-06-10 2016-10-20 Tencent Technology (Shenzhen) Company Limited Method and apparatus for displaying information content
CN106507268A (en) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 The method and device of dynamic authentication in a kind of mobile phone removal of home
CN107248071A (en) * 2017-06-06 2017-10-13 深圳正品创想科技有限公司 A kind of method and device for the security for improving Quick Response Code consumption certificate
WO2018049893A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transmission method and terminal device
CN107948395A (en) * 2017-10-19 2018-04-20 深圳天珑无线科技有限公司 Mobile terminal data backup method, system and storage medium
CN110290526A (en) * 2019-06-26 2019-09-27 北京小米移动软件有限公司 A kind of data access method, device and medium
CN110780785A (en) * 2019-10-24 2020-02-11 上海二三四五网络科技有限公司 Control method and device for login by using Mongolian layer in game system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140184911A1 (en) * 2012-12-28 2014-07-03 Behavioral Technologies LLC Screen time control device and method
US20160307002A1 (en) * 2014-06-10 2016-10-20 Tencent Technology (Shenzhen) Company Limited Method and apparatus for displaying information content
CN106507268A (en) * 2016-09-14 2017-03-15 广东欧珀移动通信有限公司 The method and device of dynamic authentication in a kind of mobile phone removal of home
WO2018049893A1 (en) * 2016-09-14 2018-03-22 广东欧珀移动通信有限公司 Data transmission method and terminal device
CN107248071A (en) * 2017-06-06 2017-10-13 深圳正品创想科技有限公司 A kind of method and device for the security for improving Quick Response Code consumption certificate
CN107948395A (en) * 2017-10-19 2018-04-20 深圳天珑无线科技有限公司 Mobile terminal data backup method, system and storage medium
CN110290526A (en) * 2019-06-26 2019-09-27 北京小米移动软件有限公司 A kind of data access method, device and medium
CN110780785A (en) * 2019-10-24 2020-02-11 上海二三四五网络科技有限公司 Control method and device for login by using Mongolian layer in game system

Similar Documents

Publication Publication Date Title
CN106055996B (en) Multimedia information sharing method and mobile terminal
US20110247065A1 (en) Simultaneous screen unlock and operation initiation
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
CN106203061B (en) Encryption method of application program and mobile terminal
CN112769856B (en) Application account sharing method and device and electronic equipment
CN104333449A (en) Picture encryption method and system
EP3688651A1 (en) Electronic device including display and method of encrypting and decrypting information
CN109313535A (en) Remote keyboard service is provided
CN112486444A (en) Screen projection method, device, equipment and readable storage medium
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
WO2022161406A1 (en) Encryption method and apparatus, electronic device, and medium
CN112764614B (en) Data isolation method and electronic equipment
CN114741146A (en) Multi-device cooperation method and device, electronic device and medium
WO2023186011A1 (en) Image display method and apparatus, and electronic device
WO2023103901A1 (en) Application management method and apparatus, and electronic device
CN113360879B (en) Display control method, display control device, electronic equipment and medium
CN113986075A (en) Information display method and device, verification method and device and electronic equipment
CN112929494B (en) Information processing method, information processing apparatus, information processing medium, and electronic device
CN112270004B (en) Content encryption method and device and electronic equipment
CN113238691A (en) Application icon management method and device and electronic equipment
CN112699388B (en) Encryption method and device
CN112596645A (en) Application identifier hiding method and device and electronic equipment
CN114637563B (en) Information input method and device
CN112733213B (en) Content display method and device
CN113407959B (en) Operation execution method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination