CN104346161B - The method and electronic equipment of a kind of information processing - Google Patents

The method and electronic equipment of a kind of information processing Download PDF

Info

Publication number
CN104346161B
CN104346161B CN201310347594.9A CN201310347594A CN104346161B CN 104346161 B CN104346161 B CN 104346161B CN 201310347594 A CN201310347594 A CN 201310347594A CN 104346161 B CN104346161 B CN 104346161B
Authority
CN
China
Prior art keywords
electronic equipment
token
client application
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310347594.9A
Other languages
Chinese (zh)
Other versions
CN104346161A (en
Inventor
董强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201310347594.9A priority Critical patent/CN104346161B/en
Publication of CN104346161A publication Critical patent/CN104346161A/en
Application granted granted Critical
Publication of CN104346161B publication Critical patent/CN104346161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of method of information processing and electronic equipment, including:Receive one and log in trigger signal;Based on the login trigger signal, the first token corresponding with client application is generated, gathers the first sign information;Send the first token and the first sign information causes the second electronic equipment;Receive the second electronic equipment and return to the match is successful signal, wherein, the match is successful signal is the second electronic equipment is based on the sign information to prestore and the corresponding relation of token, the signal of transmission after determining the first token and the first sign information the match is successful;Based on the match is successful signal, the client application is logged in.The method and electronic equipment that the application provides, to solve existing for login scheme in the prior art easily by unsafe technical problem of steal-number.Realize the technique effect for improving the login security that user logs in third-party application software on an electronic device.

Description

The method and electronic equipment of a kind of information processing
Technical field
The present invention relates to the method and electronic equipment of electronic technology field, more particularly to a kind of information processing.
Background technology
With the rapid development of electronic technology, the life of people and network and the different electronic product of various functions more step up Close links together, meanwhile, network application that is various abundant and being convenient for people to life also emerges in an endless stream, similar microblogging application, The third party software applications such as chat application, shopping application, mailbox application have become that many people lie fallow, made friends daily, do shopping institute Essential instrument, and after logging in the application of these third party softwares, the photograph of user, good friend, personal information, very can be obtained To some bank informations, therefore the security logged in, it has also become user selects the significant consideration of application software, also great shadow Ring the market share that obtains and will obtain to third party software application.
At present, in order to ensure the security of user's login, third party software application substantially has two kinds of login protection schemes:One It is that account password logs in, this is login scheme the most frequently used at present, and user inputs account and password to enter in software login interface Row logs in protection;Second, mobile phone identifying code logs in, it is used for class software application of doing shopping, user will checking in login interface, selection Code sends the phone number for causing acquiescence, then the identifying code received on mobile phone is inputted into login interface to be logged in.
But present inventor has found above-mentioned technology extremely during inventive technique scheme in realizing the embodiment of the present application Following technical problem less be present:
The scheme logged in for account password, because various Trojans for stealing numbers are rampant, password and account are inputted on an electronic device Number presence is by the risk of steal-number, and user needs memory cipher and account, it is also necessary to carrys out reality by the account register of complexity The login of existing third party software application, complex operation.
The scheme logged in for mobile phone identifying code, the hand-set from stolen risk for causing other people to log in be present, although and user Without memory cipher, but read in the case where logging in electronic equipment and being the mobile phone into short message, it is necessary to exit software login interface Interface is read, in the case of logging in electronic equipment and not being the mobile phone, it is also necessary to carry out the roundtrip operation of distinct electronic apparatuses, operated Journey is extremely complex, but also that short message delay or mobile phone are shut down can be present, and takes very long.
That is, the login scheme of prior art is present easily by unsafe technical problem of steal-number.
In addition, the technical problem that the login scheme of prior art also has complex operation and time-consuming.
The content of the invention
The embodiment of the present application is solved and logged in the prior art by providing the method and electronic equipment of a kind of information processing Easily by unsafe technical problem of steal-number existing for scheme.Realize raising user and log in third-party application on an electronic device The technique effect of the login security of software.
On the one hand, the embodiment of the present application provides following technical scheme:
A kind of method of information processing, this method are applied in the first electronic equipment, first electronic equipment and second Electronic equipment connects, including:
Receive a login trigger signal for being used to log in client application;
Based on the login trigger signal, the first token corresponding with the client application is generated, is gathered for logging in The first sign information of one user of the client application;
Send first token and first sign information causes second electronic equipment;
Receive second electronic equipment and return to that the match is successful based on first token and first sign information Signal, wherein, the match is successful signal is second electronic equipment is closed based on the sign information to prestore is corresponding with token System, determine first token and first sign information signal that the match is successful sends afterwards;
Based on the match is successful the signal, the client application is logged in.
Optionally, first token specifically includes:The name information of the client application, address information, access right One or more combinations in limit information and access time information.
Optionally, first sign information is any one in fingerprint, iris, face, palmmprint or sound.
Optionally, based on the login trigger signal, the first token corresponding with the client application is generated, collection is used In the first sign information for the user for logging in the client application, specifically include:Based on the login trigger signal, generation The first token corresponding with the client application;Sign collection prompting is shown, wherein, the sign collection prompting is used to draw Lead the user and carry out the first operation, first operation is the specified body part of the user close to the collection position specified Operation;First operation that the user gathers prompting based on the sign and carried out is responded, is gathered described for logging in The first sign information of the user of client application.
On the other hand, the embodiment of the present application additionally provides a kind of electronic equipment, specially the first electronic equipment, with the second electricity Sub- equipment connection, the electronic equipment include:
First receiving module, for receiving a login trigger signal for being used to log in client application;
Processing module, for based on the login trigger signal, generating the first token corresponding with the client application, Gather the first sign information of the user for logging in the client application;
Sending module, second electronic equipment is caused for sending first token and first sign information;
Second receiving module, for receiving, second electronic equipment is based on first token and first sign is believed Breath returns to the match is successful signal, wherein, the match is successful the signal is second electronic equipment based on the sign letter to prestore Breath and the corresponding relation of token, the signal sent after determining first token and first sign information the match is successful;
Login module, for based on the match is successful the signal, logging in the client application.
Optionally, the processing module is additionally operable to, based on the login trigger signal, generation and the client application pair Answer, including one kind in the name information of the client application, address information, access authority information and access time information Or the first token of a variety of combinations.
Optionally, the processing module is additionally operable to, and gathers fingerprint, the rainbow of the user for logging in the client application Any one in film, face, palmmprint or sound.
Optionally, the processing module includes:Token generation unit, for based on the login trigger signal, generation with First token corresponding to the client application;Display unit, for showing sign collection prompting, wherein, the sign is adopted Collection prompts to be used to guide the operation of user's progress first, and first operation is the specified body part of the user close to finger The operation of fixed collection position;Collecting unit, for responding the user based on sign collection prompting and described in progress First operation, gather the first sign information of the user for logging in the client application.
The one or more technical schemes provided in the embodiment of the present application, have at least the following technical effects or advantages:
1st, the method and electronic equipment that the embodiment of the present application provides, are logged in using the first sign information, are avoided The risk of steal-number, and the matching that the first sign information and the first token are carried out on the second electronic equipment is taken, because the second electricity Not direct established with Client application end of sub- equipment connects, and client can not access the sign letter for obtaining and being stored on the second electronic equipment The corresponding relation of breath and token, avoids the leakage of sign information, solves third party software login scheme in the prior art and deposit Easy unsafe technical problem by steal-number.Realizing the login third party of user on an electronic device safely and conveniently should With the technique effect of software.
2nd, the method and electronic equipment that the embodiment of the present application provides, are logged in using the first sign information, and user is only The first sign information is inputted with according to prompting, you can completes to log in, user does not have to memory account and password, complicated without carrying out Register, it is not required that wait message reply, solve login scheme of the prior art and complex operation and consumption also be present The technical problem of duration.The technique effect of third-party application software can easily be logged on the basis of safety by realizing user.
3rd, the method and electronic equipment that the embodiment of the present application provides, using in fingerprint, iris, face, palmmprint or sound Any one is used as the first sign information, because fingerprint, iris, face, palmmprint or sound have unique and not transreplication Feature, the security logged in simultaneously operating is added, can preferably protect the privacy of user.
4th, the method and electronic equipment that the embodiment of the present application provides, based on the login trigger signal, one sign of display is adopted Collection prompting instructs the user by specified body part close to the collection position specified, with guarantee to complete easily and fast fingerprint, The collection of the sign informations such as iris, face, palmmprint or sound, avoids invalidated acquisitions.
Brief description of the drawings
Fig. 1 is the flow chart of the method for information processing in the embodiment of the present invention;
Fig. 2 is the structure chart of electronic equipment in the embodiment of the present invention.
Embodiment
The embodiment of the present application is solved and logged in the prior art by providing the method and electronic equipment of a kind of information processing Easily by unsafe technical problem of steal-number existing for scheme.Realize raising user and log in third-party application on an electronic device The technique effect of the login security of software.
To solve unsafe technical problem existing for above-mentioned existing login scheme, the technical side that the embodiment of the present application provides The general thought of case is as follows:
A kind of method of information processing, this method are applied in the first electronic equipment, first electronic equipment and second Electronic equipment connects, including:
Receive a login trigger signal for being used to log in client application;
Based on the login trigger signal, the first token corresponding with the client application is generated, is gathered for logging in The first sign information of one user of the client application;
Send first token and first sign information causes second electronic equipment;
Receive second electronic equipment and return to that the match is successful based on first token and first sign information Signal, wherein, the match is successful signal is second electronic equipment is closed based on the sign information to prestore is corresponding with token System, determine first token and first sign information signal that the match is successful sends afterwards;
Based on the match is successful the signal, the client application is logged in.
By the above as can be seen that being logged in using the first sign information, the risk of steal-number is avoided, and is adopted Take the matching that the first sign information and the first token are carried out on the second electronic equipment because the second electronic equipment it is not direct with it is objective Family application end establishes connection, and client, which can not access, obtains the sign information stored on the second electronic equipment pass corresponding with token System, avoids the leakage of sign information, solves existing for third party software login scheme in the prior art easily by steal-number not The technical problem of safety.Realize the technology effect of the login third-party application software of user on an electronic device safely and conveniently Fruit.
In order to be better understood from above-mentioned technical proposal, below in conjunction with Figure of description and specific embodiment to upper Technical scheme is stated to be described in detail.
Embodiment one:
A kind of method of information processing is provided in embodiment one, this method is applied in the first electronic equipment, described First electronic equipment is connected with the second electronic equipment, and in actual applications, first electronic equipment can be smart mobile phone, put down The electronic equipments such as plate computer, notebook, second electronic equipment can also be the electricity such as smart mobile phone, tablet personal computer, notebook Sub- equipment, second electronic equipment can also be common server or cloud server, no longer arrange one by one in the present embodiment Lift.
Fig. 1 is refer to, Fig. 1 is the broad flow diagram of the method for information processing in the embodiment of the present application one, and this method includes Following steps:
Step S101, receive a login trigger signal for being used to log in client application;
Step S102, based on the login trigger signal, generate the first token corresponding with the client application, collection For the first sign information for the user for logging in the client application;
Step S103, sends first token and first sign information causes second electronic equipment;
Step S104, receive what second electronic equipment was returned based on first token and first sign information The match is successful signal, wherein, the match is successful the signal is second electronic equipment based on the sign information and token to prestore Corresponding relation, the signal sent after determining first token and first sign information the match is successful;
Step S105, based on the match is successful the signal, log in the client application.
The realization principle of above steps is described in detail below:
In specific implementation process, step S101, that is, receiving a login trigger signal for being used to log in client application can Think:User is carried out by modes such as button, touch screen or mouse clicks to the icon of the client application on the first electronic equipment Selection operation, first electronic equipment is received the login trigger signal for logging in client application, open and log in boundary Face.
In the embodiment of the present application, after step slol, the login trigger signal is also based on, judges whether to connect The first authorization message that the client application is sent based on the login trigger signal is received, obtains the first judged result, its Described in the first authorization message be the client application in advance from second electronic equipment obtain authorization message.
, can be by described in when first electronic equipment receives a login trigger signal in specific implementation process Log in trigger signal to send to the client application, if the client application has the first authorization message, can respond Trigger signal is logged in, first authorization message is sent and causes the first electronic equipment;If the client application is without the One authorization message, then login trigger signal can be responded, into the common login interface of its acquiescence, such as input circle of account password Face.
The mode of first authorization message is obtained for client application, is using the second electronic equipment as cloud server Example illustrates:Client application sends the mandate of the authorization message of acquisition request first to the provider of cloud server in advance Request, wherein, the address of the client application, title, code, extent of competence, authority phase are carried in the authorization requests One or more combinations in the information such as limit;Cloud server should to the client according to the information carried in authorization requests With being authenticated, if certification to the client application by issuing the first authorization message.
Below using when the second electronic equipment is cloud server, exemplified by microblogging application is logged on smart mobile phone, for It is bright to judge whether to receive the first authorization message that the client application is sent based on the login trigger signal, obtain first The implementation process of judged result:
First, microblogging client sends authorization requests to the provider of cloud server, while incidentally sends microblogging client The characteristic information at end, so that the provider of cloud server decides whether to give its mandate;When cloud server determines to give to award Quan Hou, the first authorization message cause microblogging client similar to client identification will be sent.
Secondly, when user needs logging in the microblogging client on smart mobile phone, touch screen is clicked on micro- on smart mobile phone The icon of rich client, to cause smart mobile phone to receive a login trigger signal, smart mobile phone sends out the login trigger signal Deliver to microblogging client, trigger signal logged in described in microblogging client end response, by the first authorization message previously obtained send to The smart mobile phone, smart mobile phone judge whether to receive the first authorization message that the microblogging client is sent, acquisition first Judged result.
Specifically, only judging that the client application has second electronic equipment authorizes first to authorize letter During breath, the first sign information is just gathered to be logged in, ensure that the safety for the sign information being pre-stored in the second electronic equipment Property and user input sign information security, avoid the leakage of user's sign information.
In specific implementation process, it can also judge whether that receive one is stepped on using sign information after step slol The instruction in land, obtain the first judged result.
Specifically, can be when the first electronic equipment is received for logging in so that the sign information is fingerprint as an example After the login trigger signal of client application, login interface is opened, has " account password logs in " and " fingerprint on the log-in interface Log in " two kinds of options, user have selected " after fingerprint logs in option ", and the first electronic equipment will receive one and be logged in using fingerprint Instruction, obtain the first judged result.
By step S101, after receiving a login trigger signal, or after step S101, determine that described first sentences After disconnected result is is, into step S102, i.e., based on the login trigger signal, generation corresponding with the client application the One token, gather the first sign information of the user for logging in the client application.
In the embodiment of the present application step S102, first token specifically includes:The title letter of the client application One or more combinations in breath, address information, access authority information and access time information.
In specific implementation process, first token can based on the information of the client application to prestore generating or Responded based on client application and log in trigger signal institute's feedack to generate.Below to be stepped on notebook computer with fingerprint Exemplified by recording mailbox application, to illustrate the generation method of the token of above two first:
A, generated based on the information of the client application to prestore, that is to say, that be previously stored with notebook computer The information for the client application for needing to use fingerprint to log in, when user needs to log in mailbox application, then notebook computer meeting First token is generated based on the information of the mailbox application in the client application information to prestore.
B, responded based on client application and log in trigger signal institute's feedack to generate, that is to say, that when user exists When the link of mailbox application is double-clicked on notebook computer, not only notebook computer receives a login trigger signal, mailbox client End also receive a login trigger signal, mailbox application end can respond the login trigger signal, by unique characteristics information send to Notebook computer, notebook computer can generate the first token based on the characteristic information of the mailbox application received.
In the embodiment of the present application step S102, first sign information can be fingerprint, iris, face, palmmprint or Any one in sound.
In specific implementation process, gather sign information mode include it is a variety of, enumerate several the most commonly used sides below Formula:
The fingerprint can be gathered by Fingerprint Identification Unit or camera;Gathered by iris recognition device or camera The iris;The face is gathered by recognition of face device or camera;By personal recognition device or camera to gather State palmmprint or the sound is gathered by sound collector.
In embodiments of the present invention, can be used as from any one in fingerprint, iris, face, palmmprint or sound First sign information because its have it is unique and not transreplication the characteristics of, add the security logged in simultaneously operating, can be more The privacy of good protection user.
In the embodiment of the present application, step S102, i.e., based on the login trigger signal, generation and the client application Corresponding first token, the first sign information of the user for logging in the client application is gathered, is specifically included:It is based on The login trigger signal, generate the first token corresponding with the client application;Sign collection prompting is shown, wherein, The sign collection prompts to be used to guide the user to carry out the first operation, and first operation is the specified body of the user Operation of the position close to the collection position specified;Respond the user gathers prompting based on the sign and carried out described first Operation, gather the first sign information of the user for logging in the client application.
Based on the login trigger signal, display one sign collection is prompted to instruct user by specified body part close to finger Fixed collection position, can guarantee that and complete fingerprint collecting easily and fast, avoid invalidated acquisitions.
After the first sign information of the first token and collection is generated by step S102, into step S103, S104 and S105:
Send first token and first sign information causes second electronic equipment;
Receive second electronic equipment and return to that the match is successful based on first token and first sign information Signal, wherein, the match is successful signal is second electronic equipment is closed based on the sign information to prestore is corresponding with token System, determine first token and first sign information signal that the match is successful sends afterwards;
Based on the match is successful the signal, the client application is logged in.
Embodiment two:
A kind of electronic equipment, specially the first electronic equipment are provided in embodiment two, is connected with the second electronic equipment, In actual applications, first electronic equipment can be the electronic equipments such as smart mobile phone, tablet personal computer, notebook, described Two electronic equipments can also be the electronic equipments such as smart mobile phone, tablet personal computer, notebook, and second electronic equipment can also be Common server or cloud server, will not enumerate in the present embodiment.
Fig. 2 is refer to, Fig. 2 is the structure chart of electronic equipment in the embodiment of the present application, and the electronic equipment includes:
First receiving module 201, for receiving a login trigger signal for being used to log in client application;
Processing module 202, for based on the login trigger signal, generation the first order corresponding with the client application Board, gather the first sign information of the user for logging in the client application;
Sending module 203, second electronic equipment is caused for sending first token and first sign information;
Second receiving module 204, first token and first body are based on for receiving second electronic equipment Reference breath returns to the match is successful signal, wherein, the match is successful the signal is second electronic equipment based on the body to prestore Reference is ceased with the corresponding relation of token, the letter sent after determining first token and first sign information the match is successful Number;
Login module 205, for based on the match is successful the signal, logging in the client application.
In the embodiment of the present application, the processing module 202 is additionally operable to, based on the login trigger signal, generation and institute State corresponding to client application, including when the name information of the client application, address information, access authority information and access Between one or more combinations in information the first token.
In the embodiment of the present application, the processing module 202 is additionally operable to, gather for log in the client application one Any one in the fingerprint of user, iris, face, palmmprint or sound.
In the embodiment of the present application, the processing module 202 includes:Token generation unit, for being touched based on described log in Signal, generate the first token corresponding with the client application;Display unit, for showing sign collection prompting, its In, the sign collection prompting is used to guide the user to carry out the first operation, the first operation specifying for the user Operation of the body part close to the collection position specified;Collecting unit, carried for responding the user based on sign collection First operation shown and carried out, gather the first sign information of the user for logging in the client application.
The electronic equipment provided in the present embodiment and the method for the information processing in embodiment one, are to be based on same invention structure Two aspects under thinking, are above being described in detail to the implementation process of method, so those skilled in the art can It is succinct for specification according to the structure and implementation process of the electronic equipment described above being apparent from the present embodiment, Just repeat no more herein.
In order to more clearly allow the application person of ordinary skill in the field to understand the technical side in the embodiment of the present application Case, below, station there is into man-machine interaction angle, and the method implementation process in the embodiment of the present application is introduced by example:
Assuming that user Wang Lan possesses smart mobile phone, when Wang Lan needs logging in microblogging application on the smart mobile phone, will enter Row operations described below:
First, the smart mobile phone is opened, and swiping is carried out to find the microblogging application on smart mobile phone screen Icon.
Then, the microblogging application icon is clicked on, by the click to microblogging application icon, the smart mobile phone is received one Trigger signal is logged in, the client that the microblogging is applied is received a login trigger signal.
Now, if the microblogging client has the first authorization message that cloud server is authorized, the microblogging client The login trigger signal can be responded, the first authorization message is sent to the smart mobile phone.The smart mobile phone judges to receive the After one authorization message, first authorization message can be based on and generate the first token, and fingerprint collecting prompting is ejected on screen Window, there is text prompt on the fingerprint collecting prompt window:" please inputting fingerprint in blue region ", and graphical cues:One circle The blue region of shape.
Next, its default finger, such as right hand forefinger are placed into the circle blueness on smart mobile phone screen by Wang Lan Region, to enable the smart mobile phone to collect by its fingerprint capturer the fingerprint of Wang Lan right hand forefingers.After gathering successfully, The sound that smart mobile phone can send " serge " is gathered and successfully prompted, and closes the fingerprint collecting prompt window.
Smart mobile phone sends the first token information of the fingerprint collected and generation to cloud server, cloud server Can based on the sign information to prestore and the corresponding relation of token, judge Wang Lan index fingerprints whether be prestore be used to log in it is described The fingerprint of microblogging application, if it is, cloud server can send one, the match is successful, and signal causes the smart mobile phone, smart mobile phone Receive this match is successful after signal can microblogging application described in Successful login, the interface display after microblogging application is logged in exists On screen.
If the microblogging client does not have the first authorization message that cloud server is authorized, the smart mobile phone judges do not have After receiving the first authorization message, the inputting interface of an account and password can be shown on screen, Wang Lan can be pre- by inputting If volume account and the mode of password log in the microblogging application.
Technical scheme in above-mentioned the embodiment of the present application, at least has the following technical effect that or advantage:
1st, the method and electronic equipment that the embodiment of the present application provides, are logged in using the first sign information, are avoided The risk of steal-number, and the matching that the first sign information and the first token are carried out on the second electronic equipment is taken, because the second electricity Not direct established with Client application end of sub- equipment connects, and client can not access the sign letter for obtaining and being stored on the second electronic equipment The corresponding relation of breath and token, avoids the leakage of sign information, solves third party software login scheme in the prior art and deposit Easy unsafe technical problem by steal-number.Realizing the login third party of user on an electronic device safely and conveniently should With the technique effect of software.
2nd, the method and electronic equipment that the embodiment of the present application provides, are logged in using the first sign information, and user is only The first sign information is inputted with according to prompting, you can completes to log in, user does not have to memory account and password, complicated without carrying out Register, it is not required that wait message reply, solve login scheme of the prior art and complex operation and consumption also be present The technical problem of duration.The technique effect of third-party application software can easily be logged on the basis of safety by realizing user.
3rd, the method and electronic equipment that the embodiment of the present application provides, using in fingerprint, iris, face, palmmprint or sound Any one is used as the first sign information, because fingerprint, iris, face, palmmprint or sound have unique and not transreplication Feature, the security logged in simultaneously operating is added, can preferably protect the privacy of user.
4th, the method and electronic equipment that the embodiment of the present application provides, based on the login trigger signal, one sign of display is adopted Collection prompting instructs the user by specified body part close to the collection position specified, with guarantee to complete easily and fast fingerprint, The collection of the sign informations such as iris, face, palmmprint or sound, avoids invalidated acquisitions.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more Install medium can be used(Including but not limited to disk erector, CD-ROM, optics erector etc.)The computer program production of upper implementation The form of product.
The present invention is with reference to method according to embodiments of the present invention, equipment(System)And the flow of computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which can be also arranged on, can guide computer or other programmable data processing devices with spy Determine in the computer-readable erector that mode works so that the instruction in the computer-readable erector, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (8)

1. a kind of method of information processing, this method is applied in the first electronic equipment, first electronic equipment and the second electricity Sub- equipment connection, it is characterised in that including:
Receive a login trigger signal for being used to log in client application;
Based on the login trigger signal, the first token corresponding with the client application is generated, is gathered described for logging in The first sign information of one user of client application;
First token and first sign information are sent to second electronic equipment;
Second electronic equipment is received based on first token and first sign information signal that returns to that the match is successful, Wherein, the match is successful signal is second electronic equipment is based on the sign information to prestore and the corresponding relation of token, really First token and first sign information signal that the match is successful sends afterwards calmly;
Based on the match is successful the signal, the client application is logged in.
2. the method as described in claim 1, it is characterised in that first token specifically includes:
Name information, address information, access authority information and one kind or more in access time information of the client application The combination of kind.
3. the method as described in claim 1, it is characterised in that first sign information is fingerprint, iris, face, palmmprint Or any one in sound.
4. the method as described in claim 1, it is characterised in that described to be based on the login trigger signal, generation and the visitor First token corresponding to the application of family end, the first sign information of the user for logging in the client application is gathered, specifically Including:
Based on the login trigger signal, the first token corresponding with the client application is generated;
Sign collection prompting is shown, wherein, the sign collection prompting is used to guide the user to carry out the first operation, described First operation is operation of the specified body part close to the collection position specified of the user;
First operation that the user gathers prompting based on the sign and carried out is responded, is gathered for logging in the client Hold the first sign information of the user of application.
5. a kind of electronic equipment, it is connected with the second electronic equipment, it is characterised in that the electronic equipment includes:
First receiving module, for receiving a login trigger signal for being used to log in client application;
Processing module, for based on the login trigger signal, generating the first token corresponding with the client application, collection For the first sign information for the user for logging in the client application;
Sending module, for sending first token and first sign information to second electronic equipment;
Second receiving module, for receiving, second electronic equipment is based on first token and first sign information returns Return the match is successful signal, wherein, the match is successful signal is second electronic equipment based on the sign information to prestore with The corresponding relation of token, determine first token and first sign information signal that the match is successful sends afterwards;
Login module, for based on the match is successful the signal, logging in the client application.
6. electronic equipment as claimed in claim 5, it is characterised in that the processing module is additionally operable to, and is touched based on described log in Signal, generation is corresponding with the client application, including the name information of the client application, address information, access First token of one or more combinations in authority information and access time information.
7. electronic equipment as claimed in claim 5, it is characterised in that the processing module is additionally operable to, and is gathered for logging in institute State any one in fingerprint, iris, face, palmmprint or the sound of a user of client application.
8. electronic equipment as claimed in claim 5, it is characterised in that the processing module includes:
Token generation unit, for based on the login trigger signal, generating the first token corresponding with the client application;
Display unit, for showing sign collection prompting, wherein, the sign collection prompting is used to guide the user to carry out First operation, first operation are operation of the specified body part close to the collection position specified of the user;
Collecting unit, first operation for gathering prompting for responding the user based on the sign and carrying out, collection are used In the first sign information for the user for logging in the client application.
CN201310347594.9A 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing Active CN104346161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310347594.9A CN104346161B (en) 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310347594.9A CN104346161B (en) 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing

Publications (2)

Publication Number Publication Date
CN104346161A CN104346161A (en) 2015-02-11
CN104346161B true CN104346161B (en) 2017-12-29

Family

ID=52501860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310347594.9A Active CN104346161B (en) 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing

Country Status (1)

Country Link
CN (1) CN104346161B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028119A1 (en) * 2015-08-16 2017-02-23 赵政荣 Face-based remote verification method and automatic teller machine
WO2017028132A1 (en) * 2015-08-16 2017-02-23 赵政荣 Method of indicating information upon face-based remote verification and automatic teller machine
CN111654468A (en) * 2020-04-29 2020-09-11 平安国际智慧城市科技股份有限公司 Secret-free login method, device, equipment and storage medium
CN114844657B (en) * 2021-01-15 2023-06-27 华为技术有限公司 Website login method, communication system and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6507912B1 (en) * 1999-01-27 2003-01-14 International Business Machines Corporation Protection of biometric data via key-dependent sampling
CN1457587A (en) * 2000-08-15 2003-11-19 维亚克沃公司 Method and apparatus for web-based application service model for security management
CN101316169A (en) * 2008-07-18 2008-12-03 张曌 Network identity verification method based on internet third party biological characteristic validation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6507912B1 (en) * 1999-01-27 2003-01-14 International Business Machines Corporation Protection of biometric data via key-dependent sampling
CN1457587A (en) * 2000-08-15 2003-11-19 维亚克沃公司 Method and apparatus for web-based application service model for security management
CN101316169A (en) * 2008-07-18 2008-12-03 张曌 Network identity verification method based on internet third party biological characteristic validation

Also Published As

Publication number Publication date
CN104346161A (en) 2015-02-11

Similar Documents

Publication Publication Date Title
AU2019250143B2 (en) User interface for managing access to credentials for use in an operation
US10395018B2 (en) System, method, and device of detecting identity of a user and authenticating a user
US11736478B2 (en) Device, system, and method of user authentication based on user-specific characteristics of task performance
US10069852B2 (en) Detection of computerized bots and automated cyber-attack modules
US9541995B2 (en) Device, method, and system of detecting user identity based on motor-control loop model
US10949757B2 (en) System, device, and method of detecting user identity based on motor-control loop model
US9848009B2 (en) Identification of computerized bots and automated cyber-attack modules
US9665703B2 (en) Device, system, and method of detecting user identity based on inter-page and intra-page navigation patterns
US9526006B2 (en) System, method, and device of detecting identity of a user of an electronic device
CN108780475A (en) Personalized inference certification for virtually assisting
US20150242605A1 (en) Continuous authentication with a mobile device
US10547624B2 (en) Identity authentication method, apparatus, and system
CN107113302A (en) Security and licensing architecture in multi-tenant computing system
WO2015055095A1 (en) Identity authentication method and device and storage medium
US11233897B1 (en) Secure call center communications
US9202035B1 (en) User authentication based on biometric handwriting aspects of a handwritten code
CN104346161B (en) The method and electronic equipment of a kind of information processing
CN107967422A (en) One kind verification implementation method and electric terminal
US20180082052A1 (en) Single-prompt multiple-response user authentication method
CN107395610A (en) One kind communication authentication method, first terminal and second terminal
Shrestha et al. Theft-resilient mobile wallets: Transparently authenticating NFC users with tapping gesture biometrics
US20230325488A1 (en) Multi-factor authentication via mixed reality
US20240013166A1 (en) Check exception processing in the metaverse
CN108234113A (en) Auth method, device and system
Chen et al. Sharing without scaring: Enabling smartphones to become aware of temporary sharing

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant