CN104951677A - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN104951677A
CN104951677A CN201410113834.3A CN201410113834A CN104951677A CN 104951677 A CN104951677 A CN 104951677A CN 201410113834 A CN201410113834 A CN 201410113834A CN 104951677 A CN104951677 A CN 104951677A
Authority
CN
China
Prior art keywords
private key
application program
operation information
operational order
electronic equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410113834.3A
Other languages
Chinese (zh)
Other versions
CN104951677B (en
Inventor
纪大为
刘伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410113834.3A priority Critical patent/CN104951677B/en
Publication of CN104951677A publication Critical patent/CN104951677A/en
Application granted granted Critical
Publication of CN104951677B publication Critical patent/CN104951677B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an information processing method applied to electronic equipment. The electronic equipment comprises at least one application program, and an operation body can operate the application programs through the electronic equipment. The method comprises the steps of determining the type of the application program corresponding to an operation command while the electronic equipment receives the operation command corresponding to the application program; acquiring operation information input by the operation body when the type of the application program indicates that the application program requires private key identification; judging whether the operation information is consistent with a preset private key, and executing the operation command if yes. In this way, the application programs in the electronic equipment can be encrypted, an operation command corresponding to a certain application program can be executed only if private key identification is passed, an independent safety guarantee mechanism is provided for the application programs, and the operation experience of a user is improved.

Description

A kind of information processing method and device
Technical field
The application relates to field of information processing, particularly relates to a kind of information processing method and device.
Background technology
Along with the usable range of intelligent mobile terminal is more and more wider, the use safety problem of mobile terminal also becomes increasingly conspicuous, mobile terminal can preserve the various privacy message of associated subscriber, and these message are all in store in different programs, the message registration of such as user is kept in talk application program, the information of contact person can be kept in contact application, and user does not wish that the various information of preserving in the applications are understood by other people, in case device losses or lend other people and cause leakage of personal information.
Therefore, user can carry out unblock encryption to equipment, only have input correct unlocking pin, equipment just can be unlocked, but such releasing process can only for equipment itself, if after equipment is unlocked, application program wherein is all in the state that can be opened, and still there is the possibility of information leakage.
Summary of the invention
In view of this, the embodiment of the present application provides a kind of information processing method, by carrying out private key certification to the application program in electronic equipment, fully ensure that the safety of application program.
To achieve these goals, the technical scheme that provides of the application is as follows:
A kind of information processing method, be applied to electronic equipment, described electronic equipment comprises at least one application program, and operating main body operates described application program by described electronic equipment, and described method comprises:
In the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
When the type of described application program shows that described application program is the application program needing to carry out private key certification, obtain the operation information of described operating main body input;
Judge that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, perform described operational order.
Preferably, described secret key certification comprises the physiological characteristic information certification of operating main body, and when the type of described application program shows that described application program is the application program needing to carry out private key certification, the operation information obtaining the input of described operating main body comprises:
Receiving in the process for the operational order of described application program, obtain the physiological characteristic information of described operating main body.
Preferably, described electronic equipment comprises a touch-screen, and described touch-screen can obtain the fingerprint of the indication thing contacted with touch-screen, and described private key certification comprises finger-print cipher, receiving in the process for the operational order of described application program, the physiological characteristic information obtaining described operating main body comprises:
By described touch-screen obtain carry out operational order time and the fingerprint of described indication thing of touch-screen contact area;
Judge that whether described operation information and default private key be consistent to comprise:
The fingerprint of the described indication thing with touch-screen contact area and preset fingerprint are compared, when the degree of confidence of described comparison result be more than or equal to first pre-set confidence threshold time, show that described operation information is consistent with default private key.
Preferably, described private key certification comprises voiceprint, and receiving in the process for the operational order of described application program, the physiological characteristic information obtaining described operating main body comprises:
Obtain the vocal print feature of the sound of input;
Judge that whether described operation information and default private key be consistent to comprise:
Described vocal print feature and default vocal print feature are compared, when the degree of confidence of comparison result be greater than pre-set confidence threshold time, show that described operation information is consistent with default private key.
Preferably, described private key certification comprises the certification of character private key, is receiving in the process for the operational order of described application program, and the operation information obtaining the input of described operating main body comprises:
Obtain the character of input;
Judge that whether described operation information and default private key be consistent to comprise:
The character of described input and preset characters password are compared, when the character inputted is identical with preset characters, shows that described operation information is consistent with default private key.
Preferably, described method also comprises:
When described operation information and default private key inconsistent time, do not perform described touch order.
Preferably, described method also comprises:
When described operation information and the inconsistent continuously number of times of default private key exceed predetermined threshold value, lock described electronic equipment.
Preferably, described electronic equipment comprises display module, and before described electronic equipment receives the operational order for described application program, described method also comprises:
Preset type and the private key authentication mode of described application program, and the icon that display is corresponding with the private key authentication mode of described application program on display module.
Present invention also provides a kind of signal conditioning package, be applied to electronic equipment, described electronic equipment comprises at least one application program, and operating main body operates described application program by described electronic equipment, and described device comprises:
Application Type determination module, in the process that receives for the operational order of described application program at described electronic equipment, determine described operational order for the type of application program;
Operation information acquisition module, for when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
Judge module, for judging that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
Preferably, described secret key certification comprises the physiological characteristic information certification of operating main body, and described operation information acquisition module, specifically for receiving in the process for the operational order of described application program, obtains the physiological characteristic information of described operating main body.
Preferably, described electronic equipment comprises a touch-screen, and described touch-screen can obtain the fingerprint of the indication thing contacted with touch-screen, and described private key certification comprises finger-print cipher, and described MIM message input module comprises:
Fingerprint acquiring unit, when carrying out operational order for being obtained by described touch-screen and the fingerprint of the described indication thing of touch-screen contact area;
Described judge module specifically for the fingerprint of the described indication thing with touch-screen contact area and preset fingerprint are compared, when the degree of confidence of described comparison result be more than or equal to first pre-set confidence threshold time, show that described operation information is consistent with default private key.
Preferably, described private key certification comprises voiceprint, and described MIM message input module comprises:
Sound acquiring, for obtaining the vocal print feature of the sound of input;
Described judge module specifically for described vocal print feature and default vocal print feature are compared, when the degree of confidence of comparison result be greater than pre-set confidence threshold time, show that described operation information is consistent with default private key.
Preferably, described private key certification comprises the certification of character private key, and described MIM message input module comprises:
Character acquiring unit, for obtaining the character of input;
Described judge module, specifically for the character of described input and preset characters password being compared, when the character inputted is identical with preset characters, shows that described operation information is consistent with default private key.
Preferably, described device also comprises:
When described operation information and default private key inconsistent time, do not perform described touch order.
Preferably, described device also comprises:
Locking module, for when described operation information and the inconsistent continuously number of times of default private key exceed predetermined threshold value, locks described electronic equipment.
Preferably, described electronic equipment comprises display module, and described device also comprises:
Setting module, for presetting type and the private key authentication mode of described application program, and the icon that display is corresponding with the private key authentication mode of described application program on display module.
Unlike the prior art, the application passes through in the process received for the operational order of described application program at described electronic equipment, determine described operational order for the type of application program, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtain the operation information of described operating main body input, and judge that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, perform described operational order.Make the application program in electronic equipment can be encrypted, only have passed private key certification, the operational order for application program just can be performed, and makes application program be provided with independently safety assurance mechanism, promotes the operating experience of user.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The schematic flow sheet of a kind of information processing method that Fig. 1 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 2 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 3 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 4 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 5 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 6 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 7 provides for the embodiment of the present application;
The schematic flow sheet of the another kind of information processing method that Fig. 8 provides for the embodiment of the present application;
The structural representation of a kind of signal conditioning package that Fig. 9 provides for the embodiment of the present application.
Embodiment
Technical scheme in the application is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present application, technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all should belong to the scope of the application's protection.
The embodiment of the present application provides a kind of information processing method, as shown in Figure 1, be applied to electronic equipment, electronic equipment can be mobile phone, panel computer, laptop computer etc., described electronic equipment comprises at least one application program, operating main body operates described application program by described electronic equipment, and the type of described application program comprises to be needed private key certification and do not need private key certification, and described method comprises:
Step 101, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Generally include at least one application program in the electronic device, different application programs can perform different tasks, user can complete different functions by starting different application programs, user also can carry out different operational orders to this application program, such as start application program, the position of deleting application program or mobile applications etc., the operational order of application programs can have various ways.Application program be presented in the electronic device user at the moment the most intuitively mode be exactly be presented on the display of electronic equipment by an application icon, user can carry out multi-form operation by the icon of the application program that display shows.
Such as, in the smart mobile phone with touch-screen, start some application programs just to need to click icon corresponding to application program on the touchscreen, if need the icon of mobile applications, after just needing the icon a period of time clicking application program, the icon dragging application program just can mobile applications; And when operating for application program on computers, double-clicking the icon of application program just can start application program, or the icon clicking application program do not put just can the icon dragging application program etc.
In the embodiment of the present application, operational order for application program can be directly carry out for the icon of application program, but operating application program is also fine by other means, such as by other supervisory routine, some application programs are operated, such as carry out the unloading and data dump etc. of application program, the concrete operations type of the embodiment of the present application application programs does not limit.
Electronic equipment receives in process for the operational order of application program, determines the type of application program, determine this operational order do for this application program be the application program needing to carry out private key certification, still do not need the application program of carrying out private key certification.Meanwhile, when determining application program and being the application program needing to carry out private key certification, the concrete form of private key certification is also just determined.
Need the application program of carrying out private key certification, need when carrying out operational order just can be carried out by private key certification, namely user has carried out an operational order to an application program, if this application program is an application program needing to carry out private key certification, the execution of this operational order just needs the action by a private key certification, after only having private key certification to pass through, this operational order just can come into force.And need the application program of private key certification determine need to carry out private key certification time, just determine the concrete mode of private key certification.
In the embodiment of the present application, operating main body is exactly generally the user holding electronic equipment.
Step 102, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
When determine operational order for application program be the application program needing to carry out private key certification after, so the further execution of operational order just needs by private key certification, the process of private key certification is exactly the process of the operation information of operating main body input and default private key being compared, so need the operation information first obtaining operating main body input, in the embodiment of the present application, the operation information of operating main body input is also inputted by electronic equipment.
Step 103, judges that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
Carried out the input of information at operating main body after, need to judge that whether operation information is consistent with default private key, compare by operation information and default private key, after comparison is consistent, show that the operation information of user is correct private key, namely have passed private key certification, just can perform the operational order for application program.
In the embodiment of the present application, the process obtaining the operation information of input can be inputted by user after determining private key authentication mode, namely user has first carried out one for the operational order of application program, after having carried out this operational order, also need the input action carrying out an operation information, carry out private key certification by this operation information.
Another kind of situation, user carries out operation information input can carry out with carrying out operational order simultaneously, namely user is also just equivalent to have input operation information while carrying out operational order, also the input with regard to not needing user to carry out single job information again, make the process of private key certification more easy, the concrete form of the application to operation information and operational order does not limit.
The application passes through in the process received for the operational order of described application program at described electronic equipment, determine described operational order for the type of application program, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtain the operation information of described operating main body input, and judge that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, perform described operational order.Make the application program in electronic equipment can be encrypted, only have passed private key certification, the operational order for application program just can be performed, and makes application program be provided with independently safety assurance mechanism, promotes the operating experience of user.
Present invention also provides a kind of information processing method, as shown in Figure 2, be applied to electronic equipment, electronic equipment can be mobile phone, panel computer, laptop computer etc., and the method comprises:
Step 201, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 201 is similar to step 101, repeats no more here.
Step 202, when the type of described application program shows that described application program is the application program needing to carry out private key certification, receiving in the process for the operational order of described application program, obtains the physiological characteristic information of described operating main body;
In the present embodiment, when the type of described application program shows that described application program is the application program needing to carry out private key certification, the operation information of operating main body input is the physiological characteristic information of operating main body, and the action obtaining physiological characteristic information be with the process of carrying out operational order in obtain, namely user has carried out operational order for an application program, and in the process of carrying out operational order, obtain the physiological characteristic information of operating main body.
Such as, in smart mobile phone, operating main body has carried out operational order by the touch-screen of smart mobile phone for an application program, is being undertaken, in the process of operational order, obtaining the physiological characteristic information of operating main body by touch-screen.
Step 203, judges that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
Default private key is also default physiological characteristic information, after the physiological characteristic information input of operating main body, judge that the process whether this physiological characteristic information is consistent with the private key preset is exactly the physiological characteristic information of input and the physiological characteristic information preset are compared, when both are consistent, show that described operation information is by private key certification, the operational order for application program can be performed subsequently.
In the present embodiment, the operation information of operating main body input is physiological characteristic information, and physiological characteristic information is carried out carrying out operational order while, operating main body is made to carry out also have input physiological characteristic information in the process for the operational order of application program, and without the need to needing private key certification in application program, carry out the input of information again, simplify the input flow process of information in private key verification process, improve Consumer's Experience.
The embodiment of the present application additionally provides a kind of information processing method, as shown in Figure 3, is applied to electronic equipment, and electronic equipment can be mobile phone, panel computer, laptop computer etc., and described method comprises:
Step 301, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 301 is similar to step 201, repeats no more here.
Step 302, when the type of described application program shows that described application program is the application program needing to carry out private key certification, by described touch-screen obtain carry out operational order time and the fingerprint of described indication thing of touch-screen contact area;
Described electronic equipment has touch-screen, described touch-screen can obtain the fingerprint of the indication thing contacted with touch-screen, in the embodiment of the present application, the touch-screen of electronic equipment directly can obtain the fingerprint of giving directions thing, does not need a fingerprint identification device independent of touch-screen to identify fingerprint separately.User just can get the fingerprint of click while point touching screen by touch-screen.
User can by carrying out the operational order for application program on the touchscreen, such as click an application icon, operational order corresponding to the operational order so clicked starts application program exactly, as clicked the icon of application program for a long time, so just application program image target position can be changed, or the position that the icon of application program directly can be dragged to recycle bin carries out deleting or program unloading, operational order corresponding to operational orders different is like this different, need when user carries out operational order, operational order corresponding to determination operation order.
Indication thing is generally the finger of the user of operating main body in actual applications, user is carrying out the operational order for application program by touch-screen, because the touch-screen in the application can obtain fingerprint, do not need an other fingerprint acquisition device independent of touch-screen to obtain fingerprint, as long as so the finger of user has touched touch-screen, the fingerprint of user just can be obtained by touch-screen, namely user is when carrying out operational order, require that finger contacts with touch-screen owing to carrying out operational order, make while carrying out operational order, the fingerprint of user's finger can be obtained by touch-screen.
Step 303, the fingerprint of the described indication thing with touch-screen contact area and preset fingerprint are compared, when the degree of confidence of described comparison result be more than or equal to first pre-set confidence threshold time, show that described operation information is consistent with default private key, when described operation information is consistent with default private key, perform described operational order.
In the present embodiment, user is while carrying out the enterprising line operate order of touch-screen, fingerprint has been got by touch-screen, and when determining application program and needing finger print identifying, the fingerprint that direct utilization has got carries out certification, and do not need user's input carrying out fingerprint again, greatly simplify the flow process of private key certification.And when described operation information is consistent with default private key, perform described operational order
After the fingerprint having got indication thing, the fingerprint and preset fingerprint of giving directions thing can be compared, preset fingerprint prestores in the electronic device, store the finger print information that user pre-enters, relatively the process of fingerprint can be the process of comparison fingerprint characteristic, namely from the finger print information prestored, obtain the fingerprint characteristic of user, and analyze the fingerprint with the described indication thing of touch-screen contact area, obtain the fingerprint characteristic of giving directions thing, the fingerprint characteristic of giving directions thing and the fingerprint characteristic prestored are compared, in this application, preset fingerprint directly can be inputted by touch-screen, also can be inputted by other fingerprint identification devices, the embodiment of the present application does not limit.
During owing to prestoring fingerprint, the finger abdominal section of whole finger contacts with fingerprint acquisition device by user, and user generally can be needed during preset fingerprint repeatedly to input the fingerprint of whole finger, namely more fingerprint characteristic can be obtained by preset fingerprint, and user with finger when carrying out operational order, general is all contact with touch-screen with the edge of finger, the fingerprint characteristic of preset fingerprint generally will be less than with the fingerprint characteristic of the indication thing of touch-screen contact area like this by what acquire, as long as but user employs the finger identical with during preset fingerprint, the fingerprint characteristic obtained by the fingerprint got is all generally the part in the fingerprint characteristic that obtains of preset fingerprint, thus make the degree of confidence of comparison result can be more than or equal to first to pre-set confidence threshold, first to pre-set confidence threshold can be determined by the use of reality for this, the fingerprint characteristic that such as preset fingerprint obtains has 100 unique points, 30 unique points have been acquired by touch-screen, degree of confidence is 30%, if the confidence threshold that pre-sets of setting is 20%, so show that the fingerprint of this indication thing is the requirement that meets preset fingerprint.
The process of thing fingerprint and preset fingerprint is given directions in certain comparison, can direct more whole fingerprint, and the fingerprint by user's input when carrying out operational order is compared with the fingerprint preset, thus dispenses the process of identification fingerprint characteristic.
By touch-screen identification fingerprint is generally emit beam or infrared light from bottom of screen, relends the contrast of the light helped outside screen, points the image by there will be a fingerprint after to screen.Further fingerprint recognition is carried out by the image of this fingerprint.
Touch-screen identification fingerprint can also install a fibre faceplate above touch-screen, can integrated multiple beams of optical fiber on this block panel, and every root optical fiber all normal to screen is placed.End due to optical fiber is very bright, so after user's finger is pressed on screen, the lines on finger will press the optical fiber of some, and light is radiated on fingerprint by the optical fiber be pressed, generate a fingerprint image clearly, the cameras capture finger print information of bottom of screen.The fingerprint recognition of the application to touch-screen does not limit.
After the fingerprint and preset fingerprint comparison of giving directions thing complete, if degree of confidence meets pre-conditioned, then show that the finger that user carries out operational order is qualified, when namely described operation information is consistent with default private key, the operational order that user carries out just can be performed.
Such as, in smart mobile phone, user clicks the icon of an application program, wish to start this application program, and start this application program and need finger print identifying, user only completes an action clicked, just complete the input of starting operation, while point touching screen, got by touch-screen the fingerprint pointed when user clicks this icon simultaneously, if fingerprint have passed private key certification, application program will directly be started, make user in direct feel, not experience the operation of input fingerprint, and in the prior art, if start this application program to need fingerprint authentication, after clicking the icon of this application program, first can start the interface of an input fingerprint, and require user's input fingerprint again, user only have again have input fingerprint, just can carry out the startup of application program, obviously be very loaded down with trivial details.
In the embodiment of the present application, operation command can need private key certification, also private key certification can not be needed, the operational order such as starting application program by clicking application icon needs private key certification, and click the operational order that application icon carries out dragging for a long time and just can not need private key certification, so after determining operational order, need to determine to perform this operational order the need of private key certification, namely only have passed private key certification, this operational order just can be performed, and determine whether the process needing private key certification, namely determine the process of private key authentication mode, in the present embodiment, the mode of private key certification is exactly finger print identifying, and be obtain fingerprint by touch-screen.
The present embodiment obtains the fingerprint of user by touch-screen, and the fingerprint obtained is exactly that user obtains while carrying out operational order, namely user had both completed the input of operational order by an operational order, also complete the input of fingerprint simultaneously, when making when operation command needs private key certification, the input not needing user independent again fingerprint, thus can operation command faster, the significant operating experience promoting user.
The embodiment of the present application additionally provides a kind of information processing method, as shown in Figure 4, is applied to electronic equipment, and electronic equipment can be mobile phone, panel computer, laptop computer etc., and the method comprises:
Step 401, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 401 is similar to step 101, repeats no more here.
Step 402, when the type of described application program shows that described application program is the application program needing to carry out private key certification, receiving in the process for the operational order of described application program, obtains the vocal print feature of the sound of input;
In the present embodiment, the form of private key certification is the certification of vocal print, namely the private key certification of application programs is realized by sound, and the process obtaining sound vocal print feature is in the process accepting operational order, obtain, namely user is when carrying out operational order for an application program, just obtain the vocal print feature of sound, because user is generally the form knowing private key certification when carrying out private key and arranging, or the different private key authentication modes of application program can be shown by multi-form icon, user is before application programs operates, just be realised that and need to adopt which type of authentication mode to carry out certification, in the present embodiment, operating main body user is in the process of carrying out operational order, just can by speech, make electronic equipment can get the sound of user, and obtain corresponding vocal print feature.
Such as, user is in use smart mobile phone, click is needed to open an application program, the private key form of authentication of this application program is sound authentication, user just can by speech in the process clicking application program, by Speech input in electronic equipment, make electronic equipment while reception operational order, sound can be received.
Step 403, described vocal print feature and default vocal print feature are compared, when the degree of confidence of comparison result be more than or equal to second pre-set confidence threshold time, show that described operation information is consistent with default private key, when described operation information is consistent with default private key, perform described operational order.
After have input sound, obtain the vocal print feature of sound import, the vocal print feature of the sound of input and the vocal print feature preset are compared, and the degree of confidence of comparing result be more than or equal to second pre-set confidence threshold time, show that described operation information and default private key adopt private key certification unanimously, the operational order of user can be performed.
In the embodiment of the present application, the mode of private key certification can also be that finger print identifying and sound authentication are simultaneous, namely user only has and have passed the execution that finger print identifying and sound authentication could realize operational order simultaneously, user needs when carrying out operation information, input fingerprint and sound, carried out the certification of private key, and the process of certification is independent, but require to only have all to have passed finger print identifying and sound authentication, just show to have passed private key certification.
In the present embodiment, can by the mode of sound as private key certification, and, due to the characteristic of sound, make by the application program of Voice Encryption only to be operated by the people with corresponding sound, and while carrying out operational order, sound import, make can carry out for the operational order of application program and the sound of input simultaneously, avoid after having carried out operational order, sound import again, can operation command more fast, and simplify the flow process of carrying out private key certification, improve Consumer's Experience.
The embodiment of the present application additionally provides a kind of information processing method, as shown in Figure 5, is applied to electronic equipment, and electronic equipment can be mobile phone, panel computer, laptop computer etc., and the method comprises:
Step 501, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 502, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the character of input;
In the present embodiment, when needing private key certification determining for the operational order of application program, and when this private key certification is character password, need user's inputting character information again, character password generally comprises the letter, numeral, Chinese character etc. that are inputted by input method, also can by gesture input gesture password in the electronic equipment with touch-screen, the concrete form the application for character password does not limit.
The character of input can be inputted by various input equipment, can pass through touch-screen, keyboard etc., and character password all can require that the character inputted is completely the same with the character password preset, and can realize successful certification.
In the embodiment of the present application, the character of input can carry out after user has carried out operational order, namely user first carries out an operational order for application program, and determine operational order by this action, and performing this operational order is when needing private key certification, user's input character again.
Step 503, compares the character of described input and preset characters password, when the character inputted is identical with preset characters, shows that described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
After the character getting input, the character of input and the character preset can be compared, in completely the same situation, operation command.
Private key authentication mode in the present embodiment is character certification, can be realized the certification of private key by input character.
The embodiment of the present application additionally provides a kind of information processing method, as shown in Figure 6, is applied to electronic equipment, and electronic equipment can be mobile phone, panel computer, laptop computer etc., and the method comprises:
Step 601, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 602, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
Step 601,602 to step 101,102 similar, repeat no more here.
Step 603, judges that whether described operation information consistent with default private key, when described operation information and default private key inconsistent time, do not perform described touch order.
In the present embodiment, operating main body is after the action carrying out operation information, when judging that whether operation information and default private key be consistent, if by judging, information and the default private key of input are inconsistent, so show that described operation information is the password of mistake, also just not by private key certification, and then operational order can not be performed.
By the present embodiment, can after operating main body have input the operation information of mistake, undo order, realizes the cryptoguard of private key certification application programs.
The embodiment of the present application additionally provides a kind of information processing method, as shown in Figure 7, is applied to electronic equipment, and electronic equipment can be mobile phone, panel computer, laptop computer etc., and the method comprises:
Step 701, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 702, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
Step 701,702 to step 101,102 similar, repeat no more here.
Step 703, judges that whether described operation information consistent with default private key, when described operation information and default private key inconsistent time, do not perform described touch order;
Step 701,702,703, to step 601 in a upper embodiment, 602,603 similar, repeat no more here.
Step 704, when described operation information and the inconsistent continuously number of times of default private key exceed predetermined threshold value, locks described electronic equipment.
In the present embodiment, when the operation information number of times that mistake inputs continuously has exceeded a predetermined threshold value, show that operating main body can not correct application programs operate, this operating main body may be the holder of electronics error, and then for safety, electronic equipment is locked.Avoid operating main body to other operations further of electronic equipment, further protect the data security of electronic equipment.
The embodiment of the present application additionally provides a kind of information processing method, as shown in Figure 8, is applied to electronic equipment, and electronic equipment can be mobile phone, panel computer, laptop computer etc., and the method comprises:
Step 801, presets type and the private key authentication mode of described application program, and the icon that display is corresponding with the private key authentication mode of described application program on display module;
In the present embodiment, type and the private key authentication mode of application program can be pre-set, namely arrange application program need private key certification or do not need private key certification, when the certification of needs private key, the concrete authentication mode of application program is set, arrange and adopt finger print identifying, sound authentication or character certification, or other forms of certification.
And for convenience of reminding the mode of operating main body private key certification, the icon corresponding with private key authentication mode can also be presented on display module, such as, if an application program needs to carry out finger print identifying, so just an icon with fingerprint form can be shown, this application program of prompting user needs to carry out finger print identifying, in like manner, if need sound authentication, so just an application icon with sound flag can be demonstrated, this application program of prompting user needs sound authentication, thus when carrying out operational order, sound import.
Step 802, in the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
Step 803, when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
Step 804, judges that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
Step 802,803,804 to step 101,102,103 similar, repeat no more here.
In the present embodiment, by pre-setting type and the private key authentication mode of application program, handled easily main body carries out the input of information, completes the certification of private key.
Present invention also provides a kind of signal conditioning package, as shown in Figure 9, be applied to electronic equipment, described electronic equipment comprises at least one application program, and operating main body operates described application program by described electronic equipment, and described device comprises:
Application Type determination module 901, in the process that receives for the operational order of described application program at described electronic equipment, determine described operational order for the type of application program;
Operation information acquisition module 902, for when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
Judge module 903, for judging that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
Signal conditioning package in the embodiment of the present application can make the application program in electronic equipment can be encrypted, only have passed private key certification, operational order for application program just can be performed, and makes application program be provided with independently safety assurance mechanism, promotes the operating experience of user.
Preferably, described secret key certification comprises the physiological characteristic information certification of operating main body, and described operation information acquisition module, specifically for receiving in the process for the operational order of described application program, obtains the physiological characteristic information of described operating main body.
Preferably, described electronic equipment comprises a touch-screen, and described touch-screen can obtain the fingerprint of the indication thing contacted with touch-screen, and described private key certification comprises finger-print cipher, and described MIM message input module comprises:
Fingerprint acquiring unit, when carrying out operational order for being obtained by described touch-screen and the fingerprint of the described indication thing of touch-screen contact area;
Described judge module specifically for the fingerprint of the described indication thing with touch-screen contact area and preset fingerprint are compared, when the degree of confidence of described comparison result be more than or equal to first pre-set confidence threshold time, show that described operation information is consistent with default private key.
Preferably, described private key certification comprises voiceprint, and described MIM message input module comprises:
Sound acquiring, for obtaining the vocal print feature of the sound of input;
Described judge module specifically for described vocal print feature and default vocal print feature are compared, when the degree of confidence of comparison result be greater than pre-set confidence threshold time, show that described operation information is consistent with default private key.
Preferably, described private key certification comprises the certification of character private key, and described MIM message input module comprises:
Character acquiring unit, for obtaining the character of input;
Described judge module, specifically for the character of described input and preset characters password being compared, when the character inputted is identical with preset characters, shows that described operation information is consistent with default private key.
Preferably, described device also comprises:
When described operation information and default private key inconsistent time, do not perform described touch order.
Preferably, described device also comprises:
Locking module, for when described operation information and the inconsistent continuously number of times of default private key exceed predetermined threshold value, locks described electronic equipment.
Preferably, described device also comprises:
Setting module, for presetting type and the private key authentication mode of described application program, and the icon that display is corresponding with the private key authentication mode of described application program on display module.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment comprising described key element and also there is other identical element.
It should be noted that, the above is only a part of preferred embodiment of technical scheme, those skilled in the art are fully understood or realizes the application, instead of whole embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments.Therefore; based on above embodiment; for those skilled in the art; do not departing from the application's principle, under not making creative work prerequisite, multiple apparent amendment and retouching can also made; by the every other embodiment that these amendments and retouching obtain; can be applied to technical scheme, these do not affect the realization of the application, all should belong to the protection domain of the application.Therefore, the application can not be restricted to these embodiments shown in this article, but will accord with principle disclosed herein and the consistent the widest scope of features of novelty.
Above to present application has been detailed introduction, application herein can specific case be set forth the principle of the application and embodiment, the explanation of above embodiment is just for helping method and the core concept thereof of understanding the application, simultaneously, for one of ordinary skill in the art, according to the thought of the application, all will change in specific embodiments and applications, in sum, this description should not be construed as the restriction to the application.

Claims (16)

1. an information processing method, is applied to electronic equipment, it is characterized in that, described electronic equipment comprises at least one application program, and operating main body operates described application program by described electronic equipment, and described method comprises:
In the process that described electronic equipment receives for the operational order of described application program, determine described operational order for the type of application program;
When the type of described application program shows that described application program is the application program needing to carry out private key certification, obtain the operation information of described operating main body input;
Judge that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, perform described operational order.
2. method according to claim 1, it is characterized in that, described secret key certification comprises the physiological characteristic information certification of operating main body, when the type of described application program shows that described application program is the application program needing to carry out private key certification, the operation information obtaining the input of described operating main body comprises:
Receiving in the process for the operational order of described application program, obtain the physiological characteristic information of described operating main body.
3. method according to claim 2, it is characterized in that, described electronic equipment comprises a touch-screen, described touch-screen can obtain the fingerprint of the indication thing contacted with touch-screen, described private key certification comprises finger-print cipher certification, receiving in the process for the operational order of described application program, the physiological characteristic information obtaining described operating main body comprises:
By described touch-screen obtain carry out operational order time and the fingerprint of described indication thing of touch-screen contact area;
Judge that whether described operation information and default private key be consistent to comprise:
The fingerprint of the described indication thing with touch-screen contact area and preset fingerprint are compared, when the degree of confidence of described comparison result be more than or equal to first pre-set confidence threshold time, show that described operation information is consistent with default private key.
4. method according to claim 2, is characterized in that, described private key certification comprises voiceprint, and receiving in the process for the operational order of described application program, the physiological characteristic information obtaining described operating main body comprises:
Obtain the vocal print feature of the sound of input;
Judge that whether described operation information and default private key be consistent to comprise:
Described vocal print feature and default vocal print feature are compared, when the degree of confidence of comparison result be greater than pre-set confidence threshold time, show that described operation information is consistent with default private key.
5. method according to claim 1, is characterized in that, described private key certification comprises the certification of character private key, is receiving in the process for the operational order of described application program, and the operation information obtaining the input of described operating main body comprises:
Obtain the character of input;
Judge that whether described operation information and default private key be consistent to comprise:
The character of described input and preset characters password are compared, when the character inputted is identical with preset characters, shows that described operation information is consistent with default private key.
6. method according to claim 1, is characterized in that, described method also comprises:
When described operation information and default private key inconsistent time, do not perform described touch order.
7. method according to claim 6, is characterized in that, described method also comprises:
When described operation information and the inconsistent continuously number of times of default private key exceed predetermined threshold value, lock described electronic equipment.
8. method according to claim 1, is characterized in that, described electronic equipment comprises display module, and before described electronic equipment receives the operational order for described application program, described method also comprises:
Preset type and the private key authentication mode of described application program, and the icon that display is corresponding with the private key authentication mode of described application program on display module.
9. a signal conditioning package, is applied to electronic equipment, it is characterized in that, described electronic equipment comprises at least one application program, and operating main body operates described application program by described electronic equipment, and described device comprises:
Application Type determination module, in the process that receives for the operational order of described application program at described electronic equipment, determine described operational order for the type of application program;
Operation information acquisition module, for when the type of described application program shows that described application program is the application program needing to carry out private key certification, obtains the operation information of described operating main body input;
Judge module, for judging that whether described operation information is consistent with default private key, when described operation information is consistent with default private key, performs described operational order.
10. device according to claim 9, it is characterized in that, described secret key certification comprises the physiological characteristic information certification of operating main body, described operation information acquisition module, specifically for receiving in the process for the operational order of described application program, obtains the physiological characteristic information of described operating main body.
11. devices according to claim 10, is characterized in that, described electronic equipment comprises a touch-screen, and described touch-screen can obtain the fingerprint of the indication thing contacted with touch-screen, and described private key certification comprises finger-print cipher certification, and described MIM message input module comprises:
Fingerprint acquiring unit, when carrying out operational order for being obtained by described touch-screen and the fingerprint of the described indication thing of touch-screen contact area;
Described judge module specifically for the fingerprint of the described indication thing with touch-screen contact area and preset fingerprint are compared, when the degree of confidence of described comparison result be more than or equal to first pre-set confidence threshold time, show that described operation information is consistent with default private key.
12. devices according to claim 10, is characterized in that, described private key certification comprises voiceprint, and described MIM message input module comprises:
Sound acquiring, for obtaining the vocal print feature of the sound of input;
Described judge module specifically for described vocal print feature and default vocal print feature are compared, when the degree of confidence of comparison result be greater than pre-set confidence threshold time, show that described operation information is consistent with default private key.
13. devices according to claim 9, is characterized in that, described private key certification comprises the certification of character private key, and described MIM message input module comprises:
Character acquiring unit, for obtaining the character of input;
Described judge module, specifically for the character of described input and preset characters password being compared, when the character inputted is identical with preset characters, shows that described operation information is consistent with default private key.
14. devices according to claim 9, is characterized in that, described device also comprises:
When described operation information and default private key inconsistent time, do not perform described touch order.
15. devices according to claim 14, is characterized in that, described device also comprises:
Locking module, for when described operation information and the inconsistent continuously number of times of default private key exceed predetermined threshold value, locks described electronic equipment.
16. devices according to claim 9, it is characterized in that, described electronic equipment comprises display module, described device also comprises:
Setting module, for presetting type and the private key authentication mode of described application program, and the icon that display is corresponding with the private key authentication mode of described application program on described display module.
CN201410113834.3A 2014-03-25 2014-03-25 Information processing method and device Active CN104951677B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410113834.3A CN104951677B (en) 2014-03-25 2014-03-25 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410113834.3A CN104951677B (en) 2014-03-25 2014-03-25 Information processing method and device

Publications (2)

Publication Number Publication Date
CN104951677A true CN104951677A (en) 2015-09-30
CN104951677B CN104951677B (en) 2021-01-15

Family

ID=54166330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410113834.3A Active CN104951677B (en) 2014-03-25 2014-03-25 Information processing method and device

Country Status (1)

Country Link
CN (1) CN104951677B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653172A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Operation method and system
CN106022053A (en) * 2016-05-26 2016-10-12 深圳市金立通信设备有限公司 Unlocking method and device
CN106815508A (en) * 2015-11-27 2017-06-09 小米科技有限责任公司 Mobile device and its screen module, fingerprint verification method, device and electronic equipment
CN107071769A (en) * 2017-04-25 2017-08-18 努比亚技术有限公司 The safety certification device and method of synchronizing information
CN109460649A (en) * 2018-11-08 2019-03-12 维沃移动通信有限公司 A kind of document handling method and terminal device
CN113282346A (en) * 2017-03-29 2021-08-20 上海耕岩智能科技有限公司 Method, device and storage medium for controlling application program based on fingerprint identification

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
EP1826700A1 (en) * 2002-11-06 2007-08-29 Fujitsu Limited Security and authentication of information processing apparatus
US20090041308A1 (en) * 2007-08-08 2009-02-12 Acer Incorporated Object execution method and method with bio-characteristic recognition
CN101673329A (en) * 2009-10-16 2010-03-17 宏达国际电子股份有限公司 Establishment method of biometric data, electronic device and computer program product thereof
CN102622549A (en) * 2012-03-20 2012-08-01 天津书生软件技术有限公司 Electronic seal implementation system and method
CN102880820A (en) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 Method for accessing application program of mobile terminal and mobile terminal
CN103136462A (en) * 2011-12-05 2013-06-05 联想(北京)有限公司 Method and system of password authentication
CN103440445A (en) * 2013-08-14 2013-12-11 深圳市亚略特生物识别科技有限公司 Electronic equipment unlocking control method and system

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1826700A1 (en) * 2002-11-06 2007-08-29 Fujitsu Limited Security and authentication of information processing apparatus
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
US20090041308A1 (en) * 2007-08-08 2009-02-12 Acer Incorporated Object execution method and method with bio-characteristic recognition
CN101673329A (en) * 2009-10-16 2010-03-17 宏达国际电子股份有限公司 Establishment method of biometric data, electronic device and computer program product thereof
CN103136462A (en) * 2011-12-05 2013-06-05 联想(北京)有限公司 Method and system of password authentication
CN102622549A (en) * 2012-03-20 2012-08-01 天津书生软件技术有限公司 Electronic seal implementation system and method
CN102880820A (en) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 Method for accessing application program of mobile terminal and mobile terminal
CN103440445A (en) * 2013-08-14 2013-12-11 深圳市亚略特生物识别科技有限公司 Electronic equipment unlocking control method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815508A (en) * 2015-11-27 2017-06-09 小米科技有限责任公司 Mobile device and its screen module, fingerprint verification method, device and electronic equipment
CN106815508B (en) * 2015-11-27 2021-02-09 小米科技有限责任公司 Mobile equipment, screen module of mobile equipment, fingerprint authentication method and device and electronic equipment
CN105653172A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Operation method and system
CN106022053A (en) * 2016-05-26 2016-10-12 深圳市金立通信设备有限公司 Unlocking method and device
CN106022053B (en) * 2016-05-26 2019-07-12 深圳市金立通信设备有限公司 A kind of unlocking method and device
CN113282346A (en) * 2017-03-29 2021-08-20 上海耕岩智能科技有限公司 Method, device and storage medium for controlling application program based on fingerprint identification
CN107071769A (en) * 2017-04-25 2017-08-18 努比亚技术有限公司 The safety certification device and method of synchronizing information
CN109460649A (en) * 2018-11-08 2019-03-12 维沃移动通信有限公司 A kind of document handling method and terminal device

Also Published As

Publication number Publication date
CN104951677B (en) 2021-01-15

Similar Documents

Publication Publication Date Title
CN104951677A (en) Information processing method and device
US9262616B2 (en) Simplified multi-factor authentication
WO2017020427A1 (en) Application program access method and terminal
US8618911B2 (en) Simplified biometric character sequence entry
EP3528157B1 (en) Fingerprint recognition-based application starting method and device
CN106445363B (en) Payment interface starting method and mobile terminal
CN103795868A (en) Mobile terminal screen unlocking method and device and mobile terminal
CN103488918A (en) Application encrypting method and device for intelligent terminal
CN105701381A (en) Method and device for starting application and electronic equipment
CN106372479A (en) Mobile terminal and method of controlling the same
CN108664279B (en) Method and device for synchronously starting applications based on fingerprint identification
KR101576557B1 (en) Apparatus for anti-hacking fingerprint recognition means of cell-phone and surface means and method of the same
CA2686691C (en) Simplified multi-factor authentication
CN105630318A (en) Operation interaction method and device
CN110968355A (en) Application program starting method and device and terminal
CN109271770A (en) Auth method, equipment and the storage medium of smartwatch
CN107770378A (en) A kind of method based on finger print information unblock mobile phone
CN110795710B (en) Unlocking method of electronic device, electronic device and computer-readable storage medium
EP2219190A1 (en) Multi-level data storage
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
CN105160275A (en) Private data management equipment
CN111753288B (en) Application program function setting method and device, electronic equipment and storage medium
KR102259554B1 (en) Computer security device and method using biometrics
CN112699388B (en) Encryption method and device
US20220300590A1 (en) Method for protecting software applications of electronic computing devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant