CN104951677B - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN104951677B
CN104951677B CN201410113834.3A CN201410113834A CN104951677B CN 104951677 B CN104951677 B CN 104951677B CN 201410113834 A CN201410113834 A CN 201410113834A CN 104951677 B CN104951677 B CN 104951677B
Authority
CN
China
Prior art keywords
application program
private key
preset
operation command
operation information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410113834.3A
Other languages
Chinese (zh)
Other versions
CN104951677A (en
Inventor
纪大为
刘伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410113834.3A priority Critical patent/CN104951677B/en
Publication of CN104951677A publication Critical patent/CN104951677A/en
Application granted granted Critical
Publication of CN104951677B publication Critical patent/CN104951677B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application discloses an information processing method, which is applied to electronic equipment, wherein the electronic equipment comprises at least one application program, and an operation subject can operate the application program through the electronic equipment, and the method comprises the following steps: determining the type of an application program targeted by an operation command in the process of receiving the operation command for the application program by the electronic equipment; when the type of the application program indicates that the application program is the application program needing private key authentication, acquiring operation information input by the operation main body; and judging whether the operation information is consistent with a preset private key or not, and executing the operation command when the operation information is consistent with the preset private key. The application program in the electronic equipment can be encrypted, and the operation command aiming at the application program can be executed only through the private key authentication, so that the application program has an independent safety guarantee mechanism, and the operation experience of a user is improved.

Description

Information processing method and device
Technical Field
The present application relates to the field of information processing, and in particular, to an information processing method and apparatus.
Background
With the wider application range of the intelligent mobile terminal, the use security of the mobile terminal is becoming more and more prominent, the mobile terminal stores various privacy messages related to the user, and the messages are stored in different programs, for example, the call record of the user is stored in a call application program, the information of a contact person is stored in a contact person application program, and the user does not want various information stored in the application programs to be known by others, so as to prevent the device from being lost or borrowed by others to cause personal information leakage.
Therefore, a user can unlock and encrypt the device, and the device can be unlocked only when a correct unlocking password is input, but the unlocking process can only be performed on the device, and if the device is unlocked, all application programs in the device are in a state of being capable of being opened, the possibility of information leakage still exists.
Disclosure of Invention
In view of this, embodiments of the present application provide an information processing method, which performs private key authentication on an application program in an electronic device, so as to fully ensure the security of the application program.
In order to achieve the above purpose, the technical solution provided by the present application is as follows:
an information processing method applied to an electronic device, wherein the electronic device comprises at least one application program, and an operation subject can operate the application program through the electronic device, the method comprising the following steps:
determining the type of an application program targeted by an operation command in the process of receiving the operation command for the application program by the electronic equipment;
when the type of the application program indicates that the application program is the application program needing private key authentication, acquiring operation information input by the operation main body;
and judging whether the operation information is consistent with a preset private key or not, and executing the operation command when the operation information is consistent with the preset private key.
Preferably, the key authentication includes physiological characteristic information authentication of an operation subject, and when the type of the application program indicates that the application program is an application program that needs private key authentication, acquiring the operation information input by the operation subject includes:
and acquiring physiological characteristic information of the operation subject in the process of receiving the operation command aiming at the application program.
Preferably, the electronic device includes a touch screen, the touch screen can acquire a fingerprint of a pointer object in contact with the touch screen, the private key authentication includes a fingerprint password, and in the process of receiving an operation command for the application program, acquiring the physiological characteristic information of the operation subject includes:
acquiring fingerprints of the point objects in a contact area with the touch screen when an operation command is carried out through the touch screen;
judging whether the operation information is consistent with a preset private key comprises the following steps:
and comparing the fingerprint of the pointer object in the contact area with the touch screen with a preset fingerprint, and when the confidence coefficient of the comparison result is greater than or equal to a first preset confidence coefficient threshold value, indicating that the operation information is consistent with a preset private key.
Preferably, the private key authentication includes voiceprint authentication, and the acquiring the physiological characteristic information of the operation subject during the process of receiving the operation command for the application program includes:
acquiring the voiceprint characteristics of input sound;
judging whether the operation information is consistent with a preset private key comprises the following steps:
and comparing the voiceprint features with preset voiceprint features, and when the confidence of the comparison result is greater than a preset confidence threshold, indicating that the operation information is consistent with a preset private key.
Preferably, the private key authentication includes character private key authentication, and in the process of receiving the operation command for the application program, acquiring the operation information input by the operation subject includes:
acquiring an input character;
judging whether the operation information is consistent with a preset private key comprises the following steps:
and comparing the input character with a preset character password, and when the input character is the same as the preset character, indicating that the operation information is consistent with a preset private key.
Preferably, the method further comprises:
and when the operation information is inconsistent with a preset private key, the touch command is not executed.
Preferably, the method further comprises:
and when the continuous inconsistent times of the operation information and a preset private key exceed a preset threshold value, locking the electronic equipment.
Preferably, the electronic device includes a display module, and before the electronic device receives an operation command for the application program, the method further includes:
the type and the private key authentication mode of the application program are preset, and an icon corresponding to the private key authentication mode of the application program is displayed on a display module.
The present application further provides an information processing apparatus applied to an electronic device, where the electronic device includes at least one application program, and an operation subject can operate the application program through the electronic device, the apparatus includes:
the electronic equipment comprises an application program type determining module, a judging module and a judging module, wherein the application program type determining module is used for determining the type of an application program for which an operation command is directed in the process of receiving the operation command for the application program by the electronic equipment;
the operation information acquisition module is used for acquiring the operation information input by the operation main body when the type of the application program indicates that the application program is the application program which needs to be subjected to private key authentication;
and the judging module is used for judging whether the operation information is consistent with a preset private key or not, and executing the operation command when the operation information is consistent with the preset private key.
Preferably, the key authentication includes physiological characteristic information authentication of an operation subject, and the operation information obtaining module is specifically configured to obtain the physiological characteristic information of the operation subject in a process of receiving an operation command for the application program.
Preferably, the electronic device includes a touch screen, the touch screen can acquire a fingerprint of a pointer object in contact with the touch screen, the private key authentication includes a fingerprint password, and the information input module includes:
the fingerprint acquisition unit is used for acquiring the fingerprint of the pointer object in the contact area with the touch screen when an operation command is carried out through the touch screen;
the judgment module is specifically used for comparing the fingerprint of the pointer object in the contact area with the touch screen with a preset fingerprint, and when the confidence of the comparison result is greater than or equal to a first preset confidence threshold, the operation information is consistent with a preset private key.
Preferably, the private key authentication includes voiceprint authentication, and the information input module includes:
a sound acquisition unit for acquiring a voiceprint feature of an input sound;
the judging module is specifically configured to compare the voiceprint features with preset voiceprint features, and when a confidence of a comparison result is greater than a preset confidence threshold, indicate that the operation information is consistent with a preset private key.
Preferably, the private key authentication includes character private key authentication, and the information input module includes:
a character acquisition unit for acquiring an input character;
the judgment module is specifically used for comparing the input character with a preset character password, and when the input character is the same as the preset character, the operation information is consistent with a preset private key.
Preferably, the apparatus further comprises:
and when the operation information is inconsistent with a preset private key, the touch command is not executed.
Preferably, the apparatus further comprises:
and the locking module is used for locking the electronic equipment when the continuous inconsistent times of the operation information and a preset private key exceed a preset threshold value.
Preferably, the electronic device includes a display module, and the apparatus further includes:
and the setting module is used for presetting the type and the private key authentication mode of the application program and displaying an icon corresponding to the private key authentication mode of the application program on the display module.
Different from the prior art, the method and the device for processing the operation command of the electronic device determine the type of the application program to which the operation command is directed in the process of receiving the operation command of the application program by the electronic device, acquire the operation information input by the operation main body when the type of the application program indicates that the application program is the application program which needs to be authenticated by a private key, judge whether the operation information is consistent with a preset private key, and execute the operation command when the operation information is consistent with the preset private key. The application program in the electronic equipment can be encrypted, and the operation command aiming at the application program can be executed only through the private key authentication, so that the application program has an independent safety guarantee mechanism, and the operation experience of a user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 5 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 6 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 7 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 8 is a schematic flowchart of another information processing method according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
An embodiment of the present application provides an information processing method, as shown in fig. 1, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, the electronic device includes at least one application program, an operation subject may operate the application program through the electronic device, and types of the application program include that private key authentication is required and private key authentication is not required, and the method includes:
step 101, in the process that the electronic equipment receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
the electronic device generally includes at least one application program, different application programs can perform different tasks, a user can complete different functions by starting different application programs, the user can also perform different operation commands on the application program, for example, starting the application program, deleting the application program or moving the position of the application program, and the operation commands for the application program can be in various forms. The most intuitive way for the application program to be displayed in the electronic equipment before the user is to display an application program icon on a display of the electronic equipment, and the user can perform different types of operations through the application program icon displayed on the display.
For example, in a smart phone with a touch screen, an icon corresponding to an application program needs to be clicked on the touch screen when the application program is started, and the application program can be moved by dragging the icon of the application program after the icon of the application program needs to be clicked for a period of time if the icon of the application program needs to be moved; when the computer operates aiming at the application program, the application program can be started by double clicking the icon of the application program, or the icon of the application program can be dragged by clicking the icon of the application program without dropping, and the like.
In the embodiment of the present application, the operation command for the application may be directly performed on the icon of the application, but it is also possible to operate the application in other manners, for example, another management program operates a certain application, for example, uninstalling and data clearing of the application are performed, and the specific operation type of the application is not limited in the embodiment of the present application.
The electronic equipment determines the type of the application program in the process of receiving the operation command aiming at the application program, and determines whether the application program aiming at the operation command is the application program needing private key authentication or the application program not needing private key authentication. Meanwhile, when the application program is determined to be the application program needing private key authentication, the specific form of the private key authentication is determined.
The application program which needs to be authenticated by the private key can be authenticated by the private key when the operation command is carried out, namely, a user carries out an operation command on one application program, if the application program is the application program which needs to be authenticated by the private key, the operation command needs to be authenticated by the private key when being executed, and the operation command can take effect only after the private key is authenticated. And when the application program needing private key authentication determines that private key authentication is needed, the specific mode of private key authentication is determined.
In the embodiment of the present application, the operation subject is generally a user who holds the electronic device.
102, when the type of the application program indicates that the application program is the application program which needs to be subjected to private key authentication, acquiring operation information input by the operation main body;
after the application program targeted by the operation command is determined to be the application program which needs to be authenticated by the private key, the further execution of the operation command needs to pass the private key authentication, and the process of the private key authentication is a process of comparing the operation information input by the operation subject with a preset private key, so that the operation information input by the operation subject needs to be obtained first.
And 103, judging whether the operation information is consistent with a preset private key or not, and executing the operation command when the operation information is consistent with the preset private key.
After the operation main body inputs information, whether the operation information is consistent with a preset private key or not needs to be judged, namely, the operation information is compared with the preset private key, and after the operation information is consistent with the preset private key, the operation information of the user is shown to be a correct private key, namely, the operation command aiming at the application program can be executed after the private key authentication is passed.
In this embodiment of the present application, the process of obtaining the input operation information may be input by the user after determining the private key authentication manner, that is, the user performs an operation command for the application program, and after performing the operation command, needs to perform an operation information input action, and performs the private key authentication through the operation information.
In another case, the operation information input by the user may be performed simultaneously with the operation command, that is, the user inputs the operation information while performing the operation command, and the user does not need to perform the operation information input again, so that the process of the private key authentication is simpler and more convenient.
The method comprises the steps that in the process that the electronic equipment receives an operation command for the application program, the type of the application program to which the operation command is directed is determined, when the type of the application program indicates that the application program is the application program needing private key authentication, operation information input by an operation main body is obtained, whether the operation information is consistent with a preset private key or not is judged, and when the operation information is consistent with the preset private key, the operation command is executed. The application program in the electronic equipment can be encrypted, and the operation command aiming at the application program can be executed only through the private key authentication, so that the application program has an independent safety guarantee mechanism, and the operation experience of a user is improved.
The present application further provides an information processing method, as shown in fig. 2, applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 201, in the process that the electronic device receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 201 is similar to step 101 and will not be described herein.
Step 202, when the type of the application program indicates that the application program is an application program which needs to be subjected to private key authentication, acquiring physiological characteristic information of the operation subject in the process of receiving an operation command for the application program;
in this embodiment, when the type of the application indicates that the application is an application that needs to be authenticated by a private key, the operation information input by the operation subject is physiological characteristic information of the operation subject, and the operation of acquiring the physiological characteristic information is acquired during the operation command, that is, the user performs the operation command for an application, and during the operation command, the physiological characteristic information of the operation subject is acquired.
For example, in a smart phone, an operating subject performs an operation command for an application program through a touch screen of the smart phone, and in the process of performing the operation command through the touch screen, physiological characteristic information of the operating subject is acquired.
Step 203, judging whether the operation information is consistent with a preset private key, and executing the operation command when the operation information is consistent with the preset private key.
The preset private key is also preset physiological characteristic information, after the physiological characteristic information of the operation subject is input, the process of judging whether the physiological characteristic information is consistent with the preset private key is to compare the input physiological characteristic information with the preset physiological characteristic information, and under the condition that the physiological characteristic information is consistent with the preset physiological characteristic information, the operation information is authenticated by the private key, and then the operation command aiming at the application program can be executed.
In this embodiment, the operation information input by the operation subject is the physiological characteristic information, and the physiological characteristic information is performed while the operation command is performed, so that the physiological characteristic information is also input by the operation subject in the process of performing the operation command for the application program, and the information is input again without the need of performing the private key authentication on the application program, thereby simplifying the input process of the information in the private key authentication process and improving the user experience.
An embodiment of the present application further provides an information processing method, as shown in fig. 3, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 301, in the process that the electronic device receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 301 is similar to step 201 and will not be described herein.
Step 302, when the type of the application program indicates that the application program is an application program which needs to be subjected to private key authentication, acquiring a fingerprint of the pointer object in a contact area with a touch screen when an operation command is carried out through the touch screen;
the electronic equipment is provided with the touch screen, the touch screen can acquire the fingerprint of a point object in contact with the touch screen, in the embodiment of the application, the touch screen of the electronic equipment can directly acquire the fingerprint of the point object, and a fingerprint identification device independent of the touch screen is not needed to separately identify the fingerprint. When a user clicks the touch screen, the user can acquire the clicked fingerprint through the touch screen.
The user can perform an operation command for the application program on the touch screen, for example, click an application program icon, and then the operation command corresponding to the clicked operation command starts the application program, and for example, if the application program icon is clicked for a long time, the position of the application program icon can be changed, or the application program icon can be directly dragged to the position of the recycle bin to delete or uninstall the program, so that the operation commands corresponding to different operation commands are different, and the operation command corresponding to the operation command needs to be determined when the user performs the operation command.
The finger point object is generally a finger of a user operating a main body in practical application, and the user performs an operation command for an application program through a touch screen.
Step 303, comparing the fingerprint of the pointer object in the touch area with a preset fingerprint, when the confidence of the comparison result is greater than or equal to a first preset confidence threshold, indicating that the operation information is consistent with a preset private key, and when the operation information is consistent with the preset private key, executing the operation command.
In this embodiment, when the user performs an operation command on the touch screen, the touch screen acquires the fingerprint, and when it is determined that the application program needs fingerprint authentication, the acquired fingerprint is directly used for authentication without inputting the fingerprint again by the user, so that the process of private key authentication is greatly simplified. And when the operation information is consistent with a preset private key, executing the operation command
After the fingerprint of the pointer is acquired, the fingerprint of the pointer can be compared with a preset fingerprint, the preset fingerprint is stored in electronic equipment in advance, fingerprint information input by a user in advance is stored, the process of comparing the fingerprint can be a process of comparing fingerprint characteristics, namely, the fingerprint characteristics of the user are obtained from the prestored fingerprint information, the fingerprint of the pointer in a contact area with a touch screen is analyzed, the fingerprint characteristics of the pointer are obtained, and the fingerprint characteristics of the pointer are compared with the prestored fingerprint characteristics.
When the fingerprint is stored in advance, the user generally contacts the web part of the whole finger with the fingerprint acquisition device, and generally needs to input the fingerprint of the whole finger for many times when the fingerprint is preset, that is, more fingerprint features can be obtained by presetting the fingerprint, and when the user uses the finger to carry out an operation command, the edge of the finger is generally contacted with the touch screen, so that the fingerprint features of the point object in the contact area with the touch screen obtained by acquisition are generally less than the fingerprint features of the preset fingerprint, but as long as the user uses the same finger as the preset fingerprint, the fingerprint features obtained by the acquired fingerprint are generally part of the fingerprint features obtained by the preset fingerprint, so that the confidence of the comparison result can be more than or equal to a first preset confidence threshold, which can be determined by actual use, for example, the fingerprint features obtained by presetting the fingerprint have 100 feature points, 30 feature points are obtained by the touch screen, the confidence coefficient is 30%, and if the preset confidence coefficient threshold is set to be 20%, the fingerprint of the pointer is shown to meet the requirement of the preset fingerprint.
Of course, the whole fingerprint can be directly compared in the process of comparing the fingerprint of the pointing object with the preset fingerprint, namely, the fingerprint input by the user in the operation command is compared with the preset fingerprint, so that the process of identifying the fingerprint characteristic is omitted.
The fingerprint identification through the touch screen generally emits light or infrared light from the bottom of the screen, and then by means of contrast of the light outside the screen, an image of the fingerprint appears after a finger presses the screen. Further fingerprint identification is performed by means of the image of the fingerprint.
The touch screen can also be provided with an optical fiber panel above the touch screen, and the panel can be integrated with a plurality of optical fibers, and each optical fiber is arranged perpendicular to the screen. Because the tail ends of the optical fibers are very bright, after a user presses a finger on the screen, the grains on the finger press a certain number of optical fibers, the pressed optical fibers irradiate light on the fingerprint to generate a clear fingerprint image, and the camera at the bottom of the screen captures fingerprint information. The fingerprint recognition of the touch screen is not limited in the present application.
After the fingerprint of the finger point object is compared with the preset fingerprint, if the confidence coefficient meets the preset condition, the finger of the user for carrying out the operation command is shown to be in accordance with the condition, namely when the operation information is consistent with the preset private key, the operation command carried out by the user can be executed.
In a smart phone, for example, a user clicks on an icon for an application, wishes to launch the application, the fingerprint authentication is needed for starting the application program, the user only completes one click action and completes the input of the starting action, meanwhile, the fingerprint of the finger when the user clicks the icon is acquired by the touch screen while the touch screen is clicked, if the fingerprint passes the private key authentication, the application is directly started, so that the user does not feel the operation of inputting the fingerprint in a visual sense, whereas in the prior art, if fingerprint verification is required for starting the application, after clicking the icon of the application program, an interface for inputting the fingerprint is started first, and the user is required to input the fingerprint again, so that the user can start the application program only after inputting the fingerprint again, and the method is obviously very complicated.
In the embodiment of the present application, private key authentication may be required or may not be required for executing the operation command, for example, the operation command for starting the application by clicking the application icon requires private key authentication, and the operation command for dragging by clicking the application icon for a long time may not require private key authentication, so after the operation command is determined, it is determined whether to execute the operation command requires private key authentication, that is, only the operation command passes the private key authentication, the operation command may be executed, and a process of determining whether to require private key authentication, that is, a process of determining a private key authentication mode is determined.
In the embodiment, the fingerprint of the user is acquired through the touch screen, and the acquired fingerprint is acquired while the user performs the operation command, that is, the user completes the input of the operation command through one operation command and also completes the input of the fingerprint, so that when the operation command is executed under the condition that the private key authentication is required, the user does not need to independently input the fingerprint once again, the operation command can be executed more quickly, and the operation experience of the user is remarkably improved.
An embodiment of the present application further provides an information processing method, as shown in fig. 4, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 401, in the process that the electronic device receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 401 is similar to step 101 and will not be described herein.
Step 402, when the type of the application program indicates that the application program is an application program which needs to be subjected to private key authentication, acquiring voiceprint characteristics of input sound in the process of receiving an operation command for the application program;
in this embodiment, the form of the private key authentication is voiceprint authentication, that is, the private key authentication of the application program is realized by sound, and the process of acquiring the voiceprint characteristics of the sound is acquired in the process of accepting the operation command, that is, when the user performs the operation command for an application program, the voiceprint characteristics of the sound are acquired, because the user generally knows the form of the private key authentication when performing the private key setting, or different private key authentication manners of the application program can be indicated by icons in different forms, and the user knows what authentication manner to use for authentication before performing the operation on the application program.
For example, when a user uses a smart phone, the user needs to click to open an application program, the private key authentication form of the application program is voice authentication, and the user can input voice into the electronic device by speaking in the process of clicking the application program, so that the electronic device can receive the voice while receiving an operation command.
Step 403, comparing the voiceprint features with preset voiceprint features, when the confidence of the comparison result is greater than or equal to a second preset confidence threshold, indicating that the operation information is consistent with a preset private key, and when the operation information is consistent with the preset private key, executing the operation command.
After the voice is input, obtaining the voiceprint characteristics of the input voice, comparing the voiceprint characteristics of the input voice with the preset voiceprint characteristics, and when the confidence of the comparison result is greater than or equal to a second preset confidence threshold, indicating that the operation information and the preset private key pass through the private key authentication in a consistent manner, so that the operation command of the user can be executed.
In the embodiment of the present application, the private key authentication mode may also be that fingerprint authentication and voice authentication exist simultaneously, that is, the user can only execute the operation command after passing through the fingerprint authentication and the voice authentication simultaneously, and the user needs to input the fingerprint and the voice to complete the authentication of the private key when performing the operation information.
In this embodiment, the voice can be used as the private key authentication method, and due to the characteristics of the voice, the application program encrypted by the voice can only be operated by a person with the corresponding voice, and the voice is input while the operation command is performed, so that the operation command for the application program and the input voice can be performed simultaneously, thereby avoiding inputting the voice again after the operation command is performed, performing the operation command more quickly, simplifying the process of performing the private key authentication, and improving the user experience.
An embodiment of the present application further provides an information processing method, as shown in fig. 5, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 501, in the process that the electronic device receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 502, when the type of the application program indicates that the application program is the application program which needs to be subjected to private key authentication, acquiring input characters;
in this embodiment, when it is determined that an operation command for an application needs private key authentication, and the private key authentication is a character password, a user needs to input character information again, the character password generally includes letters, numbers, chinese characters, and the like input by an input method, and a gesture password may also be input by a gesture in an electronic device having a touch screen, which is not limited to the specific form of the character password.
The input characters can be input through various input devices, a touch screen, a keyboard and the like, and the character password can require that the input characters are completely consistent with the preset character password, so that successful authentication can be realized.
In the embodiment of the present application, the input character may be input after the user performs an operation command, that is, when the user performs an operation command for the application program first, and determines the operation command through the action, and the execution of the operation command is performed when the private key authentication is required, the user inputs the character again.
Step 503, comparing the input character with a preset character password, when the input character is the same as the preset character, indicating that the operation information is consistent with a preset private key, and when the operation information is consistent with the preset private key, executing the operation command.
After the input characters are acquired, the input characters can be compared with preset characters, and the operation command is executed under the condition of complete consistency.
The private key authentication mode in this embodiment is character authentication, and the authentication of the private key can be realized by inputting characters.
An embodiment of the present application further provides an information processing method, as shown in fig. 6, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 601, in the process that the electronic equipment receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 602, when the type of the application program indicates that the application program is an application program that needs to be authenticated by a private key, acquiring operation information input by the operation subject;
steps 601 and 602 are similar to steps 101 and 102, and are not described again here.
Step 603, judging whether the operation information is consistent with a preset private key, and if the operation information is not consistent with the preset private key, not executing the touch command.
In this embodiment, after the operation of the operation information, when determining whether the operation information is consistent with the preset private key, if the input information is inconsistent with the preset private key by the determination, it indicates that the operation information is an incorrect password, and the operation information cannot pass through the private key authentication, so that the operation command cannot be executed.
By the embodiment, after the operation body inputs wrong operation information, the operation command is not executed, and password protection of the application program by private key authentication is realized.
An embodiment of the present application further provides an information processing method, as shown in fig. 7, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 701, in the process that the electronic device receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 702, when the type of the application program indicates that the application program is an application program which needs to be subjected to private key authentication, acquiring operation information input by the operation main body;
steps 701 and 702 are similar to steps 101 and 102, and are not described again here.
Step 703, judging whether the operation information is consistent with a preset private key, and when the operation information is inconsistent with the preset private key, not executing the touch command;
steps 701, 702, and 703 are similar to steps 601, 602, and 603 in the previous embodiment, and are not repeated here.
Step 704, when the number of times of continuous inconsistency between the operation information and a preset private key exceeds a preset threshold, locking the electronic device.
In this embodiment, when the number of times of continuous incorrect input of the operation information exceeds a preset threshold, it indicates that the operation subject, which may be a wrong holder of the electronic device, cannot correctly operate the application program, and the electronic device is locked for safety. Further other operations of the electronic equipment by the operation main body are avoided, and the data security of the electronic equipment is further protected.
An embodiment of the present application further provides an information processing method, as shown in fig. 8, which is applied to an electronic device, where the electronic device may be a mobile phone, a tablet computer, a portable computer, and the like, and the method includes:
step 801, presetting the type and the private key authentication mode of the application program, and displaying an icon corresponding to the private key authentication mode of the application program on a display module;
in this embodiment, the type and the private key authentication mode of the application program may be preset, that is, whether the application program needs private key authentication or does not need private key authentication is set, and in the case that the private key authentication is needed, the specific authentication mode of the application program is set, and fingerprint authentication, voice authentication, or character authentication, or other forms of authentication are set.
And in order to conveniently remind the operation subject of the private key authentication mode, an icon corresponding to the private key authentication mode can be displayed on the display module, for example, if an application program needs to perform fingerprint authentication, an icon with a fingerprint form can be displayed to prompt a user that the application program needs to perform fingerprint authentication, and similarly, if voice authentication is needed, an application program icon with a voice mark can be displayed to prompt the user that the application program needs to perform voice authentication, so that voice is input when an operation command is performed.
Step 802, in the process that the electronic device receives an operation command for the application program, determining the type of the application program for which the operation command is directed;
step 803, when the type of the application program indicates that the application program is an application program which needs to be authenticated by a private key, acquiring operation information input by the operation body;
step 804, judging whether the operation information is consistent with a preset private key, and executing the operation command when the operation information is consistent with the preset private key.
Steps 802, 803, 804 are similar to steps 101, 102, 103 and are not described again here.
In this embodiment, by presetting the type of the application program and the authentication mode of the private key, the operation subject can conveniently input information, and the authentication of the private key is completed.
The present application further provides an information processing apparatus, as shown in fig. 9, applied to an electronic device, where the electronic device includes at least one application program, and an operation subject may operate the application program through the electronic device, the apparatus including:
an application type determining module 901, configured to determine, in a process that the electronic device receives an operation command for the application, a type of the application to which the operation command is directed;
an operation information obtaining module 902, configured to obtain operation information input by the operation subject when the type of the application indicates that the application is an application that needs to perform private key authentication;
the determining module 903 is configured to determine whether the operation information is consistent with a preset private key, and execute the operation command when the operation information is consistent with the preset private key.
The information processing device in the embodiment of the application can enable the application program in the electronic equipment to be encrypted, and the operation command for the application program can be executed only through private key authentication, so that the application program has an independent safety guarantee mechanism, and the operation experience of a user is improved.
Preferably, the key authentication includes physiological characteristic information authentication of an operation subject, and the operation information obtaining module is specifically configured to obtain the physiological characteristic information of the operation subject in a process of receiving an operation command for the application program.
Preferably, the electronic device includes a touch screen, the touch screen can acquire a fingerprint of a pointer object in contact with the touch screen, the private key authentication includes a fingerprint password, and the information input module includes:
the fingerprint acquisition unit is used for acquiring the fingerprint of the pointer object in the contact area with the touch screen when an operation command is carried out through the touch screen;
the judgment module is specifically used for comparing the fingerprint of the pointer object in the contact area with the touch screen with a preset fingerprint, and when the confidence of the comparison result is greater than or equal to a first preset confidence threshold, the operation information is consistent with a preset private key.
Preferably, the private key authentication includes voiceprint authentication, and the information input module includes:
a sound acquisition unit for acquiring a voiceprint feature of an input sound;
the judging module is specifically configured to compare the voiceprint features with preset voiceprint features, and when a confidence of a comparison result is greater than a preset confidence threshold, indicate that the operation information is consistent with a preset private key.
Preferably, the private key authentication includes character private key authentication, and the information input module includes:
a character acquisition unit for acquiring an input character;
the judgment module is specifically used for comparing the input character with a preset character password, and when the input character is the same as the preset character, the operation information is consistent with a preset private key.
Preferably, the apparatus further comprises:
and when the operation information is inconsistent with a preset private key, the touch command is not executed.
Preferably, the apparatus further comprises:
and the locking module is used for locking the electronic equipment when the continuous inconsistent times of the operation information and a preset private key exceed a preset threshold value.
Preferably, the apparatus further comprises:
and the setting module is used for presetting the type and the private key authentication mode of the application program and displaying an icon corresponding to the private key authentication mode of the application program on the display module.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising a … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
It is to be understood that the foregoing is merely exemplary of some of the presently preferred embodiments of the invention, and that these embodiments are not to be considered in all respects as illustrative and not restrictive, and that the general principles defined herein may be applied to other embodiments without departing from the spirit or scope of the present application. Therefore, based on the above embodiments, it will be apparent to those skilled in the art that various modifications and decorations can be made without departing from the principle and inventive concept of the present application, and all other embodiments obtained by the modifications and decorations can be applied to the technical solution of the present application without affecting the implementation of the present application, and shall fall within the protection scope of the present application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing detailed description has provided for the present application and the principles and embodiments of the present application can be illustrated by specific examples, which are provided only for the purpose of facilitating understanding of the method and the core concept of the present application, and persons skilled in the art may change the embodiments and application scope according to the concept of the present application.

Claims (14)

1. An information processing method applied to an electronic device, wherein the electronic device includes at least one application program, and an operation subject can operate the application program through the electronic device, the method comprising:
determining the type of an application program targeted by an operation command in the process of receiving the operation command for the application program by the electronic equipment; the operation command comprises an operation command for deleting the application program and an operation command for moving the position of the application program;
when the type of the application program indicates that the application program is the application program needing private key authentication, acquiring operation information input by the operation main body; wherein the operation information is received simultaneously with the operation command, and the operation information comprises physiological characteristic information of the operation subject;
judging whether the operation information is consistent with a preset private key or not, and executing the operation command when the operation information is consistent with the preset private key;
the electronic device comprises a display module, and before the electronic device receives an operation command for the application program, the method further comprises:
the type and the private key authentication mode of the application program are preset, and an icon corresponding to the private key authentication mode of the application program is displayed on a display module.
2. The method according to claim 1, wherein the private key authentication comprises physiological characteristic information authentication of an operating subject, and when the type of the application program indicates that the application program is an application program requiring private key authentication, the obtaining of the operating information input by the operating subject comprises:
and acquiring physiological characteristic information of the operation subject in the process of receiving the operation command aiming at the application program.
3. The method of claim 2, wherein the electronic device comprises a touch screen, the touch screen can acquire a fingerprint of a pointer object in contact with the touch screen, the private key authentication comprises fingerprint password authentication, and the acquiring of the physiological characteristic information of the operating subject during the receiving of the operating command for the application program comprises:
acquiring fingerprints of the point objects in a contact area with the touch screen when an operation command is carried out through the touch screen;
judging whether the operation information is consistent with a preset private key comprises the following steps:
and comparing the fingerprint of the pointer object in the contact area with the touch screen with a preset fingerprint, and when the confidence coefficient of the comparison result is greater than or equal to a first preset confidence coefficient threshold value, indicating that the operation information is consistent with a preset private key.
4. The method of claim 2, wherein the private key authentication comprises voiceprint authentication, and wherein the obtaining of the physiological characteristic information of the operating subject during the receiving of the operating command for the application comprises:
acquiring the voiceprint characteristics of input sound;
judging whether the operation information is consistent with a preset private key comprises the following steps:
and comparing the voiceprint features with preset voiceprint features, and when the confidence of the comparison result is greater than a preset confidence threshold, indicating that the operation information is consistent with a preset private key.
5. The method of claim 1, wherein the private key authentication comprises character private key authentication, and the obtaining of the operation information input by the operation subject during the receiving of the operation command for the application comprises:
acquiring an input character;
judging whether the operation information is consistent with a preset private key comprises the following steps:
and comparing the input character with a preset character password, and when the input character is the same as the preset character, indicating that the operation information is consistent with a preset private key.
6. The method of claim 1, further comprising:
and when the operation information is inconsistent with a preset private key, the operation command is not executed.
7. The method of claim 6, further comprising:
and when the continuous inconsistent times of the operation information and a preset private key exceed a preset threshold value, locking the electronic equipment.
8. An information processing apparatus applied to an electronic device, wherein the electronic device includes at least one application program, and an operation subject can operate the application program through the electronic device, the apparatus comprising:
the electronic equipment comprises an application program type determining module, a judging module and a judging module, wherein the application program type determining module is used for determining the type of an application program for which an operation command is directed in the process of receiving the operation command for the application program by the electronic equipment; the operation command comprises an operation command for deleting the application program and an operation command for moving the position of the application program;
the operation information acquisition module is used for acquiring the operation information input by the operation main body when the type of the application program indicates that the application program is the application program which needs to be subjected to private key authentication; wherein the operation information is received simultaneously with the operation command, and the operation information comprises physiological characteristic information of the operation subject;
the judging module is used for judging whether the operation information is consistent with a preset private key or not, and executing the operation command when the operation information is consistent with the preset private key;
the electronic device comprises a display module, and the device further comprises:
and the setting module is used for presetting the type and the private key authentication mode of the application program and displaying an icon corresponding to the private key authentication mode of the application program on the display module.
9. The device according to claim 8, wherein the private key authentication includes a physiological characteristic information authentication of an operating subject, and the operating information acquiring module is specifically configured to acquire the physiological characteristic information of the operating subject in a process of receiving an operating command for the application program.
10. The apparatus of claim 9, wherein the electronic device comprises a touch screen, the touch screen is capable of acquiring a fingerprint of a pointer in contact with the touch screen, the private key authentication comprises a fingerprint password authentication, and the operation information acquiring module comprises:
the fingerprint acquisition unit is used for acquiring the fingerprint of the pointer object in the contact area with the touch screen when an operation command is carried out through the touch screen;
the judgment module is specifically used for comparing the fingerprint of the pointer object in the contact area with the touch screen with a preset fingerprint, and when the confidence of the comparison result is greater than or equal to a first preset confidence threshold, the operation information is consistent with a preset private key.
11. The apparatus of claim 9, wherein the private key authentication comprises voiceprint authentication, and wherein the operation information obtaining module comprises:
a sound acquisition unit for acquiring a voiceprint feature of an input sound;
the judging module is specifically configured to compare the voiceprint features with preset voiceprint features, and when a confidence of a comparison result is greater than a preset confidence threshold, indicate that the operation information is consistent with a preset private key.
12. The apparatus of claim 8, wherein the private key authentication comprises a character private key authentication, and wherein the operation information obtaining module comprises:
a character acquisition unit for acquiring an input character;
the judgment module is specifically used for comparing the input character with a preset character password, and when the input character is the same as the preset character, the operation information is consistent with a preset private key.
13. The apparatus of claim 8, further comprising:
and when the operation information is inconsistent with a preset private key, the operation command is not executed.
14. The apparatus of claim 13, further comprising:
and the locking module is used for locking the electronic equipment when the continuous inconsistent times of the operation information and a preset private key exceed a preset threshold value.
CN201410113834.3A 2014-03-25 2014-03-25 Information processing method and device Active CN104951677B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410113834.3A CN104951677B (en) 2014-03-25 2014-03-25 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410113834.3A CN104951677B (en) 2014-03-25 2014-03-25 Information processing method and device

Publications (2)

Publication Number Publication Date
CN104951677A CN104951677A (en) 2015-09-30
CN104951677B true CN104951677B (en) 2021-01-15

Family

ID=54166330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410113834.3A Active CN104951677B (en) 2014-03-25 2014-03-25 Information processing method and device

Country Status (1)

Country Link
CN (1) CN104951677B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815508B (en) * 2015-11-27 2021-02-09 小米科技有限责任公司 Mobile equipment, screen module of mobile equipment, fingerprint authentication method and device and electronic equipment
CN105653172A (en) * 2015-12-30 2016-06-08 魅族科技(中国)有限公司 Operation method and system
CN106022053B (en) * 2016-05-26 2019-07-12 深圳市金立通信设备有限公司 A kind of unlocking method and device
CN113282346A (en) * 2017-03-29 2021-08-20 上海耕岩智能科技有限公司 Method, device and storage medium for controlling application program based on fingerprint identification
CN111542061B (en) * 2017-04-25 2023-07-18 北京五洲天宇认证中心 Information synchronization security authentication method
CN109460649A (en) * 2018-11-08 2019-03-12 维沃移动通信有限公司 A kind of document handling method and terminal device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN101673329A (en) * 2009-10-16 2010-03-17 宏达国际电子股份有限公司 Establishment method of biometric data, electronic device and computer program product thereof
CN102880820A (en) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 Method for accessing application program of mobile terminal and mobile terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4349789B2 (en) * 2002-11-06 2009-10-21 富士通株式会社 Safety judgment device and safety judgment method
TW200907827A (en) * 2007-08-08 2009-02-16 Acer Inc System and method for performing objects with bio-characteristics recognition
CN103136462B (en) * 2011-12-05 2016-03-30 联想(北京)有限公司 A kind of method and system of password authentification
CN102622549B (en) * 2012-03-20 2014-07-09 天津书生软件技术有限公司 Electronic seal implementation system and method
CN103440445A (en) * 2013-08-14 2013-12-11 深圳市亚略特生物识别科技有限公司 Electronic equipment unlocking control method and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN101673329A (en) * 2009-10-16 2010-03-17 宏达国际电子股份有限公司 Establishment method of biometric data, electronic device and computer program product thereof
CN102880820A (en) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 Method for accessing application program of mobile terminal and mobile terminal

Also Published As

Publication number Publication date
CN104951677A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN104951677B (en) Information processing method and device
US9703941B2 (en) Electronic device with touch screen for fingerprint recognition
CN105825382A (en) Mobile payment method and electronic device
CN104077518A (en) Device and method for unlocking and executing application
CN105159531A (en) Application starting method and mobile terminal
EP3122018B1 (en) Mobile terminal and method of controlling the same
WO2013165801A1 (en) Electronic device including a finger sensor having a valid authentication threshold time period and related methods
CN105677337A (en) Application control method and device and terminal
CN105677222B (en) Application message methods of exhibiting, application message show device and terminal
CN105678147B (en) Touch operation method and device
WO2016155072A1 (en) Method and apparatus for hiding and opening applications
CN104809174A (en) Opening method of terminal application
CN105094874A (en) Application starting method and system
KR101576557B1 (en) Apparatus for anti-hacking fingerprint recognition means of cell-phone and surface means and method of the same
EP2827268A1 (en) Information terminal and execution control method
CN104808899A (en) Terminal
CN110263515B (en) Opening method of encrypted application and terminal equipment
KR101392113B1 (en) Fingerprint locking system
CN110968355A (en) Application program starting method and device and terminal
CN105005729A (en) Method for unlocking screen based on image, and user terminal
JP2015018413A (en) Portable terminal, image display method, and program
CN108683809B (en) Screen locking method, device and system
CN105701383A (en) Function triggering method, device and terminal
JP2014002522A (en) Information terminal device
CN114020391A (en) Information display method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant