CN108460259A - A kind of information processing method, device and terminal - Google Patents

A kind of information processing method, device and terminal Download PDF

Info

Publication number
CN108460259A
CN108460259A CN201611159088.7A CN201611159088A CN108460259A CN 108460259 A CN108460259 A CN 108460259A CN 201611159088 A CN201611159088 A CN 201611159088A CN 108460259 A CN108460259 A CN 108460259A
Authority
CN
China
Prior art keywords
identity information
intended application
user
information
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201611159088.7A
Other languages
Chinese (zh)
Other versions
CN108460259B (en
Inventor
郝志坚
朱钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201611159088.7A priority Critical patent/CN108460259B/en
Priority to PCT/CN2017/091712 priority patent/WO2018107727A1/en
Publication of CN108460259A publication Critical patent/CN108460259A/en
Application granted granted Critical
Publication of CN108460259B publication Critical patent/CN108460259B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a kind of information processing methods, including:Obtain first operation of the user to the primary icon of intended application;First operation is responded, response first operation searches corresponding first identity information of first operation by the mapping relations between pre-stored operation and identity information;The intended application is logged in first identity information.The embodiment of the present invention also discloses a kind of information processing unit and terminal simultaneously.

Description

A kind of information processing method, device and terminal
Technical field
The present invention relates to a kind of control technology of field of communication technology more particularly to information processing method, device and terminals.
Background technology
With the development of development of Mobile Internet technology and popularizing for mobile terminal, in actual life, answered for same It is often possible to have multiple accounts with user, user is also increasing for using the demand that more accounts log in application.Existing In technology, is marked using Provisioning Instance Identifier and create multiple icons of attending to anything else in advance for application, is i.e. an application is in addition to a corresponding original Outside raw icon, multiple icons of attending to anything else can be also corresponded to, to which user can realize by clicking different icons with the login of different accounts Using.
Therefore, problem of the existing technology is:Application icon management is complex, wastes user time, moreover, when more When a application icon is in same operating system of user interface simultaneously, since user forgets corresponding to each application icon difference Account is easy to cause a wrong application icon, generates maloperation, need that operation is repeatedly repeated so that the intelligence of mobile terminal Degree is low.
Invention content
In view of this, an embodiment of the present invention is intended to provide a kind of information processing method, device and terminal, used with realizing to reduce Family maloperation promotes the degree of intelligence of terminal, improves user experience.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of information processing method, the method includes:User is obtained to target First operation of the primary icon of application;First operation is responded, by between pre-stored operation and identity information Mapping relations search corresponding first identity information of first operation;The target is logged in first identity information to answer With.
In other embodiments of the present invention, described that the intended application is logged in first identity information, including:According to First identity information obtains corresponding intended application data;Based on intended application described in the intended application data run, And the intended application is logged in first identity information.
In other embodiments of the present invention, first operation for obtaining user to the primary icon of intended application, including: During obtaining first operation, the corresponding user biological characteristic information of acquisition first operation;By the user Biological information is matched with pre-stored biological information;Correspondingly, the response first operation, passes through It is pre-stored to operate the first identity information corresponding with the first operation described in the mapping relationship searching between identity information, packet It includes:If it does, then response first operation, passes through the mapping relationship searching between pre-stored operation and identity information Described first operates corresponding first identity information.
In other embodiments of the present invention, before the intended application with first identity information login, institute The method of stating further includes:Set the access rights of first identity information to limited access rights, wherein described limited Access rights are used to indicate forbids accessing at least the one of the intended application after first identity information logs in intended application Portion of user data.
In other embodiments of the present invention, in the acquisition user to the first operation of the primary icon of intended application Before, the method further includes:Obtain second operation of the user to the primary icon, wherein second operation is different from institute State the first operation;Determine whether the intended application supports more identity information login functions;If supported, described second is responded Operation passes through corresponding second identity information of the second operation described in the mapping relationship searching;It is stepped on second identity information Record the intended application.
Second aspect, the embodiment of the present invention provide a kind of information processing unit, and described device includes:First obtains unit, First response unit and the first login unit;Wherein, the first obtains unit, for obtaining original of the user to intended application First operation of raw icon;First response unit passes through pre-stored operation and body for responding first operation Mapping relations between part information search corresponding first identity information of first operation;Described first logs in unit, with institute It states the first identity information and logs in the intended application.
In other embodiments of the present invention, described first unit is logged in, is additionally operable to, according to first identity information, obtain Corresponding intended application data;Based on intended application described in the intended application data run, and with first identity information Log in the intended application.
In other embodiments of the present invention, the first obtains unit is additionally operable in the process for obtaining first operation In, the corresponding user biological characteristic information of acquisition first operation;By the user biological characteristic information with it is pre-stored Biological information is matched;First response unit is additionally operable to operate if it does, then responding described first, pass through It is pre-stored to operate the first identity information corresponding with the first operation described in the mapping relationship searching between identity information.
In other embodiments of the present invention, described device further includes:Second obtaining unit, determination unit, the second response are single Member and the second login unit;Wherein, second obtaining unit, for obtaining second behaviour of the user to the primary icon Make, wherein second operation is different from described first and operates;The determination unit, for whether determining the intended application Support more identity information login functions;If second response unit responds second operation, passes through for supporting Corresponding second identity information of second operation described in the mapping relationship searching;Described second logs in unit, for described the Two identity informations log in the intended application.
The third aspect, the embodiment of the present invention provide a kind of terminal, and the terminal includes:Tangible display screen and processing Device;Wherein, the tangible display screen, for obtaining first operation of the user to the primary icon of intended application;The processing Device searches described for responding first operation by the mapping relations between pre-stored operation and identity information Corresponding first identity information of one operation;The intended application is logged in first identity information.
A kind of information processing method of offer of the embodiment of the present invention, device and terminal obtain user to intended application first Then first operation of primary icon is grasped by the mapping relationship searching first between pre-stored operation and identity information Make corresponding first identity information, and intended application is logged in the first identity information.To if by the letter of the embodiment of the present invention When ceasing the case where processing method is applied to the login application of more identity informations, intended application can also logged in the first identity information Before, second operation of the user for the primary icon is obtained, which is logged in the second identity information that the second operation is corresponding Mark application.In this way, user can be realized by the different operation of the primary icon to application with different identity information registration Intended application.It is thus possible to be effectively prevented user misoperation, the degree of intelligence of terminal is promoted, good user experience is provided.
Description of the drawings
Fig. 1-1 is the flow diagram of the information processing method in the embodiment of the present invention one;
Fig. 1-2 is the schematic diagram at the application setting interface in the embodiment of the present invention one;
Fig. 1-3 is the schematic diagram of the login identity information selection interface in the embodiment of the present invention one;
Fig. 2 is the flow diagram of the information processing method in the embodiment of the present invention two;
Fig. 3 is the flow diagram of the information processing method in the embodiment of the present invention three;
Fig. 4 is the flow diagram of the information processing method in the embodiment of the present invention four;
Fig. 5 is the structural schematic diagram of the information processing unit in the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the terminal in the embodiment of the present invention six.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes.
Embodiment one
The present embodiment provides a kind of information processing method, which is applied to terminal, and here, terminal can be Smart mobile phone, tablet computer etc..The function that the information processing method is realized can pass through the processor caller in terminal Code realizes that certain program code can be stored in computer storage media, it is seen then that the terminal include at least processor and Storage medium.In practical applications, the information processing method can be applied to it is various can the more identity informations applications that log in The occasion logged in is needed, is logged in as logged in switch between same application, two accounts of same application using two accounts simultaneously Deng.
So, Fig. 1-1 is the flow diagram of the information processing method in the embodiment of the present invention one, shown in Figure 1, should Information processing method includes:
S101:Obtain first operation of the user to the primary icon of intended application;
Here, when user wants to log in intended application, user can carry out the primary icon of intended application the first behaviour Make, to realize the purpose for logging in intended application.Specifically, the primary icon of intended application can refer to when installing the intended application The application icon being originally generated.
In practical applications, which can be social class application, can also be shopping class application, certainly can be with It is the other kinds of application that can be logged in more identity informations, here, the embodiment of the present invention is not specifically limited.
In specific implementation process, user can pass through the primary icon to intended application in operation system interface Click, touch or one or more combinations of sliding etc. generate the first operation, user can also by list of application, under The place of other primary icons that can operate the intended application such as menu is drawn to carry out the first operation to the primary icon, certainly, Or other manner generates the first operation, here, the embodiment of the present invention is not specifically limited.
In practical applications, the specific action of the first operation can be set by user, can also be system default setting 's.Illustratively, the specific action of the first operation can be clicked, such as click, double-click or three hit, and can also be to press, such as Long-press or short-press etc. can also be sliding, dragging etc., it is, of course, also possible to be combinative movement, such as long-press is simultaneously slided, by this field Technical staff determines that here, the embodiment of the present invention is not specifically limited in the specific implementation.
In specific implementation process, in order to protect the privacy of user, in case because other people maloperation makes user information Leakage, S101 further include:During obtaining the first operation, the corresponding user biological characteristic information of the first operation of acquisition;It will User biological characteristic information is matched with pre-stored biological information.
Illustratively, it is assumed that when user is not intended to others to find that the social networking application of oneself has multiple accounts, peace can be passed through The mode of full certification protects the privacy of oneself.User, which can be arranged, to be answered being logged in using the mode that is operated to application icon The safe class of used time, different safety class correspond to different processing, and such as in safe class highest, safety certification is not by then Refusal logs in;When safe class is medium, safety certification is logged in the access mode being limited not by then;Such as in safe class When minimum, can directly it be logged in without safety certification.
Specifically, the biological information that user is acquired when obtaining the first operation, by operating corresponding use by first Family biological information carries out matched mode with pre-stored biological information, carries out safety certification.If the first behaviour Make corresponding user biological characteristic information with pre-stored biological information to match, then shows that safety certification passes through, it can To execute S102;If the corresponding user biological characteristic information of the first operation is mismatched with pre-stored biological information, Then show that safety certification does not pass through, at this point it is possible to set the access rights of the first identity information to limited access rights, with Just after the first identity information logs in intended application, current login user is forbidden to access shielded private data;Certainly, exist Safety certification is obstructed out-of-date, can also directly end processing process, does not execute S102 to S103.
Further, before S101, above- mentioned information processing method can also include:User is obtained to the of primary icon Two operations, wherein the second operation is different from the first operation;Determine whether intended application supports more identity information login functions;Such as Fruit is supported, then responds the second operation, corresponding second is operated by the mapping relationship searching between operation and identity information second Identity information;Intended application is logged in the second identity information.
Illustratively, user can set the first operation and correspond to the first identity information login intended application, and set Second operation corresponds to logs in intended application with the second identity information.Therefore, in order to realize with the first identity information and the second body Part information logs in intended application simultaneously, or in order to be switched to current the second identity information for logging in intended application with the first body Part information registration can first use the second operation to log in intended application with the second identity information, then use first to operate again with First identity information logs in intended application.That is, before logging in intended application with the first identity information, it can be first with the Two identity informations log in intended application.
In practical applications, the specific action of the second operation can be set by user, can also be system default setting 's.Illustratively, the specific action of the second operation can be clicked, such as click, double-click or three hit, and can also be to press, such as Long-press or short-press etc. can also be sliding, dragging etc., it is, of course, also possible to be action, such as long-press is simultaneously slided, by art technology Personnel determine that here, the embodiment of the present invention is not specifically limited in the specific implementation.However, it is desirable to explanation, the second behaviour Specific act of work and the first operation is different, and such as setting second operates as length on time, and it is to click that the first operation, which can be arranged,.
It should be noted that under normal circumstances, the first identity information is different with the second identity information, such as setting first When identity information is account A and password A, it is account B and password B that the second identity information, which can be arranged,.In practical applications, first It operates and is set by user with the corresponding identity information of the second operation, when user, which is not desired to more identity informations, to be logged in, also may be used The first operation and the identity information corresponding to the second operation respectively are set as consistent.
Specifically, in order to determine the validity of operation of the user to the primary icon of intended application, use can obtained After family is to the operation of the primary icon of intended application, such as the first operation or the second operation, it can also first determine that intended application is It is no to support more identity information login functions;If it is determined that intended application supports more identity information login functions, then respond the first behaviour Make or the second operation, passes through the operation of mapping relationship searching first between operation and identity information or the corresponding identity of the second operation Information.It is of course also possible to when whether uncertain intended application can be logged in at least two identity informations, directly in response to user The operation of the primary icon of corresponding application.Here, the embodiment of the present invention is not specifically limited.
It illustratively, can be by all tools for the ease of determining whether intended application supports more identity information login functions There is an attribute information of the application of more identity information login functions, such as Apply Names, preserves to corresponding and reflect using the set-up time Firing table, as applied in white list, then, when it needs to be determined that whether intended application supports more identity informations, it is only necessary to first obtain Then the attribute information of the intended application is searched whether in the mapping table there are the attribute information, if it is present table The bright intended application supports more identity information login functions, otherwise, shows that the intended application does not support more identity informations to log in work( Energy.It is, of course, also possible to using other modes, determined according to actual conditions in specific implementation process by those skilled in the art It is fixed.
S102:The first operation of response searches first by the mapping relations between pre-stored operation and identity information Operate corresponding first identity information;
Here, after obtaining user to the first operation of the primary icon of intended application, so that it may with by pre-stored Operation locates corresponding first identity information of first operation with the mapping relations between identity information to search, so as to this first Identity information logs in intended application.
In specific implementation process, the first corresponding identity information of the first operation can be user's setting in intended application Preset in setting, illustratively, user can correspond to the first operation in application setting interface as shown in Figs. 1-2 Action 11 be selected as " long-press " 111, and lower button " account A and password A " 122 is pressed at identity information 12 logging in, show by The corresponding identity information of first operation is set as account A and password A, then, when the primary icon of user's long-press intended application Afterwards, account A and password A will be obtained;The first corresponding identity information of first operation can also be that user is selected in real time, show Example property, user can operate corresponding action 11 by first and be set as " long in application setting interface as shown in Figs. 1-2 Press and slide " 112, and be set as " display identity information list " 121 by identity information 12 is logged in, then, when user's long-press simultaneously After the primary icon for sliding intended application, interface as shown in Figs. 1-3 will be shown, at this point, user can select as needed For the identity information of login, show that account B and password B is selected to log in if user can press " account B and password B " 14 Using alternatively, new identity information can also be added directly, as can to press " newly-built identity information " 15 new to increase by user Identity information.Here, the embodiment of the present invention is not specifically limited.
Therefore, above-mentioned mapping relations are being arranged to generate in intended application according to user, store the target and answer With the mapping relations between corresponding each operation and identity information.Illustratively, it is set as in intended application as user: When long-press logs in intended application with account A and password A, corresponding " long-press " operation will be preserved in the mapping relations and its is corresponded to Identity information " account A and password A ".To, after obtaining user to " long-press " operation of the primary icon of intended application, The mapping relations can be inquired, if there is the information of corresponding operation, it is possible to obtain the identity corresponding to the operation Information " account A and password A ".
S103:Intended application is logged in the first identity information.
Here, after obtaining the first identity information, it will be able to log in the intended application with the first identity information.
In specific implementation process, in order to log in intended application with the first identity information, S103 may include:According to First identity information obtains corresponding intended application data;Based on intended application data run intended application, and with the first identity Information registration intended application.
Specifically, for the intended application for the login that can be carried out with different identity information, each identity information Corresponding a independent intended application data that can run the intended application are required for, these intended application data can be independent Operational objective is applied and is not interfere with each other.It therefore, can be first according to first body in order to log in intended application with the first identity information Part information, obtains the intended application data corresponding to first identity information, then answer based on the intended application data run target With, and intended application is logged in the first identity information.
In practical applications, it in order to obtain the corresponding intended application data of the first identity information, can first be answered according to target Attribute information, it is each using data corresponding to intended application to obtain;Then it is corresponding each that each application data are obtained A identity information, and respectively match each identity information with the first identity information;Finally, according to matching result, judge It whether there is and the matched identity information of the first identity information in each identity information;If it is present matched identity is believed The corresponding application data of breath are determined as intended application data;Otherwise, so that it may each be answered using any of data with replicating With data, to generate intended application data.
Here, the attribute information of intended application may include:The title of first application, download address, is divided at unique mark The information such as class, version, detailed description, thumbnail, packet name, size, developer, it is of course also possible to be other, the embodiment of the present invention It is not specifically limited.
So far, it just completes and intended application is logged in the first identity information.
As shown in the above, the technical solution that the embodiment of the present invention is provided is obtaining user to intended application After first operation of primary icon, it can be operated by the mapping relationship searching first between pre-stored operation and identity information Corresponding first identity information, and intended application is logged in the first identity information.In this way, the letter provided through the embodiment of the present invention Processing method is ceased, second operation of the user to the primary icon of intended application can obtained, and step on the second identity information After recording intended application, then using the first operation come with the first identity information login intended application.To by same application figure Mark carries out different operation, realizes with different identity information registration application.It on the one hand, can be in same application simultaneously with multiple identity In the case of information registration, the complexity of the multiple management of icons of same application is reduced, on the other hand, additionally it is possible to not exit original In the case of logging in identity information, is directly applied, can be quickly carried out between different accounts to log in another identity information Switching, and reduce the complexity of switching different identity information registration application.In turn, operation complexity is reduced, end is improved The degree of intelligence at end can provide good user experience to the user.
Embodiment two
Based on previous embodiment, the present embodiment provides a kind of information processing methods, are applied in following scene, it is assumed that user The primary icon that intended application is clicked in setting corresponds to identity information A login intended applications, and sets and double-click intended application Primary icon corresponds to display identity information list, so that user selects to need the identity information B logged in or create to need to step on The identity information B of record.
So, Fig. 2 is the flow diagram of the information processing method in the embodiment of the present invention two, shown in Figure 2, the party Method includes:
S201:Obtain single-click operation of the user to the primary icon of intended application;
S202:Single-click operation is responded, by the mapping relations between pre-stored operation and identity information, lookup is clicked Operate corresponding identity information A;
S203:Obtain the corresponding intended application data of identity information A;
S204:The corresponding intended application data run intended applications of identity-based information A, and mesh is logged in identity information A Mark application;
S205:Obtain double click operation of the user to the primary icon of intended application;
S206:Determine whether intended application supports more identity information login functions;
If it is determined that intended application supports more identity information login functions, then S207 is executed, otherwise, terminated.
S207:Double click operation is responded, shows identity information list;
S208:According to the user's choice, identity information B is obtained;
S209:Intended application is logged in identity information B.
As shown in the above, the technical solution provided through this embodiment may be implemented by same application figure Mark carries out different operation, realizes with different identity information registration application.After logging in intended application with identity information A, while with Identity information B logs in intended application, or after logging in intended application with identity information A, is switched to and logs in mesh with identity information B Mark application.Operation complexity is reduced, the degree of intelligence of terminal is improved, good user experience can be provided to the user.
Embodiment three
Based on previous embodiment, the present embodiment provides a kind of information processing method, Fig. 3 is the letter in the embodiment of the present invention three The flow diagram of processing method is ceased, shown in Figure 3, which includes:
S301:Obtain first operation of the user to the primary icon of intended application;
S302:During obtaining the first operation, the corresponding user biological characteristic information of the first operation of acquisition;
Specifically, the corresponding user biological characteristic information of the first operation can be the finger print information of user, more preferably, full frame The terminal of fingerprint can be acquired, it can be during user operates the primary icon of intended application using finger, directly The finger print information of user is acquired using touch screen;And for the non-full frame terminal for acquiring fingerprint, it can be in user After being operated to the primary icon of intended application using finger, when user's finger is lifted, then special fingerprint collecting mould is used Block acquires the finger print information of user.Certainly, the first corresponding user biological characteristic information of operation can also acoustic information etc. other The biological characteristic of user, as long as biology can be passed through after obtaining user to the first operation of the primary icon of intended application Collection apparatus module can acquire.Here, the embodiment of the present invention is not specifically limited.
In practical applications, the biological information of user can be acquired by the photoelectric conversion module in terminal, The biological information that user can be acquired by the silicon crystal sensor in terminal, it is, of course, also possible to by other means The biological information of user is acquired, here, the embodiment of the present invention is not specifically limited.
Here, biological information can be finger print information, or acoustic information, the embodiment of the present invention are not done specifically It limits;In practical application, it can acquire user's by optical sensor/capacitance sensor/temperature sensor/excusing from death sensor Finger print information carries out pretreatment to finger print information and the key step of feature extracting method includes:Patterns calculating, image filter Wave, binaryzation, refinement, extraction feature and post-processing.
S303:Judge whether user biological characteristic information matches with pre-stored biological information, if it does, holding Row S304 to S306;If it does not match, executing S307 to S310.
It specifically, can be similar between user biological characteristic information and pre-stored biological information by calculating The mode of degree, to determine whether user biological characteristic information matches with pre-stored biological information.
In practical applications, it is similar that Histogram Matching, matrix decomposition mathematically, the image of feature based point may be used The common method for calculating similarity such as degree calculating, here, the embodiment of the present invention is not specifically limited.
S304:The first operation of response searches first by the mapping relations between pre-stored operation and identity information Operate corresponding first identity information;
S305:According to the first identity information, corresponding intended application data are obtained;
S306:Intended application is logged in based on intended application data run intended application, and with the first identity information;
S307:The first operation of response searches first by the mapping relations between pre-stored operation and identity information Operate corresponding first identity information;
S308:According to the first identity information, corresponding intended application data are obtained;
S309:Set the access rights of the first identity information to limited access rights;
Wherein, limited access rights are used to indicate forbids access target to answer after the first identity information logs in intended application At least part user data.That is, limited access rights are used to forbid the user of current operation to access former use The private data of family setting, to realize protection privacy of user.
In practical applications, the mapping relations between access rights and the first identity information can be established, when user runs When intended application data corresponding to the first identity information, so that it may to call corresponding permission, determine which data can be shown, Which data cannot be shown.
Here, those skilled in the art can access priority assignation to intended application data according to the prior art, The embodiment of the present invention is not just done and is excessively repeated.
S310:Intended application is logged in based on intended application data run intended application, and with the first identity information.
As shown in the above, the technical solution provided through this embodiment may be implemented more identity information logins and answer With or switching identity information log in when safety management, protect privacy of user data.
Example IV
Based on previous embodiment, a kind of information processing method is present embodiments provided, is applied in following scene, it is assumed that is used Family is touch operation to the operation of the primary icon of intended application, it is possible to according to the touch duration for primary icon, is come Which determine with identity information operational objective application.The primary icon of user's setting short-press intended application corresponds to be believed with identity The primary icon for ceasing A and logging in intended application, and set long-press intended application corresponds to logs in intended application with identity information B.
So, Fig. 4 is the flow diagram of the information processing method in the embodiment of the present invention four, shown in Figure 4, the letter Ceasing processing method includes:
S401:Obtain touch operation of the user to the primary icon of intended application;
S402:Judge whether the touch duration of touch operation is less than preset duration threshold value;
If it is less than preset duration threshold value, then show the primary icon of user's short-press intended application, at this point, executing S403;Otherwise, then show the primary icon of user's long-press intended application, at this point, executing S410 to S411.
S403:The first operation is generated, and acquires the current biological information of user;
S404:Determine the current biological information of user whether with pre-stored biometric information matches;
If it does, executing S405;Otherwise, S406 is executed.
S405:The first operation of response, intended application is logged in identity information A;
S406:Calculate unmatched number;
S407:Judge whether unmatched number is more than preset matching threshold value;
If unmatched number is more than the second preset matching threshold value, S408 is executed;Otherwise, S409 is executed;
S408:The display screen of terminal is locked in preset time;
In practical applications, those skilled in the art can realize the locking terminal in preset time according to the prior art Display screen, here, the embodiment of the present invention, which is not done, excessively to be repeated.
S409:Acquire the current biological information of user;
After executing S409, S404 is continued to execute, until performing S408 or S405.
S410:Generate the second operation;
S411:The second operation of response, intended application is logged in identity information B.
So far, information processing is just completed.
Embodiment five
Based on same inventive concept, the present embodiment provides a kind of information processing units.Fig. 5 is in the embodiment of the present invention five The structural schematic diagram of information processing unit, shown in Figure 5, which includes:First obtains unit 501, One response unit 502 and first logs in unit 503, wherein first obtains unit 501, for obtaining user to intended application Primary icon first operation;First response unit 502 passes through pre-stored operation and body for responding the first operation Mapping relations between part information search corresponding first identity information of the first operation;First logs in unit 503, with the first body Part information registration intended application.
Further, first unit is logged in, is additionally operable to, according to the first identity information, obtain corresponding intended application data; Intended application is logged in based on intended application data run intended application, and with the first identity information.
Further, first obtains unit is additionally operable to during obtaining the first operation, and the first operation of acquisition is corresponding User biological characteristic information;User biological characteristic information is matched with pre-stored biological information;First response Unit, be additionally operable to if it does, then if it does, then response first operation, by it is pre-stored operation with identity information it Between mapping relations, search the first corresponding first identity information of operation.
Further, which further includes:Rights management unit is additionally operable to first identity information Access rights are set as limited access rights, wherein the limited access rights are used for first identity information Forbid accessing at least part user data in the data of the intended application after login intended application.
Further, which further includes:Second obtaining unit, determination unit, the second response unit and Second logs in unit, wherein the second obtaining unit, for obtaining second operation of the user to primary icon, wherein the second operation Different from the first operation;Determination unit, for determining whether intended application supports more identity information login functions;Second response is single Member, if for supporting, the second operation of response operates corresponding second identity information by mapping relationship searching second;The Two log in unit, for logging in intended application with the second identity information.
In practical applications, above-mentioned first obtains unit, the first response unit, first log in unit, rights management unit, Second obtaining unit, determination unit, the second response unit and second log in unit can by central processing unit (CPU, Central Processing Unit), microprocessor (MPU, Micro Processor Unit), digital signal processor (DSP, Digital Signal Processor) or field programmable gate array (FPGA, Field Programmable Gate Array) etc. realizations.
It need to be noted that be:The description of apparatus above embodiment, be with the description of above method embodiment it is similar, With the similar advantageous effect of same embodiment of the method, therefore do not repeat.For undisclosed skill in apparatus of the present invention embodiment Art details please refers to the description of the method for the present invention embodiment and understands, to save length, therefore repeats no more.
Embodiment six
Based on same inventive concept, the present embodiment provides a kind of terminals.Fig. 6 is the knot of the terminal in the embodiment of the present invention six Structure schematic diagram, shown in Figure 6, which includes:Tangible display screen 601 and processor 602, wherein tangible aobvious Display screen 601, for obtaining first operation of the user to the primary icon of intended application;Processor 602, for responding the first behaviour Make, by the mapping relations between pre-stored operation and identity information, searches corresponding first identity information of the first operation; Intended application is logged in the first identity information.
Further, processor is additionally operable to, according to the first identity information, obtain corresponding intended application data;Based on mesh Mark applies data run intended application, and logs in intended application with the first identity information.
Further, tangible display screen is additionally operable to during obtaining the first operation, and the first operation of acquisition is corresponding User biological characteristic information;Processor is additionally operable to carry out user biological characteristic information and pre-stored biological information Matching;If it does, then the first operation of response, passes through the mapping relationship searching the between pre-stored operation and identity information Corresponding first identity information of one operation.
Further, processor is additionally operable to set the access rights of the first identity information to limited access rights, In, limited access rights are used to indicate forbid access target to apply after the first identity information logs in intended application at least one Portion of user data.
Further, tangible display screen is additionally operable to the second operation for obtaining user to primary icon, wherein the second behaviour Make to be different from the first operation;Processor is additionally operable to determine whether intended application supports more identity information login functions;If branch It holds, then responds the second operation, corresponding second identity information is operated by mapping relationship searching second;It is stepped on the second identity information Record intended application.
It need to be noted that be:The description of the above terminal embodiment, be with the description of above method embodiment it is similar, With the similar advantageous effect of same embodiment of the method, therefore do not repeat.For undisclosed skill in terminal embodiment of the present invention Art details please refers to the description of the method for the present invention embodiment and understands, to save length, therefore repeats no more.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention can be used can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (10)

1. a kind of information processing method, which is characterized in that the method includes:
Obtain first operation of the user to the primary icon of intended application;
It responds first operation and searches described first by the mapping relations between pre-stored operation and identity information Operate corresponding first identity information;
The intended application is logged in first identity information.
2. according to the method described in claim 1, it is characterized in that, described answered with first identity information login target With, including:
According to first identity information, corresponding intended application data are obtained;
Based on intended application described in the intended application data run, and the target is logged in first identity information and is answered With.
3. according to the method described in claim 1, it is characterized in that, described obtain user to the of the primary icon of intended application One operation, including:
During obtaining first operation, the corresponding user biological characteristic information of acquisition first operation;
The user biological characteristic information is matched with pre-stored biological information;
Correspondingly, the response first operation, is looked by the mapping relations between pre-stored operation and identity information Corresponding first identity information of first operation is looked for, including:
If it does, then response first operation, is looked by the mapping relations between pre-stored operation and identity information Look for corresponding first identity information of first operation.
4. according to the method described in claim 3, it is characterized in that, logging in the target described with first identity information Using before, the method further includes:
Set the access rights of first identity information to limited access rights, wherein the limited access rights It is used to indicate at least part user for forbidding accessing the intended application after first identity information logs in intended application Data.
5. according to the method described in claim 1, it is characterized in that, in the acquisition user to the primary icon of intended application Before first operation, the method further includes:
Obtain second operation of the user to the primary icon, wherein second operation is different from described first and operates;
Determine whether the intended application supports more identity information login functions;
If supported, second operation is responded, passes through corresponding second body of the second operation described in the mapping relationship searching Part information;
The intended application is logged in second identity information.
6. a kind of information processing unit, which is characterized in that described device includes:First obtains unit, the first response unit and First logs in unit;Wherein,
The first obtains unit, for obtaining first operation of the user to the primary icon of intended application;
First response unit, for responding first operation, by between pre-stored operation and identity information Mapping relations search corresponding first identity information of first operation;
Described first logs in unit, and the intended application is logged in first identity information.
7. device according to claim 6, which is characterized in that described first logs in unit, is additionally operable to according to described first Identity information obtains corresponding intended application data;Based on intended application described in the intended application data run, and with described First identity information logs in the intended application.
8. device according to claim 6, which is characterized in that the first obtains unit is additionally operable to obtaining described the During one operation, the corresponding user biological characteristic information of acquisition first operation;By the user biological characteristic information It is matched with pre-stored biological information;First response unit is additionally operable to if it does, then responding described One operation passes through pre-stored operation the first body corresponding with the first operation described in the mapping relationship searching between identity information Part information.
9. device according to claim 6, which is characterized in that described device further includes:Second obtaining unit determines list Member, the second response unit and second log in unit;Wherein,
Second obtaining unit, for obtaining second operation of the user to the primary icon, wherein second operation is not It is same as first operation;
The determination unit, for determining whether the intended application supports more identity information login functions;
If second response unit responds second operation, described in the mapping relationship searching for supporting Corresponding second identity information of second operation;
Described second logs in unit, for logging in the intended application with second identity information.
10. a kind of terminal, which is characterized in that the terminal includes:Tangible display screen and processor;Wherein,
The tangible display screen, for obtaining first operation of the user to the primary icon of intended application;
The processor is closed for responding first operation by the mapping between pre-stored operation and identity information Corresponding first identity information of first operation is searched by system;The intended application is logged in first identity information.
CN201611159088.7A 2016-12-13 2016-12-13 Information processing method and device and terminal Active CN108460259B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611159088.7A CN108460259B (en) 2016-12-13 2016-12-13 Information processing method and device and terminal
PCT/CN2017/091712 WO2018107727A1 (en) 2016-12-13 2017-07-04 Method and device for information processing, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611159088.7A CN108460259B (en) 2016-12-13 2016-12-13 Information processing method and device and terminal

Publications (2)

Publication Number Publication Date
CN108460259A true CN108460259A (en) 2018-08-28
CN108460259B CN108460259B (en) 2022-12-02

Family

ID=62558183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611159088.7A Active CN108460259B (en) 2016-12-13 2016-12-13 Information processing method and device and terminal

Country Status (2)

Country Link
CN (1) CN108460259B (en)
WO (1) WO2018107727A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111427709A (en) * 2020-03-30 2020-07-17 努比亚技术有限公司 Application program body-separating control method and device and computer readable storage medium
CN111459358A (en) * 2020-03-31 2020-07-28 维沃移动通信有限公司 Application program control method and electronic equipment

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924258B (en) * 2018-08-14 2022-07-08 深圳壹账通智能科技有限公司 Background information pushing method and device, computer equipment and storage medium
CN112165493B (en) * 2020-09-30 2023-02-21 惠州市善居电子商务有限公司 Identity login switching method and device, computer equipment and storage medium
CN112783579A (en) * 2021-01-05 2021-05-11 北京小米松果电子有限公司 Application program control method, device and storage medium
CN113240500A (en) * 2021-06-11 2021-08-10 维沃移动通信有限公司 Information display method and device

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050269402A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
CN102368750A (en) * 2011-09-30 2012-03-07 上海量明科技发展有限公司 Display method and system of multi-account login interface
US20130312073A1 (en) * 2012-05-16 2013-11-21 Rajdeep Srivastav Methods and systems for authentication of multiple sign-in accounts
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN103576847A (en) * 2012-08-09 2014-02-12 腾讯科技(深圳)有限公司 Method and device for obtaining account information
CN104125063A (en) * 2013-04-28 2014-10-29 腾讯科技(深圳)有限公司 Authentication method, equipment and system
CN104363205A (en) * 2014-10-17 2015-02-18 小米科技有限责任公司 Application login method and device
CN104394133A (en) * 2014-11-14 2015-03-04 百度在线网络技术(北京)有限公司 Login method and login system
CN104866752A (en) * 2015-05-12 2015-08-26 广东欧珀移动通信有限公司 Application protection method and user terminal
CN105094898A (en) * 2015-07-08 2015-11-25 广东欧珀移动通信有限公司 Method for switching account of application program and terminal
CN105117209A (en) * 2015-07-27 2015-12-02 小米科技有限责任公司 Application interaction method and device
CN105760045A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Application program login method, application program login device and terminal
CN105871841A (en) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 Method and device for logging in target equipment and generating login information
CN106034134A (en) * 2015-03-19 2016-10-19 腾讯科技(深圳)有限公司 Method and device and auxiliary method and device for implementing identity authentication request in webpage application
WO2016165536A1 (en) * 2015-04-17 2016-10-20 腾讯科技(深圳)有限公司 Identity verification method and device
CN106201748A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of Message Processing based on mobile terminal
CN106203143A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of application program locking

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050269402A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
CN102368750A (en) * 2011-09-30 2012-03-07 上海量明科技发展有限公司 Display method and system of multi-account login interface
US20130312073A1 (en) * 2012-05-16 2013-11-21 Rajdeep Srivastav Methods and systems for authentication of multiple sign-in accounts
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN103576847A (en) * 2012-08-09 2014-02-12 腾讯科技(深圳)有限公司 Method and device for obtaining account information
CN104125063A (en) * 2013-04-28 2014-10-29 腾讯科技(深圳)有限公司 Authentication method, equipment and system
CN104363205A (en) * 2014-10-17 2015-02-18 小米科技有限责任公司 Application login method and device
CN104394133A (en) * 2014-11-14 2015-03-04 百度在线网络技术(北京)有限公司 Login method and login system
CN106034134A (en) * 2015-03-19 2016-10-19 腾讯科技(深圳)有限公司 Method and device and auxiliary method and device for implementing identity authentication request in webpage application
WO2016165536A1 (en) * 2015-04-17 2016-10-20 腾讯科技(深圳)有限公司 Identity verification method and device
CN104866752A (en) * 2015-05-12 2015-08-26 广东欧珀移动通信有限公司 Application protection method and user terminal
CN105094898A (en) * 2015-07-08 2015-11-25 广东欧珀移动通信有限公司 Method for switching account of application program and terminal
CN105117209A (en) * 2015-07-27 2015-12-02 小米科技有限责任公司 Application interaction method and device
CN105760045A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Application program login method, application program login device and terminal
CN105871841A (en) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 Method and device for logging in target equipment and generating login information
CN106201748A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of Message Processing based on mobile terminal
CN106203143A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of application program locking

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
JEREMIAH ONAOLAPO: "What Happens After You Are Pwnd:Understanding The Use Of Leaked Account Credentials In The Wild", 《网页公开:HTTPS://DISCOVERY.UCL.AC.UK/ID/EPRINT/1505967/1/PAPER.PDF》 *
张杰: "身份管理渐行其道", 《世界电信》 *
林丽华: "利用QQ多账号功能提高登录效率", 《电脑迷》 *
闫艳力等: "我的QQ你快回来!", 《电脑爱好者》 *
骆慧勇等: "基于协同平台用户信息的身份认证构架研究", 《金融科技时代》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111427709A (en) * 2020-03-30 2020-07-17 努比亚技术有限公司 Application program body-separating control method and device and computer readable storage medium
CN111427709B (en) * 2020-03-30 2023-07-21 努比亚技术有限公司 Application program splitting control method, device and computer readable storage medium
CN111459358A (en) * 2020-03-31 2020-07-28 维沃移动通信有限公司 Application program control method and electronic equipment
CN111459358B (en) * 2020-03-31 2021-08-17 维沃移动通信有限公司 Application program control method and electronic equipment

Also Published As

Publication number Publication date
WO2018107727A1 (en) 2018-06-21
CN108460259B (en) 2022-12-02

Similar Documents

Publication Publication Date Title
CN106055996B (en) Multimedia information sharing method and mobile terminal
CN108460259A (en) A kind of information processing method, device and terminal
WO2016127426A1 (en) Method and apparatus for displaying application and picture, and electronic device
CN104660688B (en) A kind of method and apparatus obtaining log-on message
KR20190085543A (en) Method and apparatus for generating security questions and verifying identities
CN103605459A (en) Fast application launching method and fast application launching terminal
TWI705348B (en) Service calling method and device
CN104679900B (en) Application program searching method and device
CN106843660B (en) Data processing method and equipment thereof
CN105677222B (en) Application message methods of exhibiting, application message show device and terminal
CN105447378A (en) Password generation method and device
US20180278600A1 (en) Multi-factor masked access control system
CN106354399A (en) Method, device, and electronic device for assignment of application permission
CN108235767A (en) A kind of partition method, device and terminal for paying application
CN109063504A (en) Access method, mobile terminal and the storage medium of secret file
CN109359582A (en) Information search method, information search device and mobile terminal
CN104808899A (en) Terminal
CN112912844A (en) File collection method, file collection device and terminal equipment
CN106203176A (en) A kind of application encryption method and device
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN105353874A (en) Multimedia content sharing method and terminal
CN106385507A (en) Prompting method of social application, prompting device and terminal
US20180088766A1 (en) Folder creating and cancelling method and system applied on touch screen
CN106778344B (en) A kind of data permission control method and terminal
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant