CN108460259B - Information processing method and device and terminal - Google Patents

Information processing method and device and terminal Download PDF

Info

Publication number
CN108460259B
CN108460259B CN201611159088.7A CN201611159088A CN108460259B CN 108460259 B CN108460259 B CN 108460259B CN 201611159088 A CN201611159088 A CN 201611159088A CN 108460259 B CN108460259 B CN 108460259B
Authority
CN
China
Prior art keywords
identity information
target application
user
obtaining
logging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611159088.7A
Other languages
Chinese (zh)
Other versions
CN108460259A (en
Inventor
郝志坚
朱钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201611159088.7A priority Critical patent/CN108460259B/en
Priority to PCT/CN2017/091712 priority patent/WO2018107727A1/en
Publication of CN108460259A publication Critical patent/CN108460259A/en
Application granted granted Critical
Publication of CN108460259B publication Critical patent/CN108460259B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Abstract

The embodiment of the invention discloses an information processing method, which comprises the following steps: obtaining a first operation of a user on a native icon of a target application; responding to the first operation, and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information; and logging in the target application by using the first identity information. The embodiment of the invention also discloses an information processing device and a terminal.

Description

Information processing method and device and terminal
Technical Field
The present invention relates to control technologies in the field of communications technologies, and in particular, to an information processing method, an information processing apparatus, and a terminal.
Background
With the development of mobile internet technology and the popularization of mobile terminals, in real life, a user may have multiple accounts for the same application, and the user's demand for logging in applications using multiple accounts is increasing. In the prior art, a plurality of split icons are created for an application in advance by using an instance identifier mark, that is, one application corresponds to one native icon and also corresponds to a plurality of split icons, so that a user can log in the application by using different accounts by clicking different icons.
Therefore, the prior art has the problems that: the application icon management is complex, user time is wasted, and when a plurality of application icons are located in the same user operating system interface at the same time, because a user forgets account numbers corresponding to the application icons respectively, the application icons are easy to be mistakenly clicked, misoperation is generated, repeated operation is needed for many times, and the intelligent degree of the mobile terminal is low.
Disclosure of Invention
In view of this, embodiments of the present invention are expected to provide an information processing method, an information processing apparatus, and a terminal, so as to reduce user misoperation, improve the intelligence degree of the terminal, and improve user experience.
In order to achieve the above purpose, the technical solution of the embodiment of the present invention is implemented as follows:
in a first aspect, an embodiment of the present invention provides an information processing method, where the method includes: obtaining a first operation of a user on a native icon of a target application; responding to the first operation, and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information; and logging in the target application by using the first identity information.
In other embodiments of the present invention, the logging in the target application with the first identity information includes: acquiring corresponding target application data according to the first identity information; and running the target application based on the target application data, and logging in the target application with the first identity information.
In other embodiments of the present invention, the first operation of obtaining the native icon of the target application by the user includes: in the process of obtaining the first operation, collecting user biological characteristic information corresponding to the first operation; matching the user biological characteristic information with pre-stored biological characteristic information; correspondingly, the searching for the first identity information corresponding to the first operation through the mapping relationship between the prestored operation and the identity information in response to the first operation includes: and if the first operation is matched with the second operation, responding to the first operation, and searching the first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information.
In other embodiments of the present invention, before the logging in the target application with the first identity information, the method further comprises: and setting the access right of the first identity information as a limited access right, wherein the limited access right is used for indicating that at least part of user data of a target application is forbidden to be accessed after the first identity information logs in the target application.
In other embodiments of the present invention, before the first operation of obtaining the native icon of the target application by the user, the method further comprises: obtaining a second operation of the native icon by the user, wherein the second operation is different from the first operation; determining whether the target application supports a multi-identity information login function; if yes, responding to the second operation, and searching second identity information corresponding to the second operation through the mapping relation; and logging in the target application by using the second identity information.
In a second aspect, an embodiment of the present invention provides an information processing apparatus, including: the system comprises a first obtaining unit, a first response unit and a first login unit; the first obtaining unit is used for obtaining a first operation of a user on a native icon of a target application; the first response unit is used for responding to the first operation and searching first identity information corresponding to the first operation through a mapping relation between prestored operation and identity information; the first login unit is used for logging in the target application by using the first identity information.
In other embodiments of the present invention, the first login unit is further configured to obtain corresponding target application data according to the first identity information; and running the target application based on the target application data, and logging in the target application with the first identity information.
In other embodiments of the present invention, the first obtaining unit is further configured to, in the process of obtaining the first operation, collect user biometric information corresponding to the first operation; matching the user biological characteristic information with pre-stored biological characteristic information; the first response unit is further configured to respond to the first operation if the first operation is matched with the second operation, and search for first identity information corresponding to the first operation through a mapping relationship between prestored operation and identity information.
In other embodiments of the present invention, the apparatus further comprises: the device comprises a second obtaining unit, a determining unit, a second responding unit and a second login unit; the second obtaining unit is used for obtaining a second operation of the native icon by the user, wherein the second operation is different from the first operation; the determining unit is used for determining whether the target application supports a multi-identity information login function or not; the second response unit is configured to respond to the second operation if the second operation is supported, and search for second identity information corresponding to the second operation through the mapping relationship; and the second login unit is used for logging in the target application by using the second identity information.
In a third aspect, an embodiment of the present invention provides a terminal, where the terminal includes: a touchable display screen and a processor; the touchable display screen is used for obtaining a first operation of a user on a native icon of a target application; the processor is used for responding to the first operation and searching for first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information; and logging in the target application by using the first identity information.
The embodiment of the invention provides an information processing method, an information processing device and an information processing terminal. Therefore, if the information processing method of the embodiment of the invention is applied to the case of multi-identity information login application, before the target application is logged in with the first identity information, the second operation of the user on the native icon can be obtained, and the target application is logged in with the second identity information corresponding to the second operation. In this way, the user can log in the target application with different identity information through different operations on the native icon of the application. Therefore, misoperation of a user can be effectively prevented, the intelligent degree of the terminal is improved, and good user experience is provided.
Drawings
FIG. 1-1 is a schematic flow chart of an information processing method according to a first embodiment of the present invention;
fig. 1-2 are schematic diagrams of an application setting interface according to a first embodiment of the present invention;
FIGS. 1-3 are schematic diagrams of a login identity information selection interface according to a first embodiment of the present invention;
FIG. 2 is a flowchart illustrating an information processing method according to a second embodiment of the present invention;
FIG. 3 is a flowchart illustrating an information processing method according to a third embodiment of the present invention;
FIG. 4 is a flowchart illustrating an information processing method according to a fourth embodiment of the present invention;
FIG. 5 is a schematic diagram of an information processing apparatus according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal in a sixth embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
Example one
The embodiment provides an information processing method, which is applied to a terminal, wherein the terminal can be a smart phone, a tablet computer and the like. The functions implemented by the information processing method can be implemented by calling program codes through a processor in the terminal, and the program codes can be saved in a computer storage medium. In practical application, the information processing method can be applied to various occasions needing login of applications capable of logging in multi-identity information, such as simultaneously logging in the same application by using two accounts, switching login between two accounts of the same application and the like.
Then, fig. 1-1 is a schematic flow chart of an information processing method according to a first embodiment of the present invention, and referring to fig. 1, the information processing method includes:
s101: obtaining a first operation of a user on a native icon of a target application;
here, when the user wants to log in the target application, the user may perform a first operation on the native icon of the target application to achieve the purpose of logging in the target application. In particular, the native icon of the target application may refer to an application icon that was originally generated when the target application was installed.
In practical applications, the target application may be a social application, a shopping application, or other types of applications that can log in with multi-identity information, and the embodiment of the present invention is not limited in detail herein.
In a specific implementation process, a user may generate a first operation by one or more combination manners of clicking, touching, or sliding a native icon of a target application on an operating system interface, and the user may also perform the first operation on the native icon of the target application through other places where the native icon of the target application may be operated, such as an application list, a pull-down menu, and the like, and of course, the first operation may also be generated by other manners, where the embodiment of the present invention is not specifically limited herein.
In practical applications, the specific action of the first operation may be set by a user or may be set by default in the system. Illustratively, the specific action of the first operation may be a click, such as a single click, a double click, or a triple click, or may also be a press, such as a long press or a short press, or may also be a slide, a drag, or the like, or of course, a combined action, such as a long press and a slide, is determined by a person skilled in the art in specific implementation, and herein, the embodiment of the present invention is not specifically limited.
In a specific implementation process, in order to protect the privacy of the user and prevent user information from being leaked due to misoperation of another person, S101 further includes: in the process of obtaining the first operation, acquiring user biological characteristic information corresponding to the first operation; and matching the user biological characteristic information with the pre-stored biological characteristic information.
For example, assuming that a user does not want others to find that there are multiple accounts in his social application, his privacy can be protected by means of security authentication. The user can set the security level when logging in the application by operating the application icon, different security levels correspond to different processes, and if the security level is the highest, the user refuses to log in if the security authentication is not passed; when the security level is middle and the like, the security authentication is not passed, and the login is carried out in a limited access mode; if the security level is the lowest, direct login without security authentication can be performed.
Specifically, the biometric information of the user is collected when the first operation is obtained, and the security authentication is performed by matching the biometric information of the user corresponding to the first operation with the pre-stored biometric information. If the user biological characteristic information corresponding to the first operation is matched with the pre-stored biological characteristic information, the security authentication is passed, and S102 can be executed; if the user biological characteristic information corresponding to the first operation is not matched with the pre-stored biological characteristic information, the security authentication is not passed, at the moment, the access authority of the first identity information can be set as a limited access authority, so that the current login user is prohibited from accessing protected private data after the first identity information logs in the target application; of course, when the security authentication is not passed, the processing procedure may be directly ended without executing S102 to S103.
Further, before S101, the information processing method may further include: obtaining a second operation of the native icon by the user, wherein the second operation is different from the first operation; determining whether the target application supports a multi-identity information login function; if so, responding to the second operation, and searching second identity information corresponding to the second operation through the mapping relation between the operation and the identity information; and logging in the target application by using the second identity information.
For example, the user may set the first operation to correspond to logging in the target application with the first identity information and set the second operation to correspond to logging in the target application with the second identity information. Therefore, in order to simultaneously log in the target application with the first identity information and the second identity information, or to switch the second identity information currently logged in the target application to log in with the first identity information, the target application may be logged in with the second identity information by the second operation, and then the target application may be logged in with the first identity information by the first operation. That is, the target application may be logged in with the second identity information before the target application is logged in with the first identity information.
In practical applications, the specific action of the second operation may be set by a user or may be set by default in the system. Illustratively, the specific action of the second operation may be a click, such as a single click, a double click, a triple click, or the like, or may also be a press, such as a long press or a short press, or may also be a slide, a drag, or the like, and of course, the specific action may also be an action, such as a long press and a slide, which is determined by those skilled in the art in the specific implementation, and here, the embodiment of the present invention is not specifically limited. However, the specific actions of the second operation and the first operation are different, and if the second operation is set to be a long press, the first operation may be set to be a single click.
It should be noted that, in general, the first identity information is different from the second identity information, and for example, when the first identity information is set as account a and password a, the second identity information may be set as account B and password B. In practical application, the identity information corresponding to the first operation and the second operation is set by the user, and when the user does not want to log in the multi-identity information, the identity information corresponding to the first operation and the second operation can be set to be consistent.
Specifically, in order to determine the validity of the operation of the user on the native icon of the target application, after the operation of the user on the native icon of the target application is obtained, such as a first operation or a second operation, it may be determined whether the target application supports a multi-identity information login function; and if the target application is determined to support the multi-identity information login function, responding to the first operation or the second operation, and searching the identity information corresponding to the first operation or the second operation through the mapping relation between the operation and the identity information. Of course, the operation of the application native icon corresponding to the user may also be directly responded when it is not determined whether the target application can be logged in with at least two pieces of identity information. Here, the embodiment of the present invention is not particularly limited.
For example, in order to determine whether the target application supports the multiple identity information login function, attribute information of all applications with the multiple identity information login function, such as application names, application installation time, and the like, may be stored in a corresponding mapping table, such as an application white list, when it is necessary to determine whether the target application supports the multiple identity information, it is only necessary to first obtain the attribute information of the target application, and then search for whether the attribute information exists in the mapping table, if so, it is indicated that the target application supports the multiple identity information login function, otherwise, it is indicated that the target application does not support the multiple identity information login function. Of course, other ways may be used, as determined by those skilled in the art in the course of the detailed description.
S102: responding to the first operation, and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information;
here, after the first operation of the user on the target application native icon is obtained, the first identity information corresponding to the first operation can be searched through the mapping relation between the prestored operation and the identity information, so as to log in the target application with the first identity information.
In a specific implementation process, the first identity information corresponding to the first operation may be preset in the setting of the target application by the user, for example, in an application setting interface shown in fig. 1-2, the user may select the action 11 corresponding to the first operation as "long press" 111, and press the button "account a and password a"122 at the login identity information 12, which indicates that the identity information corresponding to the first operation is set as account a and password a, and then, when the user long presses a native icon of the target application, the account a and the password a are obtained; the first identity information corresponding to the first operation may also be selected by the user in real time, for example, the user may set the action 11 corresponding to the first operation as "long press and slide" 112 and the login identity information 12 as "display identity information list" 121 in the application setting interface shown in fig. 1-2, then, after the user long presses and slides the native icon of the target application, the interface shown in fig. 1-3 is displayed, at this time, the user may select the identity information for login as needed, if the user may press "account B and password B"14, it indicates that account B and password B are selected to log in the application, or, new identity information may also be directly added, if the user may press "new identity information" 15 to add new identity information. Here, the embodiments of the present invention are not particularly limited.
Therefore, the mapping relationship is generated according to the setting of the user in the target application, and the mapping relationship between each operation corresponding to the target application and the identity information is stored. Illustratively, when the user's settings in the target application are: when the long press uses the account A and the password A to log in the target application, the corresponding long press operation and the corresponding identity information of the account A and the password A are stored in the mapping relation. Therefore, after the 'long press' operation of the user on the native icon of the target application is obtained, the mapping relation can be inquired, and if the corresponding operation information exists, the identity information 'account A and password A' corresponding to the operation can be obtained.
S103: and logging in the target application by using the first identity information.
Here, after the first identity information is obtained, the target application can be logged in with the first identity information.
In a specific implementation process, in order to log in the target application with the first identity information, S103 may include: acquiring corresponding target application data according to the first identity information; and running the target application based on the target application data, and logging in the target application with the first identity information.
Specifically, for target applications that can be logged in with different identity information, each identity information needs to correspond to an independent target application data that can run the target application, and the target application data can run the target application independently without interfering with each other. Therefore, in order to log in the target application with the first identity information, the target application data corresponding to the first identity information may be obtained according to the first identity information, and then the target application is run based on the target application data, and the target application is logged in with the first identity information.
In practical application, in order to obtain target application data corresponding to the first identity information, each application data corresponding to the target application may be obtained according to the attribute information of the target application; then acquiring each identity information corresponding to each application data, and respectively matching each identity information with the first identity information; finally, judging whether identity information matched with the first identity information exists in each identity information or not according to the matching result; if the identity information exists, determining the application data corresponding to the matched identity information as target application data; otherwise, any one of the respective application data may be copied to generate the target application data.
Here, the attribute information of the target application may include: the first application may be a name, a unique identifier, a download address, a category, a version, a detailed description, a thumbnail, a package name, a size, a developer, or other information, which may be, of course, other information, and embodiments of the present invention are not specifically limited.
Thus, the target application is logged in with the first identity information.
As can be seen from the above, according to the technical solution provided in the embodiment of the present invention, after the first operation of the user on the native icon of the target application is obtained, the first identity information corresponding to the first operation is searched through the pre-stored mapping relationship between the operation and the identity information, and the target application is logged in with the first identity information. Therefore, by the information processing method provided by the embodiment of the invention, the second operation of the native icon of the target application by the user can be obtained, and the target application is logged in by the second identity information, and then the target application is logged in by the first identity information by adopting the first operation. Therefore, different operations are carried out on the same application icon, and the application can be logged in by using different identity information. On one hand, the complexity of managing a plurality of icons of the same application can be reduced under the condition that the same application logs in by a plurality of identity information at the same time, on the other hand, the application can also be directly logged in by another identity information under the condition that the original login identity information is not quitted, the switching between different account numbers can be rapidly carried out, and the complexity of switching different identity information login applications is reduced. Furthermore, the operation complexity is reduced, the intelligent degree of the terminal is improved, and good user experience can be provided for the user.
Example two
Based on the foregoing embodiments, the present embodiment provides an information processing method, which is applied in a scenario that a user sets a native icon of a single-click target application to correspond to login of a target application with identity information a, and sets a native icon of a double-click target application to correspond to display of an identity information list, so that the user can select identity information B to be logged in or newly establish identity information B to be logged in.
Then, fig. 2 is a schematic flow chart of an information processing method in the second embodiment of the present invention, and as shown in fig. 2, the method includes:
s201: obtaining the clicking operation of a user on a native icon of a target application;
s202: responding to the clicking operation, and searching identity information A corresponding to the clicking operation through a mapping relation between the prestored operation and the identity information;
s203: acquiring target application data corresponding to the identity information A;
s204: running the target application based on the target application data corresponding to the identity information A, and logging in the target application by using the identity information A;
s205: obtaining double-click operation of a user on a native icon of a target application;
s206: determining whether the target application supports a multi-identity information login function;
if the target application is determined to support the multi-identity information login function, S207 is executed, otherwise, the process is ended.
S207: responding to double-click operation, and displaying an identity information list;
s208: acquiring identity information B according to the selection of a user;
s209: and logging in the target application by using the identity information B.
As can be seen from the above, according to the technical solution provided in this embodiment, different operations can be performed on the same application icon to realize that the application is logged in by using different identity information. After the target application is logged in by the identity information A, the target application is logged in by the identity information B at the same time, or after the target application is logged in by the identity information A, the target application is logged in by the identity information B. The operation complexity is reduced, the intelligent degree of the terminal is improved, and good user experience can be provided for the user.
EXAMPLE III
Based on the foregoing embodiments, this embodiment provides an information processing method, and fig. 3 is a schematic flow chart of the information processing method in the third embodiment of the present invention, and as shown in fig. 3, the information processing method includes:
s301: obtaining a first operation of a user on a native icon of a target application;
s302: in the process of obtaining the first operation, acquiring user biological characteristic information corresponding to the first operation;
specifically, the user biometric information corresponding to the first operation may be fingerprint information of the user, and preferably, the terminal capable of collecting fingerprints on the full screen may directly collect the fingerprint information of the user by using the touch screen in the process that the user uses a finger to operate the native icon of the target application; and for the terminal capable of collecting the fingerprint in the non-full screen, after the user operates the native icon of the target application by using the finger, when the user finger is lifted, the fingerprint information of the user can be collected by adopting a special fingerprint collection module. Of course, the user biometric information corresponding to the first operation may also be the biometric information of other users, such as voice information, as long as the biometric information can be collected by the biometric collection module after the first operation of the user on the native icon of the target application is obtained. Here, the embodiments of the present invention are not particularly limited.
In practical application, the biometric information of the user may be acquired through the photoelectric conversion module on the terminal, or may be acquired through the silicon crystal sensor on the terminal, or of course, may also be acquired through other manners, and here, the embodiment of the present invention is not limited specifically.
Here, the biometric information may be fingerprint information or sound information, and the embodiment of the present invention is not particularly limited; in practical application, the method for preprocessing fingerprint information and extracting features can acquire the fingerprint information of a user through an optical sensor/a capacitive sensor/a temperature sensor/a super sensor, and comprises the following main steps: directional diagram calculation, image filtering, binaryzation, refinement, feature extraction and post-processing.
S303: judging whether the user biological characteristic information is matched with the pre-stored biological characteristic information or not, and if so, executing S304 to S306; if not, S307 to S310 are executed.
Specifically, whether the user biometric information matches the pre-stored biometric information may be determined by calculating a similarity between the user biometric information and the pre-stored biometric information.
In practical applications, common methods for calculating similarity, such as histogram matching, mathematical matrix decomposition, feature point-based image similarity calculation, and the like, may be used, and the embodiment of the present invention is not specifically limited herein.
S304: responding to the first operation, and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information;
s305: acquiring corresponding target application data according to the first identity information;
s306: running the target application based on the target application data, and logging in the target application with the first identity information;
s307: responding to the first operation, and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information;
s308: acquiring corresponding target application data according to the first identity information;
s309: setting the access right of the first identity information as a limited access right;
wherein the restricted access right is used to indicate that access to at least a part of the user data of the target application is prohibited after the first identity information logs into the target application. That is, the limited access right is used to prohibit the currently operating user from accessing the private data set by the original user, thereby protecting the privacy of the user.
In practical application, a mapping relation between the access authority and the first identity information can be established, and when a user runs target application data corresponding to the first identity information, the corresponding authority can be called to determine which data can be displayed and which data cannot be displayed.
Here, a person skilled in the art may set an access right to target application data according to the prior art, and details of the embodiment of the present invention are not described here.
S310: and running the target application based on the target application data, and logging in the target application with the first identity information.
As can be seen from the above, according to the technical scheme provided by this embodiment, security management during multi-identity information login application or switching identity information login can be achieved, and user privacy data can be protected.
Example four
Based on the foregoing embodiments, the present embodiment provides an information processing method applied to a scenario in which, assuming that an operation of a native icon of a target application by a user is a touch operation, it is possible to determine, according to a touch duration for the native icon, at which identity information the target application is run. The user sets the native icon of the short-press target application to correspond to logging in the target application with identity information a, and sets the native icon of the long-press target application to correspond to logging in the target application with identity information B.
Then, fig. 4 is a schematic flow chart of an information processing method in a fourth embodiment of the present invention, and referring to fig. 4, the information processing method includes:
s401: obtaining touch operation of a user on a native icon of a target application;
s402: judging whether the touch duration of the touch operation is smaller than a preset duration threshold value or not;
if the time length is less than the preset time length threshold value, indicating that the user presses the native icon of the target application for a short time, and executing S403 at the moment; otherwise, it indicates that the user has pressed the native icon of the target application for a long time, and at this time, S410 to S411 are performed.
S403: generating a first operation and collecting the current biological characteristic information of a user;
s404: determining whether the current biological characteristic information of the user is matched with the pre-stored biological characteristic information;
if so, executing S405; otherwise, S406 is performed.
S405: responding to the first operation, and logging in the target application by using the identity information A;
s406: calculating the number of mismatching;
s407: judging whether the number of unmatched times is greater than a preset matching threshold value or not;
if the number of mismatching is greater than a second preset matching threshold, executing S408; otherwise, executing S409;
s408: locking a display screen of the terminal within preset time;
in practical applications, a person skilled in the art can lock the display screen of the terminal within a preset time according to the prior art, and here, the embodiment of the present invention is not described in detail.
S409: collecting the current biological characteristic information of a user;
after execution of S409, S404 continues to be executed until S408 or S405 is executed.
S410: generating a second operation;
s411: and responding to the second operation, and logging in the target application by using the identity information B.
By this, the information processing is completed.
EXAMPLE five
Based on the same inventive concept, the present embodiment provides an information processing apparatus. Fig. 5 is a schematic structural diagram of an information processing apparatus according to a fifth embodiment of the present invention, and referring to fig. 5, the information processing apparatus 50 includes: the system comprises a first obtaining unit 501, a first response unit 502 and a first login unit 503, wherein the first obtaining unit 501 is used for obtaining a first operation of a native icon of a target application by a user; a first response unit 502, configured to respond to the first operation and search for first identity information corresponding to the first operation through a mapping relationship between a prestored operation and the identity information; the first login unit 503 logs in the target application with the first identity information.
Further, the first login unit is further configured to obtain corresponding target application data according to the first identity information; and running the target application based on the target application data, and logging in the target application with the first identity information.
Further, the first obtaining unit is further configured to, in the process of obtaining the first operation, collect user biometric information corresponding to the first operation; matching the user biological characteristic information with pre-stored biological characteristic information; and the first response unit is further used for responding to the first operation if the first operation is matched with the identity information, and searching the first identity information corresponding to the first operation through the pre-stored mapping relation between the operation and the identity information.
Further, the information processing apparatus further includes: and the authority management unit is further used for setting the access authority of the first identity information as a limited access authority, wherein the limited access authority is used for forbidding the access to at least part of user data in the data of the target application after the target application is logged in with the first identity information.
Further, the information processing apparatus further includes: the second obtaining unit is used for obtaining a second operation of the user on the native icon, wherein the second operation is different from the first operation; the device comprises a determining unit, a judging unit and a judging unit, wherein the determining unit is used for determining whether the target application supports a multi-identity information login function or not; the second response unit is used for responding to the second operation if the second operation is supported and searching second identity information corresponding to the second operation through the mapping relation; and the second login unit is used for logging in the target application by using the second identity information.
In practical applications, the first obtaining Unit, the first responding Unit, the first logging Unit, the right management Unit, the second obtaining Unit, the determining Unit, the second responding Unit, and the second logging Unit may be implemented by a Central Processing Unit (CPU), a microprocessor Unit (MPU), a Digital Signal Processor (DSP), or a Field Programmable Gate Array (FPGA).
Here, it should be noted that: the description of the above device embodiment is similar to the description of the above method embodiment, and has similar beneficial effects to the method embodiment, and therefore, the description is omitted. For technical details that are not disclosed in the embodiments of the apparatus of the present invention, please refer to the description of the embodiments of the method of the present invention for understanding, and therefore, for brevity, will not be described again.
EXAMPLE six
Based on the same inventive concept, the present embodiment provides a terminal. Fig. 6 is a schematic structural diagram of a terminal in a sixth embodiment of the present invention, and referring to fig. 6, the terminal 60 includes: a touchable display screen 601 and a processor 602, wherein the touchable display screen 601 is used for obtaining a first operation of a native icon of a target application by a user; the processor 602 is configured to, in response to the first operation, search for first identity information corresponding to the first operation through a mapping relationship between a prestored operation and identity information; and logging in the target application by using the first identity information.
Further, the processor is further configured to obtain corresponding target application data according to the first identity information; and running the target application based on the target application data, and logging in the target application with the first identity information.
Furthermore, the touchable display screen is also used for acquiring the user biological characteristic information corresponding to the first operation in the process of obtaining the first operation; the processor is also used for matching the user biological characteristic information with the pre-stored biological characteristic information; and if the identity information is matched with the first operation, responding to the first operation, and searching the first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information.
Further, the processor is further configured to set an access right of the first identity information to a restricted access right, wherein the restricted access right is used to indicate that access to at least a part of the user data of the target application is prohibited after the first identity information logs into the target application.
Further, the touchable display screen is also used for obtaining a second operation of the native icon by the user, wherein the second operation is different from the first operation; the processor is further used for determining whether the target application supports a multi-identity information login function; if yes, responding to the second operation, and searching second identity information corresponding to the second operation through the mapping relation; and logging in the target application by using the second identity information.
Here, it should be noted that: the above description of the terminal embodiment is similar to the above description of the method embodiment, and has similar beneficial effects to the method embodiment, and therefore is not repeated herein. For technical details not disclosed in the terminal embodiment of the present invention, please refer to the description of the method embodiment of the present invention for understanding, and therefore will not be described again for brevity.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (8)

1. An information processing method, characterized in that the method comprises:
obtaining a first operation of a user on a native icon of a target application;
responding to the first operation, and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information;
logging in the target application through the native icon with the first identity information;
obtaining a second operation of the native icon by the user, wherein the second operation is different from the first operation;
determining whether the target application supports a multi-identity information login function;
if yes, responding to the second operation, and searching second identity information corresponding to the second operation through the mapping relation;
and simultaneously logging in the target application through the split-body icon corresponding to the native icon by using the second identity information.
2. The method of claim 1, wherein said logging into said target application with said first identity information comprises: acquiring corresponding target application data according to the first identity information;
and running the target application based on the target application data, and logging in the target application with the first identity information.
3. The method of claim 1, wherein the first operation of obtaining the native icon of the target application by the user comprises: in the process of obtaining the first operation, collecting user biological characteristic information corresponding to the first operation;
matching the user biological characteristic information with pre-stored biological characteristic information;
correspondingly, the searching for the first identity information corresponding to the first operation through the mapping relationship between the prestored operation and the identity information in response to the first operation includes: and if the first operation is matched with the second operation, responding to the first operation, and searching the first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information.
4. The method of claim 3, wherein prior to said logging into said target application with said first identity information, said method further comprises: setting the access right of the first identity information as a limited access right, wherein the limited access right is used for indicating that at least part of user data of a target application is forbidden to be accessed after the first identity information logs in the target application.
5. An information processing apparatus characterized in that the apparatus comprises: the device comprises a first obtaining unit, a first response unit and a first login unit; the first obtaining unit is used for obtaining a first operation of a user on a native icon of a target application;
the first response unit is used for responding to the first operation and searching first identity information corresponding to the first operation through a mapping relation between prestored operation and identity information;
the first login unit is used for logging in the target application through the native icon according to the first identity information;
the device further comprises: the device comprises a second obtaining unit, a determining unit, a second responding unit and a second login unit; the second obtaining unit is used for obtaining a second operation of the native icon by the user, wherein the second operation is different from the first operation;
the determining unit is used for determining whether the target application supports a multi-identity information login function or not;
the second response unit is configured to respond to the second operation if the second operation is supported, and search for second identity information corresponding to the second operation through the mapping relationship;
and the second login unit is used for simultaneously logging in the target application through the body-separated icon corresponding to the native icon by using the second identity information.
6. The apparatus according to claim 5, wherein the first login unit is further configured to obtain corresponding target application data according to the first identity information; and running the target application based on the target application data, and logging in the target application with the first identity information.
7. The apparatus according to claim 5, wherein the first obtaining unit is further configured to, in the process of obtaining the first operation, collect user biometric information corresponding to the first operation; matching the user biological characteristic information with pre-stored biological characteristic information; the first response unit is further configured to respond to the first operation if the first operation is matched with the second operation, and search for first identity information corresponding to the first operation through a mapping relationship between prestored operation and identity information.
8. A terminal, characterized in that the terminal comprises: a touchable display screen and a processor; the touchable display screen is used for obtaining a first operation of a user on a native icon of a target application;
the processor is used for responding to the first operation and searching first identity information corresponding to the first operation through a pre-stored mapping relation between the operation and the identity information; logging in the target application through the native icon with the first identity information;
the processor is further configured to determine whether the target application supports a multi-identity information login function; if yes, responding to a second operation, and searching second identity information corresponding to the second operation through the mapping relation; and simultaneously logging in the target application through the split icon corresponding to the native icon by using the second identity information.
CN201611159088.7A 2016-12-13 2016-12-13 Information processing method and device and terminal Active CN108460259B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611159088.7A CN108460259B (en) 2016-12-13 2016-12-13 Information processing method and device and terminal
PCT/CN2017/091712 WO2018107727A1 (en) 2016-12-13 2017-07-04 Method and device for information processing, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611159088.7A CN108460259B (en) 2016-12-13 2016-12-13 Information processing method and device and terminal

Publications (2)

Publication Number Publication Date
CN108460259A CN108460259A (en) 2018-08-28
CN108460259B true CN108460259B (en) 2022-12-02

Family

ID=62558183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611159088.7A Active CN108460259B (en) 2016-12-13 2016-12-13 Information processing method and device and terminal

Country Status (2)

Country Link
CN (1) CN108460259B (en)
WO (1) WO2018107727A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924258B (en) * 2018-08-14 2022-07-08 深圳壹账通智能科技有限公司 Background information pushing method and device, computer equipment and storage medium
CN111427709B (en) * 2020-03-30 2023-07-21 努比亚技术有限公司 Application program splitting control method, device and computer readable storage medium
CN111459358B (en) * 2020-03-31 2021-08-17 维沃移动通信有限公司 Application program control method and electronic equipment
CN112165493B (en) * 2020-09-30 2023-02-21 惠州市善居电子商务有限公司 Identity login switching method and device, computer equipment and storage medium
CN113240500A (en) * 2021-06-11 2021-08-10 维沃移动通信有限公司 Information display method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102368750A (en) * 2011-09-30 2012-03-07 上海量明科技发展有限公司 Display method and system of multi-account login interface
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN104363205A (en) * 2014-10-17 2015-02-18 小米科技有限责任公司 Application login method and device
CN104394133A (en) * 2014-11-14 2015-03-04 百度在线网络技术(北京)有限公司 Login method and login system
CN105760045A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Application program login method, application program login device and terminal
CN105871841A (en) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 Method and device for logging in target equipment and generating login information
CN106203143A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of application program locking

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050269402A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
US20130312073A1 (en) * 2012-05-16 2013-11-21 Rajdeep Srivastav Methods and systems for authentication of multiple sign-in accounts
CN103576847B (en) * 2012-08-09 2016-03-30 腾讯科技(深圳)有限公司 Obtain the method and apparatus of account information
CN104125063B (en) * 2013-04-28 2016-10-12 腾讯科技(深圳)有限公司 Authorization and authentication method, equipment and system
CN106034134B (en) * 2015-03-19 2019-12-20 腾讯科技(深圳)有限公司 Method, auxiliary method and device for carrying out identity authentication request in webpage application program
CN106161392B (en) * 2015-04-17 2019-08-23 深圳市腾讯计算机系统有限公司 A kind of auth method and equipment
CN104866752B (en) * 2015-05-12 2018-09-04 广东欧珀移动通信有限公司 A kind of application guard method and user terminal
CN105094898A (en) * 2015-07-08 2015-11-25 广东欧珀移动通信有限公司 Method for switching account of application program and terminal
CN105117209B (en) * 2015-07-27 2019-02-12 小米科技有限责任公司 Using exchange method and device
CN106201748A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of Message Processing based on mobile terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102368750A (en) * 2011-09-30 2012-03-07 上海量明科技发展有限公司 Display method and system of multi-account login interface
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN104363205A (en) * 2014-10-17 2015-02-18 小米科技有限责任公司 Application login method and device
CN104394133A (en) * 2014-11-14 2015-03-04 百度在线网络技术(北京)有限公司 Login method and login system
CN105760045A (en) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 Application program login method, application program login device and terminal
CN105871841A (en) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 Method and device for logging in target equipment and generating login information
CN106203143A (en) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 Method, device and the mobile terminal of a kind of application program locking

Also Published As

Publication number Publication date
CN108460259A (en) 2018-08-28
WO2018107727A1 (en) 2018-06-21

Similar Documents

Publication Publication Date Title
CN108460259B (en) Information processing method and device and terminal
CN106055996B (en) Multimedia information sharing method and mobile terminal
KR20190085543A (en) Method and apparatus for generating security questions and verifying identities
WO2016127426A1 (en) Method and apparatus for displaying application and picture, and electronic device
CN104866752B (en) A kind of application guard method and user terminal
CN106648384B (en) Service calling method and device
CN104809174A (en) Opening method of terminal application
CN105677222B (en) Application message methods of exhibiting, application message show device and terminal
US10075430B2 (en) Method and system for efficient password input
CN105868617B (en) Application program encryption method and mobile terminal
CN105550627A (en) Fingerprint verification method and apparatus
CN109063504B (en) Private file access method, mobile terminal and storage medium
US20130337873A1 (en) Method And Apparatus For Generating Application Icon
CN106547451A (en) Open application program method more, open application programmer and terminal more
WO2022022566A1 (en) Graphic code identification method and apparatus and electronic device
CN104808899A (en) Terminal
CN113127432A (en) Operation execution method, device, electronic equipment and medium
CN109359582A (en) Information search method, information search device and mobile terminal
CN112533072A (en) Image sending method and device and electronic equipment
CN105760729B (en) Login method and electronic equipment
CN105426823A (en) Fingerprint identification method, device and terminal
WO2023103901A1 (en) Application management method and apparatus, and electronic device
CN112000258A (en) Operation control method and device, intelligent terminal and storage medium
CN106778296B (en) Access method, device and terminal for access object
CN106933666B (en) Method for calling information input program and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant