CN115865446A - Application program login method and device, processor and electronic equipment - Google Patents

Application program login method and device, processor and electronic equipment Download PDF

Info

Publication number
CN115865446A
CN115865446A CN202211475355.7A CN202211475355A CN115865446A CN 115865446 A CN115865446 A CN 115865446A CN 202211475355 A CN202211475355 A CN 202211475355A CN 115865446 A CN115865446 A CN 115865446A
Authority
CN
China
Prior art keywords
graph
application program
target object
authentication
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211475355.7A
Other languages
Chinese (zh)
Inventor
戎修凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202211475355.7A priority Critical patent/CN115865446A/en
Publication of CN115865446A publication Critical patent/CN115865446A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The application discloses a login method and device of an application program, a processor and electronic equipment, and relates to the technical field of information security. The method comprises the following steps: acquiring a first graph generated after the first device successfully logs in an application program, wherein the application program is the application program corresponding to the metasma; acquiring a second graph generated when a second device logs in an application program, wherein the credibility of the second device is smaller than that of the first device; authenticating the target object according to the first graph and the second graph to obtain an authentication result; and logging in the application program on the second equipment according to the authentication result. By the method and the device, the problems that in the related art, when the user logs in the application program corresponding to the metasma in the untrusted device, the user is authenticated in a password or verification code mode, user information is easy to leak, and the safety of the application program corresponding to the metasma is difficult to guarantee are solved.

Description

Application program login method and device, processor and electronic equipment
Technical Field
The application relates to the technical field of information security, in particular to a login method and device of an application program, a processor and electronic equipment.
Background
With the popularization of various metastic devices such as AR (Augmented Reality technology)/VR (Virtual Reality technology), a user can log in an application program corresponding to the metastic space through any device. In the related art, the authentication mode of the metasma includes a user name + password, biometric authentication, a dynamic password, a short message verification code, and the like. If the user logs in the metasma on a device (non-trusted device) other than the trusted device, authentication is also required by the above authentication method.
However, when a user logs in the metasma in a device (non-trusted device) other than the trusted device, the current authentication method has a risk of leakage of sensitive information of the user or inconvenience in operation.
For example, if the user logs in the meta universe of the untrusted device in a user name + password mode, the risk of leakage of the user name and the password exists; if the biometric authentication is used for logging in the meta universe in the untrusted device, the risk that the biometric features of the user are illegally collected exists; if the dynamic password is used for logging in the meta universe in the untrusted device, a long and irregular password string needs to be input by a user, so that the operation is inconvenient; if the user uses the short message verification code to log in the meta universe in the untrusted device, the user must rely on the mobile phone, and meanwhile, the risk that the short message verification code is illegally intercepted exists.
Aiming at the problems that in the related art, when a user logs in an application program corresponding to the metasma on an untrusted device, the user is authenticated in a password or verification code mode, user information is easy to leak, and the safety of the application program corresponding to the metasma is difficult to ensure, an effective solution is not provided at present.
Disclosure of Invention
The application mainly aims to provide an application program login method and device, a processor and an electronic device, so as to solve the problems that in the related art, when a user logs in an application program corresponding to a metasma in an untrusted device, the user is authenticated in a password or verification code mode, user information is easily leaked, and the safety of the application program corresponding to the metasma is difficult to guarantee.
In order to achieve the above object, according to one aspect of the present application, there is provided a login method of an application. The method comprises the following steps: acquiring a first graph generated after a first device successfully logs in an application program, wherein the application program is an application program corresponding to a metasma; acquiring a second graph generated when a second device logs in the application program, wherein the credibility of the second device is smaller than that of the first device; authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device; and logging in the application program on the second equipment according to the authentication result.
Further, authenticating the target object according to the first graph and the second graph, and obtaining an authentication result includes: calculating the similarity between the first graph and the second graph; judging whether the similarity between the first graph and the second graph is larger than a preset threshold value or not; if the similarity between the first graph and the second graph is larger than the preset threshold value, the target object passes the authentication; and if the similarity between the first graph and the second graph is not greater than the preset threshold, indicating that the target object is not authenticated.
Further, before calculating the similarity between the first graph and the second graph, the method further comprises: encrypting the second graph to obtain an encrypted second graph; and sending the encrypted second graph to a background system corresponding to the meta universe.
Further, calculating the similarity between the first graph and the second graph includes: decrypting the encrypted second graph to obtain a decrypted second graph; performing risk identification processing on the target object, the second device and the decrypted second graph to obtain a first risk identification result; and calculating the similarity between the first graph and the second graph according to the first risk identification result.
Further, before obtaining the first graph generated after the first device successfully logs in the application program, the method further comprises: acquiring target data generated when the first device logs in the application program; decrypting the target data to obtain decrypted target data; performing risk identification processing on the target object and the first equipment to obtain a first risk identification result; and logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
Further, after logging in the application program by the first device according to the decrypted target data and the first risk identification result, the method further includes: determining the first graph; encrypting the first graph to obtain an encrypted first graph; and sending the encrypted first graph to a background system corresponding to the meta universe.
Further, after sending the encrypted first graph to a background system corresponding to the metasma, the method further includes: decrypting the encrypted first graph to obtain a decrypted first graph; carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result; and storing the decrypted first graph to a background system corresponding to the metasma according to the second risk identification result, so as to authenticate the target object through the first graph in the background system corresponding to the metasma.
Further, logging in the application program on the second device according to the authentication result includes: if the authentication result shows that the target object passes the authentication, the target object successfully logs in the application program on the second equipment; and if the authentication result shows that the target object is not authenticated, the target object fails to log in the application program on the second equipment.
In order to achieve the above object, according to another aspect of the present application, there is provided a login apparatus for an application. The device includes: the device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a first graph generated after a first device successfully logs in an application program, and the application program is an application program corresponding to a metasma; a second obtaining unit, configured to obtain a second graph generated when a second device logs in the application program, where a trustworthiness of the second device is smaller than a trustworthiness of the first device; the first authentication unit is used for authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device; and the first login unit is used for logging in the application program on the second equipment according to the authentication result.
Further, the first authentication unit includes: the first calculation module is used for calculating the similarity between the first graph and the second graph; the first judging module is used for judging whether the similarity between the first graph and the second graph is greater than a preset threshold value or not; the first determining module is used for indicating that the target object passes the authentication if the similarity between the first graph and the second graph is greater than the preset threshold value; and the second determining module is used for indicating that the target object is not authenticated if the similarity between the first graph and the second graph is not greater than the preset threshold.
Further, the apparatus further comprises: the first processing unit is used for encrypting the second graph before calculating the similarity between the first graph and the second graph to obtain an encrypted second graph; and the first sending unit is used for sending the encrypted second graph to a background system corresponding to the metasma.
Further, the first calculation module includes: the first processing submodule is used for decrypting the encrypted second graph to obtain a decrypted second graph; the second processing submodule is used for carrying out risk identification processing on the target object, the second equipment and the decrypted second graph to obtain a first risk identification result; and the first calculation submodule is used for calculating the similarity between the first graph and the second graph according to the first risk identification result.
Further, the apparatus further comprises: a third acquisition unit configured to acquire target data generated when a first device logs in an application before acquiring a first graphic generated after the first device successfully logs in the application; the second processing unit is used for decrypting the target data to obtain decrypted target data; the third processing unit is used for carrying out risk identification processing on the target object and the first equipment to obtain a first risk identification result; and the second login unit is used for logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
Further, the apparatus further comprises: a first determining unit, configured to determine the first graph after the first device logs in the application program according to the decrypted target data and the first risk identification result; the fourth processing unit is used for encrypting the first graph to obtain an encrypted first graph; and the second sending unit is used for sending the encrypted first graph to a background system corresponding to the metasma.
Further, the apparatus further comprises: the fifth processing unit is used for decrypting the encrypted first graph after the encrypted first graph is sent to the background system corresponding to the meta universe, so that the decrypted first graph is obtained; the sixth processing unit is used for carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result; and the first storage unit is used for storing the decrypted first graph to the background system corresponding to the metasphere according to the second risk identification result so as to authenticate the target object through the first graph in the background system corresponding to the metasphere.
Further, the first login unit includes: a third determining module, configured to indicate that the application program is successfully logged in the second device if the authentication result indicates that the target object passes authentication; and the fourth determining module is used for indicating that the second device fails to log in the application program if the authentication result indicates that the target object is not authenticated.
In order to achieve the above object, according to another aspect of the present application, there is provided a processor for executing a program, wherein the program executes a login method of an application program according to any one of the above.
In order to achieve the above object, according to another aspect of the present application, there is provided an electronic device including one or more processors and a memory for storing one or more programs, wherein when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the login method of the application program according to any one of the above.
Through the application, the following steps are adopted: acquiring a first graph generated after the first device successfully logs in an application program, wherein the application program is the application program corresponding to the meta universe; acquiring a second graph generated when a second device logs in an application program, wherein the credibility of the second device is smaller than that of the first device; authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in an application program on the second device; according to the authentication result, the application program is logged in the second device, and the problems that in the related art, when the user logs in the application program corresponding to the metasma in the untrusted device, the user is authenticated in a password or verification code mode, user information is easily leaked, and the safety of the application program corresponding to the metasma is difficult to guarantee are solved. According to the method, an object to be logged in the application program on the second device is authenticated according to the acquired first graph generated after the first device successfully logs in the application program corresponding to the metasphere and the acquired second graph generated when the second device logs in the application program, an authentication result is obtained, and the application program is logged in the second device according to the obtained authentication result, so that information of a user is protected from being leaked, and the effect of ensuring the safety of the application program corresponding to the logged-in metasphere is achieved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flowchart of a login method of an application program according to an embodiment of the present application;
FIG. 2 is a first flowchart of a login method of an application program according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an application program corresponding to the meta universe of the non-trusted device login in the embodiment of the application;
FIG. 4 is a schematic diagram of a login system for an application provided according to an embodiment of the application;
FIG. 5 is a schematic diagram of a trusted device generating a hand-drawn authentication graph in an embodiment of the present application;
FIG. 6 is a schematic diagram of an application program corresponding to the non-trusted device login metauniverse based on a hand-drawn graph in an embodiment of the present application;
FIG. 7 is a schematic diagram of a login device for an application provided according to an embodiment of the application;
fig. 8 is a schematic diagram of an electronic device provided according to an embodiment of the application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the accompanying drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that relevant information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to data for presentation, analyzed data, etc.) referred to in the present disclosure are information and data that are authorized by the user or sufficiently authorized by various parties. For example, an interface is provided between the system and the relevant user or organization, before obtaining the relevant information, an obtaining request needs to be sent to the user or organization through the interface, and after receiving the consent information fed back by the user or organization, the relevant information is obtained.
For convenience of description, some terms or expressions referred to in the embodiments of the present application are explained below:
metauniverse (metaaverse): the Yuanxus is a digital living space which is constructed by human beings by using digital technology, is a virtual world which is mapped by or exceeds the real world and can interact with the real world, and has a novel social system.
The present invention is described below with reference to preferred implementation steps, and fig. 1 is a flowchart of a login method for an application according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S101, a first graph generated after the first device successfully logs in an application program is acquired, wherein the application program is the application program corresponding to the meta universe.
For example, after the user logs in the application program corresponding to the metasphere in the trusted device (the first device described above), the user may hand-draw a graphic (the first graphic described above) in the metasphere and send the hand-drawn graphic to the metasphere background (the background system corresponding to the metasphere), and then the metasphere background may acquire the hand-drawn graphic.
Step S102, a second graph generated when a second device logs in the application program is obtained, wherein the credibility of the second device is smaller than the credibility of the first device.
For example, when the user logs in the metas at the untrusted device (the second device described above), the user hand-draws the graphics (the second graphics described above) at the authentication stage and sends the hand-drawn graphics to the metas backend, and then the metas backend can retrieve the hand-drawn graphics.
And step S103, authenticating the target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device.
For example, the metaspher background calculates the similarity between the two hand-drawn figures, and authenticates the user (the target object) using the calculated similarity.
Step S104, according to the authentication result, logging in the application program on the second device.
For example, the metas background logs in the application program corresponding to the metas in the untrusted device according to the authentication result, that is, determines whether to allow the user to log in the application program corresponding to the metas in the untrusted device.
Through the steps S101 to S104, the object to be logged in the application program on the second device is authenticated according to the acquired first graph generated after the first device successfully logs in the application program corresponding to the meta universe and the acquired second graph generated when the second device logs in the application program, so as to obtain an authentication result, and the application program is logged in the second device according to the obtained authentication result, so that the information of the user is protected from being leaked, and the effect of ensuring the security of the application program corresponding to the log-in meta universe is achieved.
In order to quickly and accurately log in the application program on the first device, in the login method of the application program provided in the embodiment of the present application, the application program may also be logged in the first device through the following steps: acquiring target data generated when a first device logs in an application program; decrypting the target data to obtain decrypted target data; carrying out risk identification processing on the target object and the first equipment to obtain a first risk identification result; and logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
For example, a user logs in a metasma first by a trusted device, then initiates a request for logging in the metasma, and simultaneously encrypts login data generated when the user logs in an application program corresponding to the metasma, and sends the encrypted user login data to a metasma background, and then the metasma background decrypts the user login data, and carries out risk identification on a login user, a metasma terminal device and the like according to the decrypted user login data; if the login user and the metastic terminal equipment are identified through the risk identification, the metastic background authenticates the login user again, and the login user comprises a static password, a fingerprint, a gesture, a dynamic password and the like; if the authentication is successful, the metas background allows the user to successfully log in the metas. In addition, if the login user and the metastic terminal equipment are not identified by the risk identification, the metastic background does not authenticate the user any more, and the user is not allowed to successfully log in the metastic directly. If the user authentication is unsuccessful, the metas background does not allow the user to successfully log in the metas.
By the scheme, whether the user is allowed to log in the application program corresponding to the meta universe can be determined quickly and accurately.
In order to quickly and accurately send the first graph to the backend system corresponding to the meta universe, in the login method of the application program provided by the embodiment of the application, the first graph can be further sent to the backend system corresponding to the meta universe through the following steps: determining a first graph; encrypting the first graph to obtain an encrypted first graph; and sending the encrypted first graph to a background system corresponding to the metasma.
For example, the metas background allows the user to manually draw the authentication graph after the user successfully logs in the metas, encrypts the manually drawn authentication graph, and uploads the encrypted manually drawn authentication graph to the metas background.
By the scheme, the hand-drawn authentication graph of the user can be rapidly and accurately sent to the metaspace background, and the hand-drawn authentication graph is encrypted, so that the security of the graph is improved.
In order to quickly and accurately store the decrypted first graph to the background system corresponding to the metasphere, in the login method of the application program provided in the embodiment of the present application, the decrypted first graph may also be stored to the background system corresponding to the metasphere through the following steps: decrypting the encrypted first graph to obtain a decrypted first graph; carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result; and storing the decrypted first graph to a background system corresponding to the metasma according to the second risk identification result, so as to authenticate the target object through the first graph in the background system corresponding to the metasma.
For example, the metasphere background decrypts the user hand-drawn graphic data, and then performs risk identification on the decrypted hand-drawn graphic; and if the decrypted hand-drawn graph passes risk identification, the metacarpal background stores the hand-drawn graph as an authentication means of the user.
By the scheme, the authentication graph drawn by the user can be rapidly and accurately stored in the metaspace background.
In order to quickly and accurately send the second graph to the backend system corresponding to the meta universe, in the login method of the application program provided by the embodiment of the application, the second graph can be sent to the backend system corresponding to the meta universe through the following steps: encrypting the second graph to obtain an encrypted second graph; and sending the encrypted second graph to a background system corresponding to the metasma.
For example, a user enters a username to log in at an untrusted device; drawing an authentication graph in the graph drawing plate; then encrypting the hand-drawn authentication graph; and then uploading the encrypted hand-drawn authentication graph to the metasphere background.
By the scheme, the authentication graph hand-drawn by the user on the untrusted device can be rapidly and accurately sent to the metaspace background, and the hand-drawn authentication graph is encrypted, so that the security of the graph is improved.
In order to quickly and accurately calculate the similarity between the first graph and the second graph, in the login method of the application program provided in the embodiment of the present application, the similarity between the first graph and the second graph may be calculated through the following steps: decrypting the encrypted second graph to obtain a decrypted second graph; risk identification processing is carried out on the target object, the second equipment and the decrypted second graph, and a first risk identification result is obtained; and calculating the similarity between the first graph and the second graph according to the first risk identification result.
For example, the metaspace background decrypts user hand-drawn graphical data; the metastic universe background carries out risk monitoring on the login user, the metastic universe terminal equipment, the decrypted hand-drawn graph and the like; if the logged-in user, the metastic terminal equipment, the decrypted hand-drawn figure and the like pass risk monitoring, the metastic background calculates the similarity between the figure and the authenticated hand-drawn figure.
By the scheme, the similarity between the two graphs can be rapidly and accurately calculated.
Fig. 2 is a first flowchart of a login method of an application according to an embodiment of the present application, and as shown in fig. 2, in the login method of an application according to the embodiment of the present application, authenticating a target object according to a first graph and a second graph, and obtaining an authentication result includes:
step S201, calculating the similarity between the first graph and the second graph;
step S202, judging whether the similarity between the first graph and the second graph is larger than a preset threshold value or not;
step S203, if the similarity between the first graph and the second graph is larger than a preset threshold value, the target object passes the authentication;
in step S204, if the similarity between the first graph and the second graph is not greater than the preset threshold, it indicates that the target object is not authenticated.
For example, whether the similarity of the hand-drawn graph is greater than a preset threshold value or not is judged, and if the similarity of the hand-drawn graph is greater than the preset threshold value, normal login can be performed; and if the similarity of the hand-drawn graph is not greater than a preset threshold value, normal login cannot be performed.
In conclusion, when the user logs in the meta universe through the untrusted device, the authentication can be performed in a hand-drawn graph mode, leakage of user information is avoided, user experience is improved, meanwhile, due to the fact that the hand-drawn graph has more possibilities, cracking difficulty is increased, and authentication safety is improved.
In order to quickly and accurately log in the application program corresponding to the meta universe, in the login method of the application program provided by the embodiment of the application, the application program corresponding to the meta universe can be also logged in through the following steps: if the authentication result shows that the target object passes the authentication, the application program is successfully logged in the second equipment; and if the authentication result shows that the target object is not authenticated, the target object fails to log in the application program on the second device.
For example, if the user authentication passes, the application program corresponding to the metasma can be normally logged in; and if the user authentication is not passed, normally logging in the application program corresponding to the meta universe.
By the scheme, the safety of the application program corresponding to the user login metas can be ensured.
Through the method provided by the embodiment of the application, for example, fig. 3 is a schematic diagram of an application program corresponding to the untrusted device login metas, as shown in fig. 3, when the user logs in metas, the user can perform authentication in a hand-drawn graph manner, leakage of user information is avoided, user experience is improved, and meanwhile, because the hand-drawn graph has more possibilities, cracking difficulty is increased, and authentication security is improved.
In this embodiment, after the user logs in the metasma at the trusted device, a graph may be hand-drawn in the metasma, and the graph is used as an authentication identifier for the user to log in at the untrusted device. When the user logs in the meta universe in the untrusted device, the user manually draws the graph in the authentication link. The meta universe background calculates the similarity between the hand-drawn graph and the graph hand-drawn on the trusted device, and if the similarity is larger than a preset threshold value, the user passes authentication and can normally log in the meta universe; and if the similarity is smaller than a preset threshold value, the user authentication fails, and the user cannot log in the meta universe.
By default, the hand-drawn graphic can only be used once. After the user successfully logs in the meta universe, whether the hand-drawn graph can be used continuously or not can be set, and if the user allows the hand-drawn graph to be used continuously, the user can use the hand-drawn graph to log in the meta universe continuously on other non-trusted devices.
For example, fig. 4 is a schematic diagram of a login system of an application program provided according to an embodiment of the present application, and as shown in fig. 4, the meta universe background mainly includes the following services:
(1) And (5) authenticating the service. The authentication service is responsible for providing authentication services such as passwords, fingerprints, gestures, dynamic passwords and the like for the user, and the user can log in the meta universe after passing authentication.
(2) A risk control service. The risk control service is responsible for carrying out full-process monitoring on a login user, a metacavity terminal device and the like, and comprises factors such as behavior conditions, login time, login error times, equipment risks, hand-drawn graphs and the like of the user, when the risk of the process is detected, the process is terminated, and the user is prohibited from logging in the metacavity.
(3) A security control service. The security control service is responsible for distributing symmetric keys for login users, and is used for encrypting and decrypting login data of the users. When the user initiates authentication, the security authentication service sends the symmetric key generation factor to the terminal equipment which the user logs in. And the terminal equipment generates a symmetric key according to the key generation factor through the encryption component and encrypts the user login data.
(4) A graphics storage service. The graph storage service is responsible for storing the authentication graph of the user hand-drawn on the feasible device, namely the authenticated hand-drawn graph.
(5) A graphics authentication service. The graph identification service is responsible for comparing the similarity between the hand-drawn graph of the user on the untrusted device and the authenticated hand-drawn graph, and if the similarity is greater than a preset threshold value, the user authentication is passed; and if the similarity is smaller than the preset threshold value, the user authentication fails.
The metastic terminal equipment mainly comprises the following components:
(1) And (6) logging in the component. The login component is used for a user to log in the metasma at a metasma terminal device, and the supported login mode comprises the following steps: static password login, fingerprint login, gesture login, dynamic password login, short message authentication code login and the like.
(2) And an encryption component. The encryption component is used for generating an encryption key according to the key generation factor and encrypting login data of a user so as to ensure the security of data transmission in the foreground and the background.
(3) And (4) hand-drawing a graphic assembly. The hand-drawn graphic assembly is used for drawing a graphic in the metacavity terminal equipment by a user, and the user can draw any graphic on the assembly for login authentication of the metacavity.
For example, fig. 5 is a schematic diagram of generating a hand-drawn authentication graph in the trusted device in the embodiment of the present application, and as shown in fig. 5, the step of generating the hand-drawn authentication graph in the trusted device is:
step 1: a user logs in a metasma at a trusted device;
and 2, step: initiating a log-in metastic request;
and step 3: the safety control service decrypts the user login data;
and 4, step 4: the risk control service identifies the risk of the login user, the meta universe terminal equipment and the like;
and 5: the authentication service authenticates the login user in a static password, fingerprint, gesture, dynamic password and other modes;
and 6: the user successfully logs in the meta universe;
and 7: the user hand-draws an authentication graph;
and 8: encrypting the hand-drawn authentication graph;
and step 9: uploading a hand-drawn authentication graph;
step 10: the safety control service decrypts the user hand-drawn graphic data;
step 11: the risk control service identifies the hand drawing figure;
step 12: the graph storage service stores the hand-drawn graph as an authentication means of the user.
For example, fig. 6 is a schematic diagram of an application program corresponding to the meta universe logged in the untrusted device based on the hand-drawn graph in the embodiment of the present application, and as shown in fig. 6, the step of logging in the application program corresponding to the meta universe in the untrusted device based on the hand-drawn graph includes:
step 1: a user inputs a user name to be logged in at an untrusted device;
step 2: a user draws an authentication graph in the graph drawing plate;
and step 3: encrypting the hand-drawn authentication graph;
and 4, step 4: upload hand-painted authentication graph
And 5: the safety control service decrypts the user hand-drawn graphic data;
step 6: the risk control service carries out risk monitoring on a login user, a metacavity terminal device, a hand-drawn graph and the like;
and 7: the graph identifying service compares the similarity of the graph and the authenticated hand-drawn graph;
and step 8: the similarity of the hand-drawn graphs is greater than a preset threshold value, and normal login can be realized;
and step 9: the user successfully logs in the metas.
In summary, according to the login method for the application program provided by the embodiment of the application program, the first graph generated after the first device successfully logs in the application program is acquired, wherein the application program is an application program corresponding to the metas; acquiring a second graph generated when a second device logs in an application program, wherein the credibility of the second device is smaller than that of the first device; authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second equipment; according to the authentication result, the application program is logged in the second device, and the problems that in the related art, when the user logs in the application program corresponding to the metasma in the untrusted device, the user is authenticated in a password or verification code mode, user information is easily leaked, and the safety of the application program corresponding to the metasma is difficult to guarantee are solved. According to the method, an object to be logged in the application program on the second device is authenticated according to the acquired first graph generated after the first device successfully logs in the application program corresponding to the metasphere and the acquired second graph generated when the second device logs in the application program, an authentication result is obtained, and the application program is logged in the second device according to the obtained authentication result, so that information of a user is protected from being leaked, and the effect of ensuring the safety of the application program corresponding to the logged-in metasphere is achieved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than here.
The embodiment of the present application further provides a login device for an application, and it should be noted that the login device for an application according to the embodiment of the present application may be used to execute the login method for an application according to the embodiment of the present application. The following describes a login device for an application program according to an embodiment of the present application.
Fig. 7 is a schematic diagram of a login device of an application according to an embodiment of the present application. As shown in fig. 7, the apparatus includes: a first acquisition unit 701, a second acquisition unit 702, a first authentication unit 703, and a first login unit 704.
Specifically, the first obtaining unit 701 is configured to obtain a first graph generated after a first device successfully logs in an application program, where the application program is an application program corresponding to a metasma;
a second obtaining unit 702, configured to obtain a second graph generated when a second device logs in an application, where a trustworthiness of the second device is smaller than a trustworthiness of the first device;
the first authentication unit 703 is configured to authenticate a target object according to the first graph and the second graph to obtain an authentication result, where the target object is an object to be logged in the application program on the second device;
the first login unit 704 is configured to log in the application program on the second device according to the authentication result.
To sum up, in the login apparatus for an application provided in the embodiment of the present application, the first obtaining unit 701 obtains the first graph generated after the first device successfully logs in the application, where the application is an application corresponding to the metas; a second obtaining unit 702 obtains a second graph generated when a second device logs in an application, where a trustworthiness degree of the second device is smaller than a trustworthiness degree of the first device; the first authentication unit 703 authenticates a target object according to the first graph and the second graph to obtain an authentication result, where the target object is an object to be logged in the application program on the second device; the first login unit 704 logs in the application program on the second device according to the authentication result, and the problem that in the related art, when the user logs in the application program corresponding to the metasma on the untrusted device, the user is authenticated in a password or verification code mode, user information is easily leaked, and the safety of the application program corresponding to the metasma is difficult to guarantee is solved. According to the method, an object to be logged in the application program on the second device is authenticated according to the acquired first graph generated after the first device successfully logs in the application program corresponding to the metasphere and the acquired second graph generated when the second device logs in the application program, an authentication result is obtained, and the application program is logged in the second device according to the obtained authentication result, so that information of a user is protected from being leaked, and the effect of ensuring the safety of the application program corresponding to the logged-in metasphere is achieved.
Optionally, in the login device for an application program provided in an embodiment of the present application, the first authentication unit includes: the first calculation module is used for calculating the similarity between the first graph and the second graph; the first judging module is used for judging whether the similarity between the first graph and the second graph is greater than a preset threshold value or not; the first determining module is used for indicating that the target object passes the authentication if the similarity between the first graph and the second graph is greater than a preset threshold value; and the second determining module is used for indicating that the target object is not authenticated if the similarity between the first graph and the second graph is not greater than a preset threshold value.
Optionally, in the login device for an application provided in the embodiment of the present application, the device further includes: the first processing unit is used for encrypting the second graph before calculating the similarity between the first graph and the second graph to obtain the encrypted second graph; and the first sending unit is used for sending the encrypted second graph to a background system corresponding to the meta universe.
Optionally, in the login device for an application program provided in the embodiment of the present application, the first computing module includes: the first processing submodule is used for decrypting the encrypted second graph to obtain a decrypted second graph; the second processing submodule is used for carrying out risk identification processing on the target object, the second equipment and the decrypted second graph to obtain a first risk identification result; and the first calculation submodule is used for calculating the similarity between the first graph and the second graph according to the first risk identification result.
Optionally, in the login device for an application provided in the embodiment of the present application, the device further includes: a third acquisition unit configured to acquire target data generated when the first device logs in the application before acquiring the first graphic generated after the first device successfully logs in the application; the second processing unit is used for decrypting the target data to obtain decrypted target data; the third processing unit is used for carrying out risk identification processing on the target object and the first equipment to obtain a first risk identification result; and the second login unit is used for logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
Optionally, in the login device for an application provided in the embodiment of the present application, the device further includes: a first determining unit, configured to determine a first graph after the first device logs in the application program according to the decrypted target data and the first risk identification result; the fourth processing unit is used for encrypting the first graph to obtain an encrypted first graph; and the second sending unit is used for sending the encrypted first graph to a background system corresponding to the metasphere.
Optionally, in the login device for an application provided in the embodiment of the present application, the device further includes: the fifth processing unit is used for decrypting the encrypted first graph after the encrypted first graph is sent to a background system corresponding to the meta space, so that the decrypted first graph is obtained; the sixth processing unit is used for carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result; and the first storage unit is used for storing the decrypted first graph to the background system corresponding to the metasphere according to the second risk identification result so as to authenticate the target object through the first graph in the background system corresponding to the metasphere.
Optionally, in the login device for an application program provided in the embodiment of the present application, the first login unit includes: the third determining module is used for indicating that the application program is successfully logged in the second equipment if the authentication result indicates that the target object passes the authentication; and the fourth determining module is used for indicating that the login application program fails to be logged in the second device if the authentication result indicates that the target object is not authenticated.
The login device of the application program comprises a processor and a memory, wherein the first acquiring unit 701, the second acquiring unit 702, the first authentication unit 703, the first login unit 704 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the effect of ensuring the safety of the application program corresponding to the log-in meta universe is achieved by adjusting the kernel parameters.
The memory may include volatile memory in a computer readable medium, random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The embodiment of the invention provides a processor, which is used for running a program, wherein the program executes a login method of an application program when running.
As shown in fig. 8, an embodiment of the present invention provides an electronic device, where the device includes a processor, a memory, and a program stored in the memory and executable on the processor, and the processor executes the program to implement the following steps: acquiring a first graph generated after a first device successfully logs in an application program, wherein the application program is an application program corresponding to a metasma; acquiring a second graph generated when a second device logs in the application program, wherein the credibility of the second device is smaller than that of the first device; authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device; and logging in the application program on the second equipment according to the authentication result.
The processor executes the program and further realizes the following steps: authenticating the target object according to the first graph and the second graph, and obtaining an authentication result comprises: calculating the similarity between the first graph and the second graph; judging whether the similarity between the first graph and the second graph is larger than a preset threshold value or not; if the similarity between the first graph and the second graph is larger than the preset threshold value, the target object passes the authentication; and if the similarity between the first graph and the second graph is not greater than the preset threshold, indicating that the target object is not authenticated.
The processor executes the program and further realizes the following steps: before calculating the similarity between the first graph and the second graph, the method further comprises: encrypting the second graph to obtain an encrypted second graph; and sending the encrypted second graph to a background system corresponding to the meta universe.
The processor executes the program and further realizes the following steps: calculating the similarity between the first graph and the second graph includes: decrypting the encrypted second graph to obtain a decrypted second graph; performing risk identification processing on the target object, the second device and the decrypted second graph to obtain a first risk identification result; and calculating the similarity between the first graph and the second graph according to the first risk identification result.
The processor executes the program and further realizes the following steps: before obtaining a first graphic generated after a first device successfully logs into an application, the method further comprises: acquiring target data generated when the first device logs in the application program; decrypting the target data to obtain decrypted target data; performing risk identification processing on the target object and the first equipment to obtain a first risk identification result; and logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
The processor executes the program and further realizes the following steps: after logging in the application program by the first device according to the decrypted target data and the first risk identification result, the method further includes: determining the first graph; encrypting the first graph to obtain an encrypted first graph; and sending the encrypted first graph to a background system corresponding to the meta universe.
The processor executes the program and further realizes the following steps: after sending the encrypted first graph to a background system corresponding to the metasma, the method further includes: decrypting the encrypted first graph to obtain a decrypted first graph; carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result; and storing the decrypted first graph to a background system corresponding to the metasma according to the second risk identification result, so as to authenticate the target object through the first graph in the background system corresponding to the metasma.
The processor executes the program and further realizes the following steps: logging in the application program on the second device according to the authentication result comprises: if the authentication result shows that the target object passes the authentication, the application program is successfully logged in the second equipment; and if the authentication result shows that the target object is not authenticated, the target object fails to log in the application program on the second equipment.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device: acquiring a first graph generated after a first device successfully logs in an application program, wherein the application program is an application program corresponding to a metasma; acquiring a second graph generated when a second device logs in the application program, wherein the credibility of the second device is smaller than that of the first device; authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device; and logging in the application program on the second equipment according to the authentication result.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: authenticating the target object according to the first graph and the second graph, and obtaining an authentication result comprises: calculating the similarity between the first graph and the second graph; judging whether the similarity between the first graph and the second graph is larger than a preset threshold value or not; if the similarity between the first graph and the second graph is larger than the preset threshold value, the target object passes the authentication; and if the similarity between the first graph and the second graph is not greater than the preset threshold, indicating that the target object is not authenticated.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: before calculating the similarity between the first graph and the second graph, the method further comprises: encrypting the second graph to obtain an encrypted second graph; and sending the encrypted second graph to a background system corresponding to the meta universe.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: calculating the similarity between the first graph and the second graph includes: decrypting the encrypted second graph to obtain a decrypted second graph; performing risk identification processing on the target object, the second device and the decrypted second graph to obtain a first risk identification result; and calculating the similarity between the first graph and the second graph according to the first risk identification result.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: before obtaining a first graphic generated after a first device successfully logs into an application, the method further comprises: acquiring target data generated when the first device logs in the application program; decrypting the target data to obtain decrypted target data; performing risk identification processing on the target object and the first equipment to obtain a first risk identification result; and logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: after logging in the application program by the first device according to the decrypted target data and the first risk identification result, the method further includes: determining the first graph; encrypting the first graph to obtain an encrypted first graph; and sending the encrypted first graph to a background system corresponding to the meta universe.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: after sending the encrypted first graph to a background system corresponding to the metasma, the method further includes: decrypting the encrypted first graph to obtain a decrypted first graph; carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result; and storing the decrypted first graph to a background system corresponding to the metasma according to the second risk identification result, so as to authenticate the target object through the first graph in the background system corresponding to the metasma.
When executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: logging in the application program on the second device according to the authentication result comprises: if the authentication result shows that the target object passes the authentication, the target object successfully logs in the application program on the second equipment; and if the authentication result shows that the target object is not authenticated, the target object fails to log in the application program on the second equipment.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional identical elements in the process, method, article, or apparatus comprising the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (11)

1. A login method for an application program, comprising:
acquiring a first graph generated after a first device successfully logs in an application program, wherein the application program is an application program corresponding to a metasma;
acquiring a second graph generated when a second device logs in the application program, wherein the credibility of the second device is smaller than that of the first device;
authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device;
and logging in the application program on the second equipment according to the authentication result.
2. The method of claim 1, wherein authenticating the target object according to the first graph and the second graph, and obtaining the authentication result comprises:
calculating the similarity between the first graph and the second graph;
judging whether the similarity between the first graph and the second graph is larger than a preset threshold value or not;
if the similarity between the first graph and the second graph is larger than the preset threshold value, the target object passes the authentication;
and if the similarity between the first graph and the second graph is not greater than the preset threshold, indicating that the target object is not authenticated.
3. The method of claim 2, wherein prior to calculating the similarity between the first graph and the second graph, the method further comprises:
encrypting the second graph to obtain an encrypted second graph;
and sending the encrypted second graph to a background system corresponding to the meta universe.
4. The method of claim 3, wherein calculating the similarity between the first graph and the second graph comprises:
decrypting the encrypted second graph to obtain a decrypted second graph;
performing risk identification processing on the target object, the second device and the decrypted second graph to obtain a first risk identification result;
and calculating the similarity between the first graph and the second graph according to the first risk identification result.
5. The method of claim 1, wherein prior to obtaining the first graphic generated after the first device successfully logs into the application, the method further comprises:
acquiring target data generated when the first device logs in the application program;
decrypting the target data to obtain decrypted target data;
performing risk identification processing on the target object and the first equipment to obtain a first risk identification result;
and logging in the application program on the first equipment according to the decrypted target data and the first risk identification result.
6. The method of claim 5, wherein after logging in the application program at the first device according to the decrypted target data and the first risk identification result, the method further comprises:
determining the first graph;
encrypting the first graph to obtain an encrypted first graph;
and sending the encrypted first graph to a background system corresponding to the meta universe.
7. The method of claim 6, wherein after sending the encrypted first graphic to a corresponding backend system of the metastic universe, the method further comprises:
decrypting the encrypted first graph to obtain a decrypted first graph;
carrying out risk identification processing on the decrypted first graph to obtain a second risk identification result;
and storing the decrypted first graph to a background system corresponding to the metasma according to the second risk identification result, so as to authenticate the target object through the first graph in the background system corresponding to the metasma.
8. The method of claim 1, wherein logging in the application on the second device according to the authentication result comprises:
if the authentication result shows that the target object passes the authentication, the target object successfully logs in the application program on the second equipment;
and if the authentication result shows that the target object is not authenticated, the target object fails to log in the application program on the second equipment.
9. An apparatus for logging in an application program, comprising:
the device comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a first graph generated after a first device successfully logs in an application program, and the application program is an application program corresponding to a metasma;
a second obtaining unit, configured to obtain a second graph generated when a second device logs in the application program, where a trustworthiness of the second device is smaller than a trustworthiness of the first device;
the first authentication unit is used for authenticating a target object according to the first graph and the second graph to obtain an authentication result, wherein the target object is an object to be logged in the application program on the second device;
and the first login unit is used for logging in the application program on the second equipment according to the authentication result.
10. A processor for executing a program, wherein the program executes to execute a login method of an application program according to any one of claims 1 to 8.
11. An electronic device comprising one or more processors and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the login method for the application program of any one of claims 1 to 8.
CN202211475355.7A 2022-11-23 2022-11-23 Application program login method and device, processor and electronic equipment Pending CN115865446A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211475355.7A CN115865446A (en) 2022-11-23 2022-11-23 Application program login method and device, processor and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211475355.7A CN115865446A (en) 2022-11-23 2022-11-23 Application program login method and device, processor and electronic equipment

Publications (1)

Publication Number Publication Date
CN115865446A true CN115865446A (en) 2023-03-28

Family

ID=85665408

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211475355.7A Pending CN115865446A (en) 2022-11-23 2022-11-23 Application program login method and device, processor and electronic equipment

Country Status (1)

Country Link
CN (1) CN115865446A (en)

Similar Documents

Publication Publication Date Title
CN107743133B (en) Mobile terminal and access control method and system based on trusted security environment
US10719602B2 (en) Method and device for realizing session identifier synchronization
US10560476B2 (en) Secure data storage system
US9515832B2 (en) Process authentication and resource permissions
EP3100171B1 (en) Client authentication using social relationship data
CN106991298B (en) Access method of application program to interface, authorization request method and device
WO2017000829A1 (en) Method for checking security based on biological features, client and server
US20160125180A1 (en) Near Field Communication Authentication Mechanism
US11038878B2 (en) Computer system security using a biometric authentication gateway for user service access with a divided and distributed private encryption key
CN111708991A (en) Service authorization method, service authorization device, computer equipment and storage medium
US20140164762A1 (en) Apparatus and method of online authentication
US9553855B2 (en) Storing a key to an encrypted file in kernel memory
CN109145628B (en) Data acquisition method and system based on trusted execution environment
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
US10333707B1 (en) Systems and methods for user authentication
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
CN107026730B (en) Data processing method, device and system
CN106533685B (en) Identity authentication method, device and system
WO2022173373A1 (en) Secure module and method for app-to-app mutual trust through app-based identity
CN114239000A (en) Password processing method, device, computer equipment and storage medium
CN115865446A (en) Application program login method and device, processor and electronic equipment
WO2017020449A1 (en) Fingerprint reading method and user equipment
CN111046440A (en) Tamper verification method and system for secure area content
CN113271306B (en) Data request and transmission method, device and system
CN113557703B (en) Authentication method and device of network camera

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination