WO2017015854A1 - 一种控制方法及装置 - Google Patents

一种控制方法及装置 Download PDF

Info

Publication number
WO2017015854A1
WO2017015854A1 PCT/CN2015/085295 CN2015085295W WO2017015854A1 WO 2017015854 A1 WO2017015854 A1 WO 2017015854A1 CN 2015085295 W CN2015085295 W CN 2015085295W WO 2017015854 A1 WO2017015854 A1 WO 2017015854A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
target
application
authorization information
authorization
Prior art date
Application number
PCT/CN2015/085295
Other languages
English (en)
French (fr)
Inventor
刘东海
吴殿清
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Priority to PCT/CN2015/085295 priority Critical patent/WO2017015854A1/zh
Publication of WO2017015854A1 publication Critical patent/WO2017015854A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to the field of electronic technology, and more particularly to a control method and apparatus.
  • the present application provides a control method and apparatus for solving the technical problem that the application in various fields in the prior art can only adopt one security identification scheme, and the data security of the terminal is low.
  • a control method is applied to an electronic device, the method comprising:
  • the authorization information list includes a plurality of information groups, each of the information groups respectively corresponding to one application domain, and each of the information groups includes at least one authorization information;
  • a control instruction is executed on the target application based on the comparison result.
  • the above method preferably, presetting the authorization information list of the electronic device, including:
  • the authorization information list includes multiple information groups, and each of the information groups respectively corresponds to one application domain;
  • Each authorization information collected by each of the sensors is separately placed into one information group, wherein the information groups corresponding to the authorization information of the same sensor are different.
  • the above method preferably, executing the control instruction on the target application based on the comparison result, including:
  • the permission control instruction is executed on the target application, otherwise, the prohibited control instruction is executed on the target application.
  • the method further includes:
  • the first prompt information is generated to prompt the current operation as an authorized operation.
  • the method further includes:
  • a second prompt message is generated to prompt the current operation to be an unauthorized operation.
  • the application provides a control device applied to an electronic device, the device comprising:
  • the information list includes a plurality of information groups, each of the information groups respectively corresponding to one application domain, and each of the information groups includes at least one authorization information;
  • a request receiving unit configured to receive an identification request corresponding to the target application on the electronic device
  • a domain determining unit configured to determine an application domain identifier of the target application in the identification request, and determine at least one target authorization information corresponding to the target application in the information group corresponding to the application domain identifier;
  • a request parsing unit configured to parse at least one target information to be identified in the identification request
  • An information comparison unit configured to compare each of the target information and each of the target authorization information to obtain a comparison result
  • an instruction execution unit configured to execute a control instruction on the target application based on the comparison result.
  • the list presetting unit comprises:
  • An information collection subunit configured to separately acquire at least one authorization information by using multiple sensors on the electronic device, where the principle of each of the sensors is different;
  • a list establishing subunit configured to establish a list of authorization information, where the authorization information list includes a plurality of information groups, each of the information groups respectively corresponding to an application domain;
  • the information is placed in a sub-unit, and each authorization information collected by each of the sensors is separately placed into one information group, wherein the information groups corresponding to the authorization information of the same sensor are different.
  • the instruction control unit comprises:
  • a permission execution subunit configured to execute a permission control instruction on the target application when the comparison result indicates that the target information respectively corresponds to the corresponding target authorization information
  • the execution subunit is prohibited to execute the prohibited control instruction on the target application when the comparison result indicates that the target information does not correspond to the corresponding target authorization information, respectively.
  • the above device preferably, further comprises:
  • the first information generating unit is configured to generate, after the permission execution sub-unit performs a permission control instruction on the target application, the first prompt information, where the first prompt information is used to prompt the current operation as an authorized operation.
  • the above device preferably, further comprises:
  • the second information generating unit is configured to generate second prompt information, where the second prompt information is used to prompt the current operation to be an unauthorized operation, after the prohibiting execution sub-unit performs a prohibited control instruction on the target application.
  • a control method and apparatus provided by the present disclosure are provided in advance by setting an authorization information list on an electronic device, and the list includes a plurality of corresponding application areas respectively.
  • the information group After receiving the identification request corresponding to the target application on the electronic device, the information group further determines the corresponding application domain and the target information to be identified in the request according to the identification request, and then the target information and the information corresponding to the application domain.
  • the authorization information in the group is compared, whereby the corresponding control instruction is executed on the target application based on the comparison result.
  • Embodiment 1 is a flowchart of Embodiment 1 of a control method provided by the present application;
  • FIG. 2 is a partial flow chart of a second embodiment of a control method provided by the present application.
  • 3a and 3b are respectively an application example diagram of an embodiment of the present application.
  • FIG. 4 is a partial flow chart of a third embodiment of a control method provided by the present application.
  • FIG. 5 is a partial flowchart of Embodiment 4 of a control method provided by the present application.
  • Embodiment 6 is a partial flowchart of Embodiment 5 of a control method provided by the present application.
  • FIG. 7 is a schematic structural diagram of Embodiment 6 of a control device provided by the present application.
  • Figure 8 is a partial schematic structural view of a seventh embodiment of a control device according to the present application.
  • Embodiment 8 of a control device provided by the present application.
  • Figure 10 is a partial schematic structural view of a ninth embodiment of a control device provided by the present application.
  • FIG. 11 is a partial schematic structural diagram of a tenth embodiment of a control device according to the present application.
  • Embodiment 1 is a flowchart of Embodiment 1 of a control method provided by the present application, where the control method in this embodiment is applied to an electronic device for performing security control on applications in different application areas of the electronic device.
  • the method may include the following steps:
  • Step 101 Pre-set a list of authorization information of the electronic device.
  • the authorization information list includes a plurality of information groups, each of the information groups respectively corresponding to one application domain, and each of the information groups includes at least one authorization information.
  • the authorization information in the same information group may be different authorization information in the same security identification scheme, or may be authorization information in different security identification schemes.
  • the authorization information in the same information group may be fingerprint information, but each fingerprint information is different; the authorization information in the same information group may be: fingerprint information, iris information, and eye pattern information.
  • Step 102 Receive an identification request corresponding to the target application on the electronic device.
  • the target application may be an application for the current operation of the user on the electronic device, such as a screen lock application, a payment application, a chat application, and the like.
  • the electronic device When the user operates the applications, the electronic device generates an identification request corresponding to the applications.
  • Step 103 Determine an application domain identifier of the target application in the identification request, and determine at least one target authorization information corresponding to the target application in the information group corresponding to the application domain identifier.
  • the identification request corresponding to the screen lock application corresponds to a terminal setting field, and an application such as a screen setting may also be used in the field;
  • the payment application corresponds to a secure payment field;
  • the chat application corresponds to an Internet privacy field,
  • the requester of the identification request is identified to determine an application domain to which the corresponding target application belongs in the identification request, and then the application domain identifier is determined.
  • the target authorization information corresponding to the target application is found in the corresponding information group. That is, at least one authorization information is included in the information group corresponding to each application domain, and each of the authorization information corresponds to one application, and the same application may have one or more authorizations in its corresponding information group. information.
  • Step 104 Parse at least one target information to be identified in the identification request.
  • the type of the target information may be fingerprint information, eye mark information or iris information, etc.
  • the identification request may include a target information, that is, information input by the user for performing its current operation, such as fingerprint information;
  • the identification request may also have a plurality of target information, such as a plurality of fingerprint information or a combination of fingerprint information and eye pattern information.
  • Step 105 Perform one-to-one comparison with each of the target authorization information and each of the target authorization information to obtain a comparison result.
  • each of the target information is compared with the target authorization information in the corresponding information group to identify whether each of the target information and the corresponding target authorization information in the information group Consistently, respectively, to obtain legal information indicating whether the information input by the user's current operation is authorized, that is, whether the current user is an authorized user.
  • Step 106 Perform a control instruction on the target application based on the comparison result.
  • the comparison result can indicate whether the information input by the user is consistent with the authorization information in the corresponding information group. Therefore, in this embodiment, the corresponding function is performed on the target application based on the comparison result. Control instructions.
  • the first embodiment of the control method provided by the disclosure provides a list of authorization information on the electronic device, and the list includes a plurality of information groups respectively corresponding to one application domain, and further receives the electronic After the identification request corresponding to the target application on the device, the corresponding application domain and the target information to be identified in the request are determined according to the identification request, and the target information is compared with the authorization information in the information group corresponding to the application domain. Thereby, the corresponding control instruction is executed on the target application based on the comparison result.
  • different information groups are set for different application areas, and in the subsequent comparison, the information to be identified is compared with the authorization information in the information group corresponding to the corresponding application domain, so that different applications are applied to different fields.
  • the authorization information is used for security control to improve the data security of the terminal.
  • step 101 it is a flowchart of the implementation of step 101 in the second embodiment of the control method provided by the present application, where the step 101 can be implemented by the following steps:
  • Step 111 Acquire at least one authorization information by using multiple sensors on the electronic device.
  • the sensor may include: a fingerprint scanner, an iris sensor, an eye sensor, and the like.
  • the authorization information collected by each of the sensors is also different.
  • the fingerprint scanner collects fingerprint information of ten fingers of the user
  • the iris sensor collects iris information of the left and right eyes of the user.
  • Step 112 Establish a list of authorization information.
  • the authorization information list includes multiple information groups, and each of the information groups respectively corresponds to one application domain.
  • the authorization information list includes user A and usage.
  • User B 's respective information groups, wherein user A corresponds to three information groups, which respectively correspond to application areas: secure payment domain, Internet privacy domain, and child domain.
  • Step 113 Each authorization information collected by each of the sensors is separately placed into one information group.
  • the authorization information corresponding to the same sensor has different information groups.
  • the left index finger, the right index finger, and the left middle finger are placed in the secure payment domain, the Internet privacy domain, and the child domain, respectively, corresponding to the password substitution, opening the chat tool, and unlocking.
  • Function the left iris and the right iris are respectively placed in the secure payment domain and the Internet privacy domain, all corresponding to the password replacement function, and the like.
  • step 106 it is a flowchart of the implementation of step 106 in the third embodiment of the control method provided by the present application, where the step 106 can be implemented by the following steps:
  • Step 161 When the comparison result indicates that the target information is respectively in one-to-one correspondence with the corresponding target authorization information, execute a permission control instruction on the target application.
  • Step 162 Perform a prohibited control instruction on the target application when the comparison result indicates that the target information does not correspond to the corresponding target authorization information, respectively.
  • the target information input by the current operation of the user and the target authorization information in the information group of the corresponding application domain are in one-to-one correspondence
  • the target information input by the user is legal information.
  • Executing a control instruction for executing the license to the target for example, unlocking the screen, or opening a chat application, or paying a payment, etc.
  • the target authorization information input in the information group of the user's current operation and the information group of the corresponding application domain is not If there is a one-to-one correspondence, it indicates that the target information input by the user currently has illegal information.
  • the prohibited application control instruction is executed on the target application, for example, the screen is prohibited from being unlocked, or the chat application is prohibited from being opened, or the payment operation is stopped. To ensure the security of the terminal data.
  • Step 107 Generate a first prompt information for prompting that the current operation is an authorized operation.
  • the first prompt information may be displayed on the display screen of the terminal in the form of a dialog box, or a new display area may be divided on the display screen of the terminal to display the first prompt information to prompt User: The information whose current operation is an authorized operation.
  • the method may further include the following steps:
  • Step 108 Generate second prompt information for prompting that the current operation is an unauthorized operation.
  • the second prompt information may be displayed on the display screen of the terminal in the form of a dialog box, or a new display area may be divided on the display screen of the terminal to display the second prompt information to prompt User:
  • the information whose current operation is an unauthorized operation reminds the user to input the correct information, or stops the current operation to protect the data of the terminal.
  • FIG. 7 is a schematic structural diagram of Embodiment 6 of a control device provided by the present application.
  • the control device in this embodiment is applied to an electronic device for performing security control on applications in different application areas of the electronic device.
  • the apparatus may include the following structure:
  • the list presetting unit 701 is configured to preset a list of authorization information of the electronic device.
  • the authorization information list includes a plurality of information groups, each of the information groups respectively corresponding to one application domain, and each of the information groups includes at least one authorization information.
  • the authorization information in the same information group may be different authorization information in the same security identification scheme, or may be authorization information in different security identification schemes.
  • the authorization information in the same information group may be fingerprint information, but each fingerprint information is different; the authorization information in the same information group may be: fingerprint information, iris information, and eye pattern information.
  • the request receiving unit 702 is configured to receive an identification request corresponding to the target application on the electronic device.
  • the target application may be an application for the current operation of the user on the electronic device, such as a screen lock application, a payment application, a chat application, and the like.
  • the electronic device When the user operates the applications, the electronic device generates an identification request corresponding to the applications.
  • the domain determining unit 703 is configured to determine an application domain identifier of the target application in the identification request, and determine at least one target authorization information corresponding to the target application in the information group corresponding to the application domain identifier.
  • the identification request corresponding to the screen lock application corresponds to a terminal setting field, and an application such as a screen setting may also be used in the field;
  • the payment application corresponds to a secure payment field;
  • the chat application corresponds to an Internet privacy field,
  • the requester of the identification request is identified to determine an application domain to which the corresponding target application belongs in the identification request, and then the application domain identifier is determined.
  • the target authorization information corresponding to the target application is found in the corresponding information group. That is, at least one authorization information is included in the information group corresponding to each application domain, and each of the authorization information corresponds to one application, and the same application may have one or more authorizations in its corresponding information group. information.
  • the request parsing unit 704 is configured to parse at least one target information to be identified in the identification request.
  • the type of the target information may be fingerprint information, eye mark information or iris information, etc.
  • the identification request may include a target information, that is, information input by the user for performing its current operation, such as fingerprint information;
  • the identification request may also have a plurality of target information, such as a plurality of fingerprint information or a combination of fingerprint information and eye pattern information.
  • the information comparison unit 705 is configured to compare each of the target information and each of the target authorization information into a one-to-one comparison result to obtain a comparison result.
  • each of the target information is compared with the target authorization information in the corresponding information group to identify whether each of the target information and the corresponding target authorization information in the information group Consistently, to obtain whether the information input by the user's current operation is authorized.
  • Legal information that is, whether the current user is an authorized user.
  • the instruction execution unit 706 is configured to execute a control instruction on the target application based on the comparison result.
  • the comparison result can indicate whether the information input by the user is consistent with the authorization information in the corresponding information group. Therefore, in this embodiment, the corresponding function is performed on the target application based on the comparison result. Control instructions.
  • the sixth embodiment of the control device provided by the disclosure provides a list of authorization information on the electronic device, and the list includes a plurality of information groups respectively corresponding to one application domain, and then receives the electronic device. After the identification request corresponding to the target application on the device, the corresponding application domain and the target information to be identified in the request are determined according to the identification request, and the target information is compared with the authorization information in the information group corresponding to the application domain. Thereby, the corresponding control instruction is executed on the target application based on the comparison result.
  • different information groups are set for different application areas, and in the subsequent comparison, the information to be identified is compared with the authorization information in the information group corresponding to the corresponding application domain, so that different applications are applied to different fields.
  • the authorization information is used for security control to improve the data security of the terminal.
  • FIG. 8 is a schematic structural diagram of a list presetting unit 701 according to Embodiment 7 of a control device provided by the present application, where the list presetting unit 701 may include the following structure:
  • the information collection subunit 711 is configured to separately collect at least one authorization information by using multiple sensors on the electronic device.
  • the sensor may include: a fingerprint scanner, an iris sensor, an eye sensor, and the like.
  • the authorization information collected by each of the sensors is also different.
  • the fingerprint scanner collects fingerprint information of ten fingers of the user
  • the iris sensor collects iris information of the left and right eyes of the user.
  • the list establishing sub-unit 712 is configured to establish a list of authorization information.
  • the authorization information list includes multiple information groups, and each of the information groups respectively corresponds to one application domain.
  • the authorization information list includes respective information groups of user A and user B, wherein user A has three information groups corresponding to application areas: secure payment domain, internet privacy domain, and child domain. Wait.
  • the information insertion sub-unit 713 is configured to respectively insert each authorization information collected by each of the sensors into one information group.
  • the authorization information corresponding to the same sensor has different information groups.
  • the left index finger, the right index finger, and the left middle finger are placed in the secure payment domain, the Internet privacy domain, and the child domain, respectively, corresponding to the password substitution, opening the chat tool, and unlocking.
  • Function the left iris and the right iris are respectively placed in the secure payment domain and the Internet privacy domain, all corresponding to the password replacement function, and the like.
  • FIG. 9 is a schematic structural diagram of an instruction control unit 706 according to Embodiment 8 of a control apparatus provided by the present application, where the instruction control unit 706 may include the following structure:
  • the license execution sub-unit 761 is configured to execute a permission control instruction on the target application when the comparison result indicates that the target information respectively corresponds to the corresponding target authorization information.
  • the execution execution sub-unit 762 is configured to execute a prohibited control instruction on the target application when the comparison result indicates that the target information does not correspond to the corresponding target authorization information, respectively.
  • the target information input by the current operation of the user and the target authorization information in the information group of the corresponding application domain are in one-to-one correspondence
  • the target information input by the user is legal information.
  • Executing a control instruction for executing the license to the target for example, unlocking the screen, or opening a chat application, or paying a payment, etc.
  • the target authorization information input in the information group of the user's current operation and the information group of the corresponding application domain is not
  • the control command for example, prohibits the screen from being unlocked, or prohibits opening the chat application, or stops the payment operation, etc., to ensure the security of the terminal data.
  • FIG. 10 is a partial structural diagram of Embodiment 9 of a control device provided by the present application, wherein the device may further include the following structure:
  • the first information generating unit 707 is configured to generate first prompt information, after the permission execution sub-unit 761 performs a permission control instruction on the target application, where the first prompt information is used to prompt the current operation as an authorized operation.
  • the first prompt information may be displayed on the display screen of the terminal in the form of a dialog box, or a new display area may be divided on the display screen of the terminal to display the first prompt information to prompt User: The information whose current operation is an authorized operation.
  • FIG. 11 is a partial schematic structural diagram of a tenth embodiment of a control device provided by the present application, wherein the device may further include the following structure:
  • the second information generating unit 708 is configured to generate, after the prohibiting execution sub-unit 762 executes the prohibited control instruction on the target application, the second prompt information is used to prompt the current operation as an unauthorized operation. .
  • the second prompt information may be displayed on the display screen of the terminal in the form of a dialog box, or a new display area may be divided on the display screen of the terminal to display the second prompt information to prompt User:
  • the information whose current operation is an unauthorized operation reminds the user to input the correct information, or stops the current operation to protect the data of the terminal.
  • the present application can be implemented by means of software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product in essence or in the form of a software product, which may be stored in a storage medium such as a ROM/RAM or a disk. , an optical disk, etc., includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present application or portions of the embodiments.
  • a computer device which may be a personal computer, server, or network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

一种控制方法及装置。所述方法应用于电子设备,包括:预先设置所述电子设备的授权信息列表(101),所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组包括至少一个授权信息;接收所述电子设备上目标应用对应的识别请求(102);确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息(103);解析所述识别请求中待识别的至少一个目标信息(104);将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果(105);基于所述比对结果,对所述目标应用执行控制指令(106)。

Description

一种控制方法及装置 技术领域
本申请涉及电子技术领域,更具体的说是涉及一种控制方法及装置。
背景技术
随着电子科技的发展,手机等智能终端的应用越来越广泛。而手机上的安全识别应用也多种多样,例如,指纹识别解锁、虹膜支付或眼纹支付等应用。
但对于手机终端上的多种领域上的应用均只能采用一种安全识别的授权信息,如采用同一授权指纹来进行支付应用、开启聊天工具和屏幕解锁等,使得终端的数据安全性较低。
发明内容
有鉴于此,本申请提供了一种控制方法及装置,用以解决现有技术中多种领域上的应用均只能采用一种安全识别方案,使得终端的数据安全性较低的技术问题。
为实现上述目的,本申请提供如下技术方案:
一种控制方法,应用于电子设备,所述方法包括:
预先设置所述电子设备的授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组包括至少一个授权信息;
接收所述电子设备上目标应用对应的识别请求;
确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息;
解析所述识别请求中待识别的至少一个目标信息;
将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果;
基于所述比对结果,对所述目标应用执行控制指令。
上述方法,优选的,预先设置所述电子设备的授权信息列表,包括:
利用所述电子设备上的多个传感器分别采集至少一个授权信息,每个所述传感器的原理不同;
建立授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域;
将每个所述传感器各自采集到的每个授权信息分别置入一个信息组中,其中,对应同一传感器的授权信息其各自所置入的信息组不同。
上述方法,优选的,基于所述比对结果,对所述目标应用执行控制指令,包括:
在所述比对结果表明所述目标信息分别与相应的所述目标授权信息一一对应时,对所述目标应用执行许可的控制指令,否则,对所述目标应用执行禁止的控制指令。
上述方法,优选的,对所述目标应用执行许可的控制指令之后,所述方法还包括:
生成第一提示信息,用以提示当前操作为授权操作。
上述方法,优选的,对所述目标应用执行禁止的控制指令之后,所述方法还包括:
生成第二提示信息,用以提示当前操作为非授权操作。
本申请提供了一种控制装置,应用于电子设备,所述装置包括:
列表预置单元,用于预先设置所述电子设备的授权信息列表,所述授权信 息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组包括至少一个授权信息;
请求接收单元,用于接收所述电子设备上目标应用对应的识别请求;
领域确定单元,用于确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息;
请求解析单元,用于解析所述识别请求中待识别的至少一个目标信息;
信息比对单元,用于将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果;
指令执行单元,用于基于所述比对结果,对所述目标应用执行控制指令。
上述装置,优选的,所述列表预置单元包括:
信息采集子单元,用于利用所述电子设备上的多个传感器分别采集至少一个授权信息,每个所述传感器的原理不同;
列表建立子单元,用于建立授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域;
信息置入子单元,用于将每个所述传感器各自采集到的每个授权信息分别置入一个信息组中,其中,对应同一传感器的授权信息其各自所置入的信息组不同。
上述装置,优选的,所述指令控制单元包括:
许可执行子单元,用于在所述比对结果表明所述目标信息分别与相应的所述目标授权信息一一对应时,对所述目标应用执行许可的控制指令;
禁止执行子单元,用于在所述比对结果表明所述目标信息并非分别与相应的所述目标授权信息一一对应时,对所述目标应用执行禁止的控制指令。
上述装置,优选的,还包括:
第一信息生成单元,用于在所述许可执行子单元对所述目标应用执行许可的控制指令之后,生成第一提示信息,所述第一提示信息用以提示当前操作为授权操作。
上述装置,优选的,还包括:
第二信息生成单元,用于在所述禁止执行子单元对所述目标应用执行禁止的控制指令之后,生成第二提示信息,所述第二提示信息用以提示当前操作为非授权操作。
经由上述的技术方案可知,与现有技术相比,本申请公开提供的一种控制方法及装置,通过在电子设备上预先设置一个授权信息列表,列表中包括有多个分别对应一个应用领域的信息组,进而在接收到电子设备上目标应用对应的识别请求之后,根据该识别请求确定其对应的应用领域及该请求中待识别的目标信息,再将这些目标信息与应用领域所对应的信息组中的授权信息进行比对,由此基于比对结果来对目标应用执行相应的控制指令。本申请中对不同应用领域设置不同的信息组,进而在后续比对中,将待识别的信息与相应应用领域对应的信息组中的授权信息进行比对,实现对不同领域的应用采用不同的授权信息进行安全控制,提高终端的数据安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请提供的一种控制方法实施例一的流程图;
图2为本申请提供的一种控制方法实施例二的部分流程图;
图3a及图3b分别为本申请实施例的应用示例图;
图4为本申请提供的一种控制方法实施例三的部分流程图;
图5为本申请提供的一种控制方法实施例四的部分流程图;
图6为本申请提供的一种控制方法实施例五的部分流程图;
图7为本申请提供的一种控制装置实施例六的结构示意图;
图8为本申请提供的一种控制装置实施例七的部分结构示意图;
图9为本申请提供的一种控制装置实施例八的部分结构示意图;
图10为本申请提供的一种控制装置实施例九的部分结构示意图;
图11为本申请提供的一种控制装置实施例十的部分结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
参考图1,为本申请提供的一种控制方法实施例一的流程图,其中,本实施例中的控制方法应用于电子设备中,用以对电子设备中不同应用领域的应用进行安全控制。
在本实施例中,所述方法可以包括以下步骤:
步骤101:预先设置所述电子设备的授权信息列表。
其中,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组中包括至少一个授权信息。
需要说明的是,同一所述信息组中的授权信息可以为同一安全识别方案中的不同授权信息,也可以为不同安全识别方案中的授权信息。例如,同一所述信息组中的授权信息可以均为指纹信息,但每个指纹信息不同;同一所述信息组中的授权信息可以分别为:指纹信息、虹膜信息和眼纹信息。
步骤102:接收所述电子设备上目标应用对应的识别请求。
其中,所述目标应用可以为所述电子设备上用户进行其当前操作的应用,如屏幕锁定应用、支付应用、聊天应用等。用户在对这些应用进行操作时,所述电子设备会生成这些应用对应的识别请求。
步骤103:确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息。
例如,所述屏幕锁定应用对应的识别请求对应终端设置领域,这一领域中还可以有例如屏幕画面设置等应用;所述支付应用对应安全支付领域;所述聊天应用对应互联网隐私领域,这一领域中还可以有微博等应用。本实施例中通过对所述识别请求的请求方进行识别,以确定出该识别请求中其对应的目标应用所属的应用领域,进而确定该应用领域标识。
本实施例中在确定所述应用领域标识之后,基于这一应用领域标识,在其对应的信息组中找到与所述目标应用对应的目标授权信息。也就是说,在每个应用领域所对应的信息组中包括有至少一个授权信息,每个所述授权信息对应一个应用,而同一应用可以在其对应的信息组中对应有一个或多个授权信息。
步骤104:解析所述识别请求中待识别的至少一个目标信息。
其中,所述目标信息的种类可以为指纹信息、眼纹信息或虹膜信息等,在所述识别请求中可以包括有一个目标信息,即用户进行其当前操作所输入的信息,如指纹信息等;所述识别请求中也可以有多个目标信息,如多个指纹信息或指纹信息和眼纹信息等组合。
步骤105:将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果。
也就是说,本实施例中将每个所述目标信息与其对应信息组中的目标授权信息进行一一比对,以识别每个所述目标信息是否与所述信息组中的相应目标授权信息分别相一致,以得到表明用户当前操作所输入的信息是否为授权的合法信息,即当前用户是否为授权用户。
步骤106:基于所述比对结果,对所述目标应用执行控制指令。
其中,所述比对结果能够表明用户所输入的信息是否与相应信息组中的授权信息相一致,由此,在本实施例中,基于这一比对结果,对所述目标应用执行相应功能的控制指令。
由上述方案可知,本申请公开提供的一种控制方法实施例一,通过在电子设备上预先设置一个授权信息列表,列表中包括有多个分别对应一个应用领域的信息组,进而在接收到电子设备上目标应用对应的识别请求之后,根据该识别请求确定其对应的应用领域及该请求中待识别的目标信息,再将这些目标信息与应用领域所对应的信息组中的授权信息进行比对,由此基于比对结果来对目标应用执行相应的控制指令。本实施例中对不同应用领域设置不同的信息组,进而在后续比对中,将待识别的信息与相应应用领域对应的信息组中的授权信息进行比对,实现对不同领域的应用采用不同的授权信息进行安全控制,提高终端的数据安全性。
参考图2,为本申请提供的一种控制方法实施例二中所述步骤101的实现流程图,其中,所述步骤101可以通过以下步骤实现:
步骤111:利用所述电子设备上的多个传感器分别采集至少一个授权信息。
其中,每个所述传感器的原理不同,例如,所述传感器可以有:指纹扫描器、虹膜传感器及眼纹传感器等。
需要说明的是,每个所述传感器所采集到的授权信息也不相同,例如,指纹扫描器采集用户十个手指的指纹信息,虹膜传感器采集用户左眼和右眼的虹膜信息等。
步骤112:建立授权信息列表。
其中,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域。
需要说明的是,所述授权信息列表中的多个信息组,可以均对应同一用户,也可以对应不同用户。如图3a中所示,所述授权信息列表中包括用户A与用 户B各自的信息组,其中,用户A对应有3个信息组,分别对应应用领域:安全支付域、互联网隐私域、儿童域等。
步骤113:将每个所述传感器各自采集到的每个授权信息分别置入一个信息组中。
其中,对应同一传感器的授权信息其各自所置入的信息组不同。
如图3b中所示,用户A对应的3个信息组中,左食指、右食指及左中指均置入安全支付域、互联网隐私域及儿童域中,分别对应密码代替、打开聊天工具及解锁功能;左虹膜和右虹膜分别置入安全支付域及互联网隐私域中,均对应密码代替功能,等等。
参考图4,为本申请提供的一种控制方法实施例三中所述步骤106的实现流程图,其中,所述步骤106可以通过以下步骤实现:
步骤161:在所述比对结果表明所述目标信息分别与相应的所述目标授权信息一一对应时,对所述目标应用执行许可的控制指令。
步骤162:在所述比对结果表明所述目标信息并非分别与相应的所述目标授权信息一一对应时,对所述目标应用执行禁止的控制指令。
也就是说,在用户当前操作所输入的目标信息与其对应应用领域的信息组中的目标授权信息一一对应即相一致时,表明用户当前操作所输入的目标信息均为合法信息,此时,对所述目标应用执行许可的控制指令,例如,将屏幕解除锁定,或者开启聊天应用,或者支付款项等;在用户当前操作所输入的目标信息与其对应应用领域的信息组中的目标授权信息并非一一对应时,表明用户当前操作所输入的目标信息存在不合法信息,此时,对所述目标应用执行禁止的控制指令,例如,禁止屏幕解锁,或者禁止打开聊天应用,或者停止支付操作等,保证终端数据的安全性。
基于前述实施例,参考图5,为本申请提供的一种控制方法实施例四的部 分流程图,其中,在所述步骤161之后,所述方法还可以包括以下步骤:
步骤107:生成第一提示信息,用以提示当前操作为授权操作。
其中,所述第一提示信息可以以对话框的形式在所述终端的显示屏上进行显示,或者在所述终端显示屏上划分新的显示区域来显示所述第一提示信息,以提示给用户:其当前操作为授权操作的信息。
基于前述实施例,参考图6,为本申请提供的一种控制方法实施例五的部分流程图,其中,在所述步骤162之后,所述方法还可以包括以下步骤:
步骤108:生成第二提示信息,用以提示当前操作为非授权操作。
其中,所述第二提示信息可以以对话框的形式在所述终端的显示屏上进行显示,或者在所述终端显示屏上划分新的显示区域来显示所述第二提示信息,以提示给用户:其当前操作为非授权操作的信息,提醒用户输入正确的信息,或者停止当前操作,以保护所述终端的数据。
参考图7,为本申请提供的一种控制装置实施例六的结构示意图,其中,本实施例中的控制装置应用于电子设备中,用以对电子设备中不同应用领域的应用进行安全控制。
在本实施例中,所述装置可以包括以下结构:
列表预置单元701,用于预先设置所述电子设备的授权信息列表。
其中,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组包括至少一个授权信息。
需要说明的是,同一所述信息组中的授权信息可以为同一安全识别方案中的不同授权信息,也可以为不同安全识别方案中的授权信息。例如,同一所述信息组中的授权信息可以均为指纹信息,但每个指纹信息不同;同一所述信息组中的授权信息可以分别为:指纹信息、虹膜信息和眼纹信息。
请求接收单元702,用于接收所述电子设备上目标应用对应的识别请求。
其中,所述目标应用可以为所述电子设备上用户进行其当前操作的应用,如屏幕锁定应用、支付应用、聊天应用等。用户在对这些应用进行操作时,所述电子设备会生成这些应用对应的识别请求。
领域确定单元703,用于确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息。
例如,所述屏幕锁定应用对应的识别请求对应终端设置领域,这一领域中还可以有例如屏幕画面设置等应用;所述支付应用对应安全支付领域;所述聊天应用对应互联网隐私领域,这一领域中还可以有微博等应用。本实施例中通过对所述识别请求的请求方进行识别,以确定出该识别请求中其对应的目标应用所属的应用领域,进而确定该应用领域标识。
本实施例中在确定所述应用领域标识之后,基于这一应用领域标识,在其对应的信息组中找到与所述目标应用对应的目标授权信息。也就是说,在每个应用领域所对应的信息组中包括有至少一个授权信息,每个所述授权信息对应一个应用,而同一应用可以在其对应的信息组中对应有一个或多个授权信息。
请求解析单元704,用于解析所述识别请求中待识别的至少一个目标信息。
其中,所述目标信息的种类可以为指纹信息、眼纹信息或虹膜信息等,在所述识别请求中可以包括有一个目标信息,即用户进行其当前操作所输入的信息,如指纹信息等;所述识别请求中也可以有多个目标信息,如多个指纹信息或指纹信息和眼纹信息等组合。
信息比对单元705,用于将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果。
也就是说,本实施例中将每个所述目标信息与其对应信息组中的目标授权信息进行一一比对,以识别每个所述目标信息是否与所述信息组中的相应目标授权信息分别相一致,以得到表明用户当前操作所输入的信息是否为授权的合 法信息,即当前用户是否为授权用户。
指令执行单元706,用于基于所述比对结果,对所述目标应用执行控制指令。
其中,所述比对结果能够表明用户所输入的信息是否与相应信息组中的授权信息相一致,由此,在本实施例中,基于这一比对结果,对所述目标应用执行相应功能的控制指令。
由上述方案可知,本申请公开提供的一种控制装置实施例六,通过在电子设备上预先设置一个授权信息列表,列表中包括有多个分别对应一个应用领域的信息组,进而在接收到电子设备上目标应用对应的识别请求之后,根据该识别请求确定其对应的应用领域及该请求中待识别的目标信息,再将这些目标信息与应用领域所对应的信息组中的授权信息进行比对,由此基于比对结果来对目标应用执行相应的控制指令。本实施例中对不同应用领域设置不同的信息组,进而在后续比对中,将待识别的信息与相应应用领域对应的信息组中的授权信息进行比对,实现对不同领域的应用采用不同的授权信息进行安全控制,提高终端的数据安全性。
参考图8,为本申请提供的一种控制装置实施例七中所述列表预置单元701的结构示意图,其中,所述列表预置单元701可以包括以下结构:
信息采集子单元711,用于利用所述电子设备上的多个传感器分别采集至少一个授权信息。
其中,每个所述传感器的原理不同,例如,所述传感器可以有:指纹扫描器、虹膜传感器及眼纹传感器等。
需要说明的是,每个所述传感器所采集到的授权信息也不相同,例如,指纹扫描器采集用户十个手指的指纹信息,虹膜传感器采集用户左眼和右眼的虹膜信息等。
列表建立子单元712,用于建立授权信息列表。
其中,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域。
需要说明的是,所述授权信息列表中的多个信息组,可以均对应同一用户,也可以对应不同用户。如图3a中所示,所述授权信息列表中包括用户A与用户B各自的信息组,其中,用户A对应有3个信息组,分别对应应用领域:安全支付域、互联网隐私域、儿童域等。
信息置入子单元713,用于将每个所述传感器各自采集到的每个授权信息分别置入一个信息组中。
其中,对应同一传感器的授权信息其各自所置入的信息组不同。
如图3b中所示,用户A对应的3个信息组中,左食指、右食指及左中指均置入安全支付域、互联网隐私域及儿童域中,分别对应密码代替、打开聊天工具及解锁功能;左虹膜和右虹膜分别置入安全支付域及互联网隐私域中,均对应密码代替功能,等等。
参考图9,为本申请提供的一种控制装置实施例八中所述指令控制单元706的结构示意图,其中,所述指令控制单元706可以包括以下结构:
许可执行子单元761,用于在所述比对结果表明所述目标信息分别与相应的所述目标授权信息一一对应时,对所述目标应用执行许可的控制指令。
禁止执行子单元762,用于在所述比对结果表明所述目标信息并非分别与相应的所述目标授权信息一一对应时,对所述目标应用执行禁止的控制指令。
也就是说,在用户当前操作所输入的目标信息与其对应应用领域的信息组中的目标授权信息一一对应即相一致时,表明用户当前操作所输入的目标信息均为合法信息,此时,对所述目标应用执行许可的控制指令,例如,将屏幕解除锁定,或者开启聊天应用,或者支付款项等;在用户当前操作所输入的目标信息与其对应应用领域的信息组中的目标授权信息并非一一对应时,表明用户当前操作所输入的目标信息存在不合法信息,此时,对所述目标应用执行禁止 的控制指令,例如,禁止屏幕解锁,或者禁止打开聊天应用,或者停止支付操作等,保证终端数据的安全性。
参考图10,为本申请提供的一种控制装置实施例九的部分结构示意图,其中,所述装置还可以包括以下结构:
第一信息生成单元707,用于在所述许可执行子单元761对所述目标应用执行许可的控制指令之后,生成第一提示信息,所述第一提示信息用以提示当前操作为授权操作。
其中,所述第一提示信息可以以对话框的形式在所述终端的显示屏上进行显示,或者在所述终端显示屏上划分新的显示区域来显示所述第一提示信息,以提示给用户:其当前操作为授权操作的信息。
参考图11,为本申请提供的一种控制装置实施例十的部分结构示意图,其中,所述装置还可以包括以下结构:
第二信息生成单元708,用于在所述禁止执行子单元762对所述目标应用执行禁止的控制指令之后,生成第二提示信息,所述第二提示信息用以提示当前操作为非授权操作。
其中,所述第二提示信息可以以对话框的形式在所述终端的显示屏上进行显示,或者在所述终端显示屏上划分新的显示区域来显示所述第二提示信息,以提示给用户:其当前操作为非授权操作的信息,提醒用户输入正确的信息,或者停止当前操作,以保护所述终端的数据。
对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动 作和模块并不一定是本申请所必须的。
本说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例或者实施例的某些部分所述的方法。
对所公开的实施例的上述说明,使本领域专业技术人员能够实现或使用本申请。对这些实施例的多种修改对本领域的专业技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本申请的精神或范围的情况下,在其它实施例中实现。因此,本申请将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (10)

  1. 一种控制方法,其特征在于,应用于电子设备,所述方法包括:
    预先设置所述电子设备的授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组包括至少一个授权信息;
    接收所述电子设备上目标应用对应的识别请求;
    确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息;
    解析所述识别请求中待识别的至少一个目标信息;
    将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果;
    基于所述比对结果,对所述目标应用执行控制指令。
  2. 根据权利要求1所述的方法,其特征在于,预先设置所述电子设备的授权信息列表,包括:
    利用所述电子设备上的多个传感器分别采集至少一个授权信息,每个所述传感器的原理不同;
    建立授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域;
    将每个所述传感器各自采集到的每个授权信息分别置入一个信息组中,其中,对应同一传感器的授权信息其各自所置入的信息组不同。
  3. 根据权利要求1所述的方法,其特征在于,基于所述比对结果,对所述目标应用执行控制指令,包括:
    在所述比对结果表明所述目标信息分别与相应的所述目标授权信息一一对应时,对所述目标应用执行许可的控制指令,否则,对所述目标应用执行禁止的控制指令。
  4. 根据权利要求3所述的方法,其特征在于,对所述目标应用执行许可的控制指令之后,所述方法还包括:
    生成第一提示信息,用以提示当前操作为授权操作。
  5. 根据权利要求3或4所述的方法,其特征在于,对所述目标应用执行禁止的控制指令之后,所述方法还包括:
    生成第二提示信息,用以提示当前操作为非授权操作。
  6. 一种控制装置,其特征在于,应用于电子设备,所述装置包括:
    列表预置单元,用于预先设置所述电子设备的授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域,且每个所述信息组包括至少一个授权信息;
    请求接收单元,用于接收所述电子设备上目标应用对应的识别请求;
    领域确定单元,用于确定所述识别请求中所述目标应用的应用领域标识并确定该应用领域标识对应的信息组中与所述目标应用对应的至少一个目标授权信息;
    请求解析单元,用于解析所述识别请求中待识别的至少一个目标信息;
    信息比对单元,用于将每个所述目标信息分别与每个所述目标授权信息进行一一比对,得到比对结果;
    指令执行单元,用于基于所述比对结果,对所述目标应用执行控制指令。
  7. 根据权利要求6所述的装置,其特征在于,所述列表预置单元包括:
    信息采集子单元,用于利用所述电子设备上的多个传感器分别采集至少一个授权信息,每个所述传感器的原理不同;
    列表建立子单元,用于建立授权信息列表,所述授权信息列表中包括多个信息组,每个所述信息组分别对应一个应用领域;
    信息置入子单元,用于将每个所述传感器各自采集到的每个授权信息分别 置入一个信息组中,其中,对应同一传感器的授权信息其各自所置入的信息组不同。
  8. 根据权利要求6所述的装置,其特征在于,所述指令控制单元包括:
    许可执行子单元,用于在所述比对结果表明所述目标信息分别与相应的所述目标授权信息一一对应时,对所述目标应用执行许可的控制指令;
    禁止执行子单元,用于在所述比对结果表明所述目标信息并非分别与相应的所述目标授权信息一一对应时,对所述目标应用执行禁止的控制指令。
  9. 根据权利要求8所示的装置,其特征在于,还包括:
    第一信息生成单元,用于在所述许可执行子单元对所述目标应用执行许可的控制指令之后,生成第一提示信息,所述第一提示信息用以提示当前操作为授权操作。
  10. 根据权利要求8或9所述的装置,其特征在于,还包括:
    第二信息生成单元,用于在所述禁止执行子单元对所述目标应用执行禁止的控制指令之后,生成第二提示信息,所述第二提示信息用以提示当前操作为非授权操作。
PCT/CN2015/085295 2015-07-28 2015-07-28 一种控制方法及装置 WO2017015854A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/085295 WO2017015854A1 (zh) 2015-07-28 2015-07-28 一种控制方法及装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2015/085295 WO2017015854A1 (zh) 2015-07-28 2015-07-28 一种控制方法及装置

Publications (1)

Publication Number Publication Date
WO2017015854A1 true WO2017015854A1 (zh) 2017-02-02

Family

ID=57885221

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/085295 WO2017015854A1 (zh) 2015-07-28 2015-07-28 一种控制方法及装置

Country Status (1)

Country Link
WO (1) WO2017015854A1 (zh)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007249530A (ja) * 2006-03-15 2007-09-27 Omron Corp 認証装置、認証方法および認証プログラム
CN102281539A (zh) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 移动终端及其应用程序登录方法
CN103366107A (zh) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 一种保护应用程序访问权限的方法、装置及手机
CN103425914A (zh) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法及通信终端
CN103886239A (zh) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 一种移动终端应用程序的用户鉴权方法和装置
CN104331650A (zh) * 2013-07-22 2015-02-04 联想(北京)有限公司 一种信息处理方法以及一种电子设备
US20150077223A1 (en) * 2013-09-19 2015-03-19 International Business Machines Corporation Code verification
CN104715181A (zh) * 2013-12-17 2015-06-17 深圳富泰宏精密工业有限公司 应用软件的登入系统及方法

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007249530A (ja) * 2006-03-15 2007-09-27 Omron Corp 認証装置、認証方法および認証プログラム
CN102281539A (zh) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 移动终端及其应用程序登录方法
CN103425914A (zh) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法及通信终端
CN103366107A (zh) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 一种保护应用程序访问权限的方法、装置及手机
CN104331650A (zh) * 2013-07-22 2015-02-04 联想(北京)有限公司 一种信息处理方法以及一种电子设备
US20150077223A1 (en) * 2013-09-19 2015-03-19 International Business Machines Corporation Code verification
CN104715181A (zh) * 2013-12-17 2015-06-17 深圳富泰宏精密工业有限公司 应用软件的登入系统及方法
CN103886239A (zh) * 2014-03-31 2014-06-25 深圳市欧珀通信软件有限公司 一种移动终端应用程序的用户鉴权方法和装置

Similar Documents

Publication Publication Date Title
JP6653268B2 (ja) 異なるチャネル上で強力な認証イベントを伝えるシステム及び方法
EP3123692B1 (en) Techniques to operate a service with machine generated authentication tokens
TWI728261B (zh) 判定認證能力之查詢系統、方法及非暫態機器可讀媒體
CN110768968B (zh) 基于可验证声明的授权方法、装置、设备及系统
JP6491192B2 (ja) 人間を機械と区別するための及びネットワークサービスへのアクセスを制御するための方法ならびにシステム
US20170068958A1 (en) System and method of notifying mobile devices to complete transactions after additional agent verification
US8549314B2 (en) Password generation methods and systems
CN110149328B (zh) 接口鉴权方法、装置、设备及计算机可读存储介质
US11140155B2 (en) Methods, computer readable media, and systems for authentication using a text file and a one-time password
CN109756458B (zh) 身份认证方法和系统
US9596087B2 (en) Token authentication for touch sensitive display devices
US10735398B1 (en) Rolling code authentication techniques
US20150033310A1 (en) User authentication system and methods
KR20120082772A (ko) 확률적 사용자 인증 장치 및 방법
KR20150050666A (ko) 패턴 입력 장치 및 방법과 이를 이용한 기록 매체
CN102456102A (zh) 用Usb key技术对信息系统特殊操作进行身份再认证的方法
US20130198836A1 (en) Facial Recognition Streamlined Login
US11120120B2 (en) Method and system for secure password storage
CN105653993A (zh) 一种密码输入方法、装置及电子设备
WO2016095564A1 (zh) 一种实现身份验证的方法和装置
WO2017015854A1 (zh) 一种控制方法及装置
CN105427143B (zh) 一种进行系统安全控制的方法及装置
US9594968B1 (en) Biometric profile creation
JP2011118561A (ja) 個人認証装置及び個人認証方法
Ussatova et al. Two-factor authentication algorithm implementation with additional security parameter based on mobile application

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15899206

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15899206

Country of ref document: EP

Kind code of ref document: A1