WO2022160789A1 - 一种信息处理方法及装置 - Google Patents
一种信息处理方法及装置 Download PDFInfo
- Publication number
- WO2022160789A1 WO2022160789A1 PCT/CN2021/124673 CN2021124673W WO2022160789A1 WO 2022160789 A1 WO2022160789 A1 WO 2022160789A1 CN 2021124673 W CN2021124673 W CN 2021124673W WO 2022160789 A1 WO2022160789 A1 WO 2022160789A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- information
- user
- information input
- trigger
- interface
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 20
- 238000003672 processing method Methods 0.000 title claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 59
- 238000000034 method Methods 0.000 claims abstract description 30
- 238000012790 confirmation Methods 0.000 claims description 28
- 230000001960 triggered effect Effects 0.000 claims description 13
- 238000010586 diagram Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 10
- 230000004048 modification Effects 0.000 description 9
- 238000012986 modification Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 7
- 238000004590 computer program Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 230000008447 perception Effects 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/42—Confirmation, e.g. check or permission by the legal debtor of payment
- G06Q20/425—Confirmation, e.g. check or permission by the legal debtor of payment using two different networks, one for transaction and one for security confirmation
Definitions
- the present invention relates to the technical field of terminal payment, and in particular, to an information processing method and device.
- the collection device uses a trusted user interface based on TUI (Trusted User Interface) to ensure that the input sensitive data is not illegally monitored, tampered, destroyed or stolen. .
- TUI Trusted User Interface
- consumers are required to enter the transaction password on the merchant's mobile phone, but consumers cannot perceive that they are operating in a safe environment, consumers have certain security concerns.
- Embodiments of the present invention provide an information processing method and device, which are used to enhance a user's perception of a security environment and improve the security of terminal payment.
- an embodiment of the present invention provides an information processing method, including:
- the information input by the user on the trusted user interface is collected, and the collected information is sent to the service processing unit.
- the sensitive data input by the user is collected by judging the trigger information of the power button, and the user clicks the power button to realize the submission of the input data.
- REE ich Execution Environment, common execution environment
- clicking the power button will cause the display screen of the terminal to turn on or off
- clicking the power button will not cause the display screen of the terminal to light up. or close operation
- prompt information can be given in the corresponding area of the display screen, which enables the user to effectively perceive that the current terminal is in a safe environment.
- the APP under REE does not have the authority to use the power button, it is impossible to forge the power button information, which improves the security of terminal payment.
- the trigger information of the power button includes first trigger information
- the collecting of the information input by the user on the information input interface of the trusted user interface according to the trigger information of the power key includes:
- the information input interface is called, and the information input interface is displayed on the trusted user interface, so that the user can input information on the information input interface ;
- the first trigger information is triggered by the user after determining that the terminal enters the trusted user interface;
- the information input by the user on the information input interface is collected after the first preset time or according to a user instruction.
- the trigger information of the power button further includes second trigger information
- the method further includes:
- the second trigger information is received and that the second trigger information is a double-click power button event; the second trigger information is triggered after the user inputs information on the information input interface.
- the trigger information of the power button is the third trigger information
- the collecting of the information input by the user on the information input interface of the trusted user interface according to the trigger information of the power key includes:
- the third trigger information is a double-click power button event, and if so, directly collect the information input by the user on the information input interface; the third trigger information is the information input by the user on the information input interface obtained afterward.
- the method further includes:
- the second trigger information or the third trigger event is a power button click event
- the information confirmation button and the information cancellation button are called, and the information confirmation button and the information cancellation button are displayed on the trusted user interface , so that the user confirms whether to submit the information input by the user on the information input interface;
- the information input by the user on the information input interface is collected.
- the method further includes:
- the trusted user interface is exited.
- the trigger information of the power button is fourth trigger information
- the information input by the user on the trusted user interface is collected after the third preset time or according to a user instruction.
- the information input by the user on the information input interface of the trusted user interface includes account information and/or password information.
- an embodiment of the present invention provides an information processing apparatus, including:
- the acquisition unit is used to acquire the trigger information of the power button
- the processing unit is configured to collect the information input by the user on the information input interface of the trusted user interface according to the trigger information of the power key, and send the collected information to the service processing unit.
- the trigger information of the power button includes first trigger information
- the processing unit has for:
- the information input interface is called, and the information input interface is displayed on the trusted user interface, so that the user can input information on the information input interface ;
- the first trigger information is triggered by the user after determining that the terminal enters the trusted user interface;
- the information input by the user on the information input interface is collected after the first preset time or according to a user instruction.
- the trigger information of the power button further includes second trigger information
- the processing unit is also used to:
- the second trigger information Before collecting the information input by the user on the information input interface, determine that the second trigger information is received and determine that the second trigger information is a double-click power button event; the second trigger information is the user's Triggered after entering information on the information input interface.
- the trigger information of the power button is the third trigger information
- the processing unit has for:
- the third trigger information is a double-click power button event, and if so, directly collect the information input by the user on the information input interface; the third trigger information is the information input by the user on the information input interface obtained afterward.
- processing unit is also used for:
- the second trigger information or the third trigger event is a power button click event
- the information confirmation button and the information cancellation button are called, and the information confirmation button and the information cancellation button are displayed on the trusted user interface , so that the user confirms whether to submit the information input by the user on the information input interface;
- the information input by the user on the information input interface is collected.
- processing unit is also used for:
- the trusted user interface is exited.
- the trigger information of the power button is fourth trigger information
- the processing unit has for:
- the information input by the user on the trusted user interface is collected after the third preset time or according to a user instruction.
- the information input by the user on the information input interface of the trusted user interface includes account information and/or password information.
- an embodiment of the present invention further provides a computing device, including:
- the processor is configured to call the program instructions stored in the memory, and execute the above information processing method according to the obtained program.
- embodiments of the present invention further provide a computer-readable non-volatile storage medium, including computer-readable instructions, which, when the computer reads and executes the computer-readable instructions, cause the computer to execute the above-mentioned information processing method.
- FIG. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention.
- FIG. 2 is a schematic flowchart of an information processing method according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of a trusted execution environment provided by an embodiment of the present invention.
- FIG. 4 is a schematic diagram of calling a trusted user interface according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of a business process provided by an embodiment of the present invention.
- FIG. 6 is a schematic diagram of a business process provided by an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present invention.
- FIG. 1 is a system architecture provided by an embodiment of the present invention. As shown in FIG. 1 , the system architecture may include four parts: an acquiring APP (Application, application program), a TUI password keyboard, a power key driver and a power key.
- APP Application, application program
- TUI password keyboard a TUI password keyboard
- power key driver a power key
- the acquiring APP running on the REE side, responsible for initiating payment and calling the TUI password keyboard;
- TUI password keyboard running on the TEE (Trusted Execution Environment) side, providing a secure password keyboard for users to enter payment passwords to ensure that the input sensitive data is not illegally monitored, tampered, destroyed and stolen, and the key monitoring module is responsible for identifying The power button key event, when the double-click power button event is recognized, the payment password is submitted;
- Power button driver It is divided into REE side power button driver and REE side power button driver, which respectively identify the power button button events on the REE side or the TEE side.
- TEE side power key driver recognizes that the power key is double-clicked, an event is generated and sent to the TUI password keyboard key monitoring module;
- Power button Double-click or click the power button in the TEE environment, the power button driver on the TEE side monitors the double-click or click the power button event and confirms the submission of the payment password.
- FIG. 1 the structure shown in FIG. 1 above is only an example, which is not limited in this embodiment of the present invention.
- FIG. 2 shows in detail a flow of an information processing method provided by an embodiment of the present invention, and the flow may be executed by an information processing apparatus.
- the process specifically includes:
- step 201 trigger information of the power key is acquired.
- the trigger information of the power key can be divided into single-click power events and double-click power events. It is actively triggered by the user at different use timings, and the user can actively trigger the power button, so as to realize the user's perception of the trusted execution environment.
- the trusted user interface is displayed in the trusted execution environment, and the user can input sensitive data on the information input interface of the trusted user interface.
- the trusted user interface is the display interface of the secure operating system running under the trusted execution environment, that is, the user interface under the trusted execution environment.
- Step 202 Collect the information input by the user on the information input interface of the trusted user interface according to the trigger information of the power key, and send the collected information to the service processing unit.
- the trigger information of the power key may include first trigger information.
- the information input interface is invoked, and the information input interface is displayed on the trusted user interface, so that the user can input information on the information input interface.
- the first preset time can be set according to experience.
- the user instruction may be an instruction operated by a user on an information input interface
- the information input interface may include the following types: a password input interface, a login interface (including a login name and a password), a message display interface, and a password modification interface (including the original password, new password and confirm new password) and so on.
- the information input by the user on the information input interface of the trusted user interface may be account information (eg, login name) and/or password (password) information, and may also be message, password change information, and the like.
- a confirmation button is provided on the information input interface, and when an instruction of the user touching the confirmation button is collected, the information input by the user on the information input interface can be collected.
- the information input by the user on the information input interface can be collected.
- the power button is used to determine whether to submit the input information.
- the button monitoring module located in the trusted execution environment can monitor the trigger information of the power button.
- the trigger information of the power key further includes second trigger information.
- the second trigger information is triggered after the user inputs information on the information input interface.
- the above-mentioned second trigger information is that when the power button is clicked, the information confirmation button and the information cancellation button can be called, and the information confirmation button and the information cancellation button can be displayed on the trusted user interface, so that the user can confirm whether to submit the information input interface. information entered above. Then, after it is obtained that the user clicks the information confirmation button, the information input by the user on the information input interface is collected.
- the trusted user interface is exited.
- the second preset time can be set based on experience.
- the trigger information of the above-mentioned power key may be the third trigger information. It is determined whether the third trigger information is a double-clicking power button event, and if so, the information input by the user on the information input interface is directly collected. The third trigger information is obtained after the user inputs information on the information input interface.
- the information input interface may include the following: password input interface, login interface (including login name and password), message display interface, password modification interface (including original password, new password and confirming new password) and so on.
- the information input by the user on the information input interface of the trusted user interface may be account information (eg, login name) and/or password (password) information, and may also be message, password change information, and the like.
- the key monitoring module submits the input information of the user interface after recognizing the key event of double-clicking the power key.
- the trigger information of the power key is a double-click event of the power key
- the information input by the user on the trusted user interface can be directly collected.
- the information confirmation button and the information cancellation button can be called, and the information confirmation button and the information cancellation button can be displayed on the trusted user interface, so that the user can confirm whether to submit the information in the user interface.
- Information entered on the information input interface is obtained. Then, after it is obtained that the user clicks the information confirmation button, the information input by the user on the information input interface is collected.
- the trusted user interface is exited.
- the second preset time can be set based on experience.
- the trigger information of the power button may also be fourth trigger information.
- the preset service processing identifier needs to be acquired, and then when the fourth trigger information is confirmed to be received, the trusted user interface is started according to the preset service processing identifier.
- the information input by the user on the trusted user interface is collected after the third preset time or according to the user's instruction.
- the third preset time can be set based on experience.
- the fourth trigger information may be a single-click event or a double-click event of the power button.
- the preset service processing identifier is a service processing identifier set based on experience, such as payment service, repayment service, card reading service, and the like.
- the control of the key business processing will send the above preset business to the system of the terminal. Processing ID, at this time, the system will obtain the preset service processing ID. At this time, if it is determined that the fourth trigger information is received, the control corresponding to the preset service processing identifier may be notified to start the trusted user interface based on the preset service processing identifier. So that the user can input corresponding information on the trusted user interface.
- the acquiring APP when the acquiring APP initiates payment service processing, the acquiring APP will call up the UnionPay payment control, and the payment control will send a payment command identifier to the mobile phone system.
- the mobile phone system will recognize the click of the power button event, and will determine whether there is a payment command identifier, which can be said to determine whether the payment command identifier is received.
- the receipt When the receipt is confirmed, it will notify the payment control to call up the TUI security interface. Otherwise, the screen-off operation will be performed.
- the information input by the user on the trusted user interface may be collected.
- the user instruction may be an instruction operated by a user on an information input interface
- the information input interface may include the following types: a password input interface, a login interface (including a login name and a password), a message display interface, and a password modification interface (including the original password, new password and confirm new password) and so on.
- the information input by the user on the information input interface of the trusted user interface may be account information (eg, login name) and/or password (password) information, and may also be message, password change information, and the like.
- a confirmation button is provided on the information input interface, and when an instruction of the user touching the confirmation button is collected, the information input by the user on the information input interface can be collected.
- the trigger information of the above-mentioned power key may also be fifth trigger information.
- the fifth trigger information is triggered after the user receives the key prompt information for entering the trusted user interface.
- the key prompt information is the information displayed when the user needs to enter the trusted user interface in the process of using the application program of the preset mechanism.
- the preset mechanism can be set based on experience.
- the trusted user interface When it is confirmed that the fourth trigger information is received, the trusted user interface is activated, the information input interface is called, and the information input interface is displayed on the trusted user interface, so that the user can input information on the information input interface. Then, the information input by the user on the information input interface is collected after the fourth preset time.
- the fourth preset time can be set based on experience.
- the information input interface may include the following: password input interface, login interface (including login name and password), message display interface, password modification interface (including original password, new password and confirm new password) and so on.
- the information input by the user on the information input interface of the trusted user interface may be account information (eg, login name) and/or password (password) information, and may also be message, password change information, and the like.
- a key prompt message for entering the trusted user interface will be displayed.
- the system collects the trigger information of the power button, it will not enter the screen-on-screen mode, but will start the trusted user interface, call the information input interface, and display the information input interface on the trusted user interface. It can prevent the problem that the display screen is off after the user clicks the power button, so that the power button can call a trusted user interface.
- a user confirmation interface can be added to remind the user to click the power button to call up the TUI security password keyboard.
- the user confirmation interface and the power button click event are both on the REE side, but when the user confirms the interface for a period of time after the power button click event, it is treated differently from the existing screen after the power button is clicked.
- the mobile phone manufacturer needs to open a special system-level power key permission to distinguish the power key events at this time.
- the acquiring APP initiates a transaction payment request
- the trusted user interface based on TUI can ensure that the input sensitive data is not illegally monitored, tampered, destroyed and stolen.
- the power button belongs to the existing and essential hardware of the terminal device, and the invocation of the power button requires system-level permissions. By double-clicking the power button to confirm and submit the input information, the user's perception of the security environment can be enhanced, because the APP on the REE side is generally not used. The authority of the power button cannot be forged.
- Another embodiment includes: after entering the transaction password, click the power button, and then the TUI password keyboard interface pops up a confirm payment button, the user clicks confirm to submit the password result, and if clicks cancel, directly exits the TUI password keyboard interface.
- the business process shown in Figure 6 includes:
- the acquiring APP initiates a transaction payment request
- TUI gets the power button event, a confirmation interface will pop up;
- the trusted user interface based on TUI can ensure that the input sensitive data is not illegally monitored, tampered, destroyed and stolen.
- the power button belongs to the existing and essential hardware of the terminal device, and the invocation of the power button requires system-level permissions. By clicking the power button to confirm and submit the input information, the user's perception of the security environment can be enhanced, because the general REE side APP does not have The authority to use the power button cannot be faked.
- the trigger information of the power key in the trusted execution environment is obtained, according to the trigger information of the power key, the information input by the user on the trusted user interface is collected, and the collected information is sent to the service processing unit .
- the sensitive data input by the user is collected by judging the trigger information of the power button, and the user realizes the submission of the input data by clicking the power button.
- REE ich Execution Environment, common execution environment
- FIG. 7 exemplarily shows the structure of an information processing apparatus provided by an embodiment of the present invention, and the apparatus can execute an information processing flow.
- the device specifically includes:
- an obtaining unit 701 configured to obtain trigger information of the power key
- the processing unit 702 is configured to collect the information input by the user on the information input interface of the trusted user interface according to the trigger information of the power key, and send the collected information to the service processing unit.
- the trigger information of the power button includes first trigger information
- the processing unit 702 has functions for:
- the information input interface is called, and the information input interface is displayed on the trusted user interface, so that the user can input information on the information input interface ;
- the first trigger information is triggered by the user after determining that the terminal enters the trusted user interface;
- the information input by the user on the information input interface is collected after the first preset time.
- the trigger information of the power button further includes second trigger information
- the processing unit 702 is also used for:
- the second trigger information Before collecting the information input by the user on the information input interface, determine that the second trigger information is received and determine that the second trigger information is a double-click power button event; the second trigger information is the user's Triggered after entering information on the information input interface.
- the trigger information of the power button is the third trigger information
- the processing unit 702 has functions for:
- the third trigger information is a double-click power button event, and if so, directly collect the information input by the user on the information input interface; the third trigger information is the information input by the user on the information input interface obtained afterward.
- processing unit 702 is further configured to:
- the second trigger information or the third trigger event is a power button click event
- the information confirmation button and the information cancellation button are called, and the information confirmation button and the information cancellation button are displayed on the trusted user interface , so that the user confirms whether to submit the information input by the user on the information input interface;
- the information input by the user on the information input interface is collected.
- processing unit 702 is further configured to:
- the trusted user interface is exited.
- the trigger information of the power button is fourth trigger information
- the processing unit 702 has functions for:
- the information input by the user on the trusted user interface is collected after the third preset time or according to a user instruction.
- the information input by the user on the information input interface of the trusted user interface includes account information and/or password information.
- an embodiment of the present invention also provides a computing device, including:
- the processor is configured to call the program instructions stored in the memory, and execute the above information processing method according to the obtained program.
- an embodiment of the present invention also provides a computer-readable non-volatile storage medium, including computer-readable instructions, when the computer reads and executes the computer-readable instructions, the computer executes the above information processing method .
- These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions
- the apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Input From Keyboards Or The Like (AREA)
- Power Sources (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
本发明公开了一种信息处理方法及装置,该方法包括获取可信执行环境下的电源键的触发信息,依据电源键的触发信息,采集用户在可信用户界面上输入的信息,并将采集到的信息发送给业务处理单元。通过对电源键的触发信息进行判别来采集用户输入的敏感数据,由于用户通过点击电源键来实现输入的数据的提交,用户可以有效的感知安全环境的存在,提高终端支付的安全性。
Description
相关申请的交叉引用
本申请要求在2021年02月01日提交中国专利局、申请号为202110133354.3、申请名称为“一种信息处理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及终端支付技术领域,尤其涉及一种信息处理方法及装置。
为了保证交易密码等敏感数据的安全性,收款设备使用了基于TUI(Trusted User Interface,可信人机界面)的可信用户界面,来保证输入的敏感数据不被非法监控、篡改、破坏和窃取。在收款设备试点过程中,因为需要消费者在商户手机上输入交易密码,但是消费者无法感知是在一个安全的环境中进行操作,所以消费者存在一定的安全疑虑。
发明内容
本发明实施例提供一种信息处理方法及装置,用以增强用户对安全环境的感知,提高终端支付的安全性。
第一方面,本发明实施例提供一种信息处理方法,包括:
获取电源键的触发信息;
依据所述电源键的触发信息,采集所述用户在可信用户界面上输入的信息,并将采集到的信息发送给业务处理单元。
上述技术方案中,通过对电源键的触发信息进行判别来采集用户输入的敏感数据,用户通过点击电源键来实现输入的数据的提交。一般在REE(Rich Execution Environment,普通执行环境)下,点击电源键会造成终端的显示屏 屏幕点亮或关闭,而在可信执行环境下,点击电源键终端的显示屏不会产生屏幕点亮或关闭的操作,并可以在显示屏的相应区域给予提示信息,这使得用户可以有效的感知当前终端处于一个安全环境的中。此外由于REE下的APP没有使用电源键的权限,进而无法实现伪造电源键信息的情况,提高终端支付的安全性。
可选的,所述电源键的触发信息包括第一触发信息;
所述依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,包括:
在确认接收到所述第一触发信息时,调用所述信息输入界面,并将所述信息输入界面显示在所述可信用户界面上,以使所述用户在所述信息输入界面上输入信息;所述第一触发信息是用户在确定终端进入可信用户界面后触发的;
第一预设时间之后或根据用户指令采集所述用户在所述信息输入界面上输入的信息。
可选的,所述电源键的触发信息还包括第二触发信息;
在采集所述用户在所述信息输入界面上输入的信息之前,还包括:
确定接收到所述第二触发信息且确定所述第二触发信息为双击电源键事件;所述第二触发信息是用户在所述信息输入界面上输入信息之后触发的。
可选的,所述电源键的触发信息为第三触发信息;
所述依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,包括:
确定所述第三触发信息是否为双击电源键事件,若是,则直接采集所述用户在所述信息输入界面上输入的信息;所述第三触发信息是用户在所述信息输入界面上输入信息之后获取的。
可选的,所述方法还包括:
若所述第二触发信息或所述第三触发事件为单击电源键事件,则调用信息确认按钮和信息取消按钮,并在所述可信用户界面上显示信息确认按钮和 所述信息取消按钮,以使所述用户确认是否提交所述用户在所述信息输入界面上输入的信息;
在获取到所述用户点击所述信息确认按钮后,采集所述用户在所述信息输入界面上输入的信息。
可选的,所述方法还包括:
若获取到所述用户点击所述信息取消按钮或在第二预设时间内未获取到所述用户的点击信息,则退出所述可信用户界面。
可选的,所述电源键的触发信息为第四触发信息;
所述依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元,包括:
获取预设业务处理标识;
在确认接收到所述第四触发信息时,根据所述预设业务处理标识,启动所述可信用户界面;
所述第三预设时间之后或根据用户指令采集所述用户在所述可信用户界面上输入的信息。
可选的,所述用户在所述可信用户界面的信息输入界面上输入的信息包括账户信息和/或密码信息。
第二方面,本发明实施例提供一种信息处理装置,包括:
获取单元,用于获取电源键的触发信息;
处理单元,用于依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元。
可选的,所述电源键的触发信息包括第一触发信息;
所述处理单元具有用于:
在确认接收到所述第一触发信息时,调用所述信息输入界面,并将所述信息输入界面显示在所述可信用户界面上,以使所述用户在所述信息输入界面上输入信息;所述第一触发信息是用户在确定终端进入可信用户界面后触发的;
第一预设时间之后或根据用户指令采集所述用户在所述信息输入界面上输入的信息。
可选的,所述电源键的触发信息还包括第二触发信息;
所述处理单元还用于:
在采集所述用户在所述信息输入界面上输入的信息之前,确定接收到所述第二触发信息且确定所述第二触发信息为双击电源键事件;所述第二触发信息是用户在所述信息输入界面上输入信息之后触发的。
可选的,所述电源键的触发信息为第三触发信息;
所述处理单元具有用于:
确定所述第三触发信息是否为双击电源键事件,若是,则直接采集所述用户在所述信息输入界面上输入的信息;所述第三触发信息是用户在所述信息输入界面上输入信息之后获取的。
可选的,所述处理单元还用于:
若所述第二触发信息或所述第三触发事件为单击电源键事件,则调用信息确认按钮和信息取消按钮,并在所述可信用户界面上显示信息确认按钮和所述信息取消按钮,以使所述用户确认是否提交所述用户在所述信息输入界面上输入的信息;
在获取到所述用户点击所述信息确认按钮后,采集所述用户在所述信息输入界面上输入的信息。
可选的,所述处理单元还用于:
若获取到所述用户点击所述信息取消按钮或在第二预设时间内未获取到所述用户的点击信息,则退出所述可信用户界面。
可选的,所述电源键的触发信息为第四触发信息;
所述处理单元具有用于:
获取预设业务处理标识;
在确认接收到所述第四触发信息时,根据所述预设业务处理标识,启动所述可信用户界面;
所述第三预设时间之后或根据用户指令采集所述用户在所述可信用户界面上输入的信息。
可选的,所述用户在所述可信用户界面的信息输入界面上输入的信息包括账户信息和/或密码信息。
第三方面,本发明实施例还提供一种计算设备,包括:
存储器,用于存储程序指令;
处理器,用于调用所述存储器中存储的程序指令,按照获得的程序执行上述信息处理方法。
第四方面,本发明实施例还提供一种计算机可读非易失性存储介质,包括计算机可读指令,当计算机读取并执行所述计算机可读指令时,使得计算机执行上述信息处理方法。
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例提供的一种系统架构的示意图;
图2为本发明实施例提供的一种信息处理方法的流程示意图;
图3为本发明实施例提供的一种可信执行环境的示意图;
图4为本发明实施例提供的一种调用可信用户界面的示意图;
图5为本发明实施例提供的一种业务流程的示意图;
图6为本发明实施例提供的一种业务流程的示意图;
图7为本发明实施例提供的一种信息处理装置的结构示意图。
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本 发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
图1为本发明实施例提供的一种系统架构。如图1所示,该系统架构可以包括收单APP(Application,应用程序)、TUI密码键盘、电源键驱动和电源键四个部分。
其中,收单APP:运行在REE侧,负责发起支付调用TUI密码键盘;
TUI密码键盘:运行在TEE(Trusted Execution Environment,可信执行环境)侧,提供安全密码键盘供用户输入支付密码,保证输入的敏感数据不被非法监控、篡改、破坏和窃取,按键监听模块负责识别电源键按键事件,当识别到双击电源键事件后提交支付密码;
电源键驱动:分为REE侧电源键驱动和REE侧电源键驱动,分别识别REE侧或者TEE侧的电源键按键事件。当TEE侧电源键驱动识别到双击电源键时生成事件并发送给TUI密码键盘按键监听模块;
电源键:在TEE环境中双击或点击电源键,TEE侧电源键驱动监听到双击或点击电源键事件后确认提交支付密码。
需要说明的是,上述图1所示的结构仅是一种示例,本发明实施例对此不做限定。
基于上述描述,图2详细的示出了本发明实施例提供的一种信息处理方法的流程,该流程可以由信息处理装置执行。
如图2所示,该流程具体包括:
步骤201,获取电源键的触发信息。
在本发明实施例中,该电源键的触发信息可以分为单击电源事件和双击电源事件。其由用户在不同的使用时机时主动触发,通过用户主动触发电源键,以实现用户感知可信执行环境。在可信执行环境下显示可信用户界面,用户可以在可信用户界面的信息输入界面上输入敏感数据。该可信用户界面 是可信执行环境下运行的安全操作系统的显示界面,也就是可信执行环境下的用户界面。
步骤202,依据所述电源键的触发信息采集所述用户在所述可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元。
具体的,基于用户触发电源键的时机不同,可以通过下述几种方式来描述采集用户输入的信息的过程:
方式一
上述电源键的触发信息可以包括第一触发信息。在确认接收到所述第一触发信息时,调用信息输入界面,并将信息输入界面显示在可信用户界面上,以使用户在信息输入界面上输入信息。然后第一预设时间之后或根据用户指令采集用户在信息输入界面上输入的信息。该第一预设时间可以依据经验设置。
其中,用户指令可以为信息输入界面上用户操作的指令,该信息输入界面可以包括以下几种:口令输入界面、登录界面(包含登录名和口令)、消息显示界面、口令修改界面(包含原口令、新口令和确认新口令)等等。
该用户在可信用户界面的信息输入界面上输入信息可以为账户信息(如登录名)和/或密码(口令)信息,也可以为消息、更改口令信息等。
例如信息输入界面上设有确定按钮,采集到用户触摸确定按钮的指令时,就可以采集用户在该信息输入界面上的输入的信息。
当用户在可信用户界面的信息输入界面上输入信息之后,就可以采集用户在信息输入界面上输入的信息。
采集输入的信息时,还可以通过点击电源键的方式来实现,通过电源键来确定是否提交输入的信息,此时位于可信执行环境内的按键监听模块可以监听到该电源键的触发信息。该电源键的触发信息还包括第二触发信息。
在采集用户在信息输入界面上输入的信息之前,需要确定接收到所述第二触发信息且确定第二触发信息为双击电源键事件。其中,第二触发信息是用户在信息输入界面上输入信息之后触发的。
上述第二触发信息为单击电源键事件时,可以调用信息确认按钮和信息取消按钮,并在可信用户界面上显示信息确认按钮和信息取消按钮,以使用户确认是否提交用户在信息输入界面上输入的信息。然后在获取到用户点击信息确认按钮后,采集用户在信息输入界面上输入的信息。
此外,若获取到用户点击信息取消按钮或在第二预设时间内未获取到用户的点击信息,则退出可信用户界面。该第二预设时间可以依据经验设置。
方式二
上述电源键的触发信息可以为第三触发信息。确定第三触发信息是否为双击电源键事件,若是,则直接采集用户在信息输入界面上输入的信息。其中,该第三触发信息是用户在信息输入界面上输入信息之后获取的。
该信息输入界面可以包括以下几种:口令输入界面、登录界面(包含登录名和口令)、消息显示界面、口令修改界面(包含原口令、新口令和确认新口令)等等。
该用户在可信用户界面的信息输入界面上输入信息可以为账户信息(如登录名)和/或密码(口令)信息,也可以为消息、更改口令信息等。
如图3所示,用户在基于TUI的可信用户界面的信息输入界面上输入信息后,双击电源键确认,当位于TEE侧的电源键驱动识别到双击电源键时生成事件并发送给TUI密码键盘按键监听模块,按键监听模块识别到双击电源键的按键事件后提交用户界面输入的信息。
当电源键的触发信息为双击电源键事件时,可以直接采集用户在可信用户界面上输入的信息。
此外,当上述第三触发信息为单击电源键事件时,可以调用信息确认按钮和信息取消按钮,并在可信用户界面上显示信息确认按钮和信息取消按钮,以使用户确认是否提交用户在信息输入界面上输入的信息。然后在获取到用户点击信息确认按钮后,采集用户在信息输入界面上输入的信息。
此外,若获取到用户点击信息取消按钮或在第二预设时间内未获取到用 户的点击信息,则退出可信用户界面。该第二预设时间可以依据经验设置。
方式三
上述电源键的触发信息还可以为第四触发信息。具体的,需要获取预设业务处理标识,然后在确认接收到第四触发信息时,根据预设业务处理标识,启动可信用户界面。第三预设时间之后或根据用户指令采集用户在可信用户界面上输入的信息。该第三预设时间可以依据经验设置。该第四触发信息可以为单击电源键事件或双击电源键事件。
该预设业务处理标识为依据经验设置的业务处理的标识,例如支付业务、还款业务、读卡业务等。
用户在使用某个预设机构的应用程序,在进行到业务处理的关键步骤,需要进入到可信用户界面进行关键业务处理时,该关键业务处理的控件会向终端的系统发送上述预设业务处理标识,此时系统会获取到预设业务处理标识。此时若确定接收到第四触发信息,则可以基于预设业务处理标识,通知所述预设业务处理标识对应的控件启动可信用户界面。以使用户在该可信用户界面上输入相应的信息。
例如,如图4所示,收单APP发起支付业务处理时,收单App会调起银联支付控件,该支付控件会发送支付命令标识给手机系统。此时,手机系统会识别单击电源按键事件,并会判断是否含有支付命令标识,可以说是判断是否接收到支付命令标识,在确认接收到时,通知支付控件调起TUI安全界面。否则会进行息屏操作。
在上述第三预设时间之后或根据用户指令,就可以采集用户在该可信用户界面上输入的信息。
其中,用户指令可以为信息输入界面上用户操作的指令,该信息输入界面可以包括以下几种:口令输入界面、登录界面(包含登录名和口令)、消息显示界面、口令修改界面(包含原口令、新口令和确认新口令)等等。
该用户在可信用户界面的信息输入界面上输入信息可以为账户信息(如登录名)和/或密码(口令)信息,也可以为消息、更改口令信息等。
例如信息输入界面上设有确定按钮,采集到用户触摸确定按钮的指令时,就可以采集用户在该信息输入界面上的输入的信息。
方式四
上述电源键的触发信息还可以为第五触发信息。该第五触发信息是用户接收到进入可信用户界面的按键提示信息后触发的。该按键提示信息是用户使用预设机构的应用程序的过程中需要进入可信用户界面时展示的信息。预设机构可以依据经验设置。
在确认接收到第四触发信息时,启动可信用户界面,并调用信息输入界面,将信息输入界面显示在可信用户界面上,以使用户在信息输入界面上输入信息。然后第四预设时间之后采集用户在信息输入界面上输入的信息。该第四预设时间可以依据经验设置。
该信息输入界面可以包括以下几种:口令输入界面、登录界面(包含登录名和口令)、消息显示界面、口令修改界面(包含原口令、新口令和确认新口令)等等。
该用户在可信用户界面的信息输入界面上输入信息可以为账户信息(如登录名)和/或密码(口令)信息,也可以为消息、更改口令信息等。
用户在使用某个预设机构的应用程序时,在进行到业务处理的关键步骤,需要进入到可信用户界面进行关键业务处理时,会展示进入可信用户界面的按键提示信息。此时系统采集到电源键的触发信息时,不会进入息屏模式,而是启动可信用户界面,并调用信息输入界面,将信息输入界面显示在可信用户界面上。可以防止用户点击电源键后会产生显示屏息屏的问题,从而实现电源键调用可信用户界面。
在用户选择业务处理方式后,调起信息输入界面前,可以增加用户确认的界面,提醒用户通过单击电源键来调起TUI安全密码键盘。该种方式下用户确认界面以及单击电源键事件都是在REE侧,但是当用户确认界面出现后的一段时间单击电源键事件是与现有单击电源键后息屏区别对待的,这需要 手机厂家单独开放一个特殊的系统级电源键权限来区别此时的电源键事件。
为了更好的解释本发明实施例,下面将在具体的实施场景下来描述上述信息处理的过程。
基于图1所示的系统架构,以交易密码提交为例,如图5所示,具体业务流程包括:
1、收单APP发起交易支付请求;
2、调起基于TUI的安全密码键盘界面;
3、用户通过安全密码键盘输入交易密码;
4、密码输入后,用户通过双击电源键确认提交;
5、TUI获取到电源按键事件之后提交交易密码;
6、返回结果给收单APP。
基于TUI的可信用户界面可以保证输入的敏感数据不被非法监控、篡改、破坏和窃取。电源键属于终端设备已有且必不可少硬件,而电源键的调用需要系统级权限,通过双击电源键确认并提交输入的信息可以增强用户对安全环境的感知,因为一般REE侧的APP没有使用电源键的权限,无法进行伪造。
另一实施例包括:输入交易密码后,单击电源键,然后TUI密码键盘界面弹出确认支付按钮,用户点击确认则提交密码结果,若点击取消则直接退出TUI密码键盘界面。
如图6所示的业务流程包括:
1、收单APP发起交易支付请求;
2、调起基于TUI的安全密码键盘界面;
3、用户通过安全密码键盘输入交易密码;
4、密码输入后,用户点击电源键确认;
5、TUI获取到电源按键事件之后弹出确认界面;
6、用户点击确认支付则提交交易密码,若点击取消则退出TUI密码键盘界面;
7、返回结果给收单APP。
基于TUI的可信用户界面可以保证输入的敏感数据不被非法监控、篡改、破坏和窃取。电源键属于终端设备已有且必不可少硬件,而电源键的调用需要系统级权限,通过单击电源键确认并提交输入的信息可以增强用户对安全环境的感知,因为一般REE侧的APP没有使用电源键的权限,无法进行伪造。
在本发明实施例中,获取可信执行环境下的电源键的触发信息,依据电源键的触发信息,采集用户在可信用户界面上输入的信息,并将采集到的信息发送给业务处理单元。通过对电源键的触发信息进行判别来采集用户输入的敏感数据,用户通过点击电源键来实现输入的数据的提交。一般在REE(Rich Execution Environment,普通执行环境)下,点击电源键会造成终端的显示屏屏幕点亮或关闭,而在可信执行环境下,点击电源键终端的显示屏不会产生屏幕点亮或关闭的操作,并可以在显示屏的相应区域给予提示信息,这使得用户可以有效的感知当前终端处于一个安全环境的中。此外由于REE下的APP没有使用电源键的权限,进而无法实现伪造电源键信息的情况,提高终端支付的安全性。
基于相同的技术构思,图7示例性的示出了本发明实施例提供的一种信息处理装置的结构,该装置可以执行信息处理流程。
如图7所示,该装置具体包括:
获取单元701,用于获取电源键的触发信息;
处理单元702,用于依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元。
可选的,所述电源键的触发信息包括第一触发信息;
所述处理单元702具有用于:
在确认接收到所述第一触发信息时,调用所述信息输入界面,并将所述信息输入界面显示在所述可信用户界面上,以使所述用户在所述信息输入界面上输入信息;所述第一触发信息是用户在确定终端进入可信用户界面后触 发的;
第一预设时间之后采集所述用户在所述信息输入界面上输入的信息。
可选的,所述电源键的触发信息还包括第二触发信息;
所述处理单元702还用于:
在采集所述用户在所述信息输入界面上输入的信息之前,确定接收到所述第二触发信息且确定所述第二触发信息为双击电源键事件;所述第二触发信息是用户在所述信息输入界面上输入信息之后触发的。
可选的,所述电源键的触发信息为第三触发信息;
所述处理单元702具有用于:
确定所述第三触发信息是否为双击电源键事件,若是,则直接采集所述用户在所述信息输入界面上输入的信息;所述第三触发信息是用户在所述信息输入界面上输入信息之后获取的。
可选的,所述处理单元702还用于:
若所述第二触发信息或所述第三触发事件为单击电源键事件,则调用信息确认按钮和信息取消按钮,并在所述可信用户界面上显示信息确认按钮和所述信息取消按钮,以使所述用户确认是否提交所述用户在所述信息输入界面上输入的信息;
在获取到所述用户点击所述信息确认按钮后,采集所述用户在所述信息输入界面上输入的信息。
可选的,所述处理单元702还用于:
若获取到所述用户点击所述信息取消按钮或在第二预设时间内未获取到所述用户的点击信息,则退出所述可信用户界面。
可选的,所述电源键的触发信息为第四触发信息;
所述处理单元702具有用于:
获取预设业务处理标识;
在确认接收到所述第四触发信息时,根据所述预设业务处理标识,启动所述可信用户界面;
所述第三预设时间之后或根据用户指令采集所述用户在所述可信用户界面上输入的信息。
可选的,所述用户在所述可信用户界面的信息输入界面上输入的信息包括账户信息和/或密码信息。
基于相同的技术构思,本发明实施例还提供了一种计算设备,包括:
存储器,用于存储程序指令;
处理器,用于调用存储器中存储的程序指令,按照获得的程序执行上述信息处理方法。
基于相同的技术构思,本发明实施例还提供了一种计算机可读非易失性存储介质,包括计算机可读指令,当计算机读取并执行计算机可读指令时,使得计算机执行上述信息处理方法。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。
Claims (18)
- 一种信息处理方法,其特征在于,包括:获取电源键的触发信息;依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元。
- 如权利要求1所述的方法,其特征在于,所述电源键的触发信息包括第一触发信息;所述依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,包括:在确认接收到所述第一触发信息时,调用所述信息输入界面,并将所述信息输入界面显示在所述可信用户界面上,以使所述用户在所述信息输入界面上输入信息;所述第一触发信息是用户在确定终端进入可信用户界面后触发的;第一预设时间之后或根据用户指令采集所述用户在所述信息输入界面上输入的信息。
- 如权利要求2所述的方法,其特征在于,所述电源键的触发信息还包括第二触发信息;在采集所述用户在所述信息输入界面上输入的信息之前,还包括:确定接收到所述第二触发信息且确定所述第二触发信息为双击电源键事件;所述第二触发信息是用户在所述信息输入界面上输入信息之后触发的。
- 如权利要求1所述的方法,其特征在于,所述电源键的触发信息为第三触发信息;所述依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,包括:确定所述第三触发信息是否为双击电源键事件,若是,则直接采集所述用户在所述信息输入界面上输入的信息;所述第三触发信息是用户在所述信 息输入界面上输入信息之后获取的。
- 如权利要求3或4所述的方法,其特征在于,所述方法还包括:若所述第二触发信息或所述第三触发事件为单击电源键事件,则调用信息确认按钮和信息取消按钮,并在所述可信用户界面上显示信息确认按钮和所述信息取消按钮,以使所述用户确认是否提交所述用户在所述信息输入界面上输入的信息;在获取到所述用户点击所述信息确认按钮后,采集所述用户在所述信息输入界面上输入的信息。
- 如权利要求5所述的方法,其特征在于,所述方法还包括:若获取到所述用户点击所述信息取消按钮或在第二预设时间内未获取到所述用户的点击信息,则退出所述可信用户界面。
- 如权利要求1所述的方法,其特征在于,所述电源键的触发信息包括第四触发信息;所述依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元,包括:获取预设业务处理标识;在确认接收到所述第四触发信息时,根据所述预设业务处理标识,启动所述可信用户界面;所述第三预设时间之后或根据用户指令采集所述用户在所述可信用户界面上输入的信息。
- 如权利要求1至4、7任一项所述的方法,其特征在于,所述用户在所述可信用户界面的信息输入界面上输入的信息包括账户信息和/或密码信息。
- 一种信息处理装置,其特征在于,包括:获取单元,用于获取电源键的触发信息;处理单元,用于依据所述电源键的触发信息,采集所述用户在可信用户界面的信息输入界面上输入的信息,并将采集到的信息发送给业务处理单元。
- 如权利要求9所述的装置,其特征在于,所述电源键的触发信息包 括第一触发信息;所述处理单元具有用于:在确认接收到所述第一触发信息时,调用所述信息输入界面,并将所述信息输入界面显示在所述可信用户界面上,以使所述用户在所述信息输入界面上输入信息;所述第一触发信息是用户在确定终端进入可信用户界面后触发的;第一预设时间之后或根据用户指令采集所述用户在所述信息输入界面上输入的信息。
- 如权利要求10所述的装置,其特征在于,所述电源键的触发信息还包括第二触发信息;所述处理单元还用于:在采集所述用户在所述信息输入界面上输入的信息之前,确定接收到所述第二触发信息且确定所述第二触发信息为双击电源键事件;所述第二触发信息是用户在所述信息输入界面上输入信息之后触发的。
- 如权利要求9所述的装置,其特征在于,所述电源键的触发信息为第三触发信息;所述处理单元具有用于:确定所述第三触发信息是否为双击电源键事件,若是,则直接采集所述用户在所述信息输入界面上输入的信息;所述第三触发信息是用户在所述信息输入界面上输入信息之后获取的。
- 如权利要求11或12所述的装置,其特征在于,所述处理单元还用于:若所述第二触发信息或所述第三触发事件为单击电源键事件,则调用信息确认按钮和信息取消按钮,并在所述可信用户界面上显示信息确认按钮和所述信息取消按钮,以使所述用户确认是否提交所述用户在所述信息输入界面上输入的信息;在获取到所述用户点击所述信息确认按钮后,采集所述用户在所述信息 输入界面上输入的信息。
- 如权利要求13所述的装置,其特征在于,所述处理单元还用于:若获取到所述用户点击所述信息取消按钮或在第二预设时间内未获取到所述用户的点击信息,则退出所述可信用户界面。
- 如权利要求9所述的装置,其特征在于,所述电源键的触发信息为第四触发信息;所述处理单元具有用于:获取预设业务处理标识;在确认接收到所述第四触发信息时,根据所述预设业务处理标识,启动所述可信用户界面;所述第三预设时间之后或根据用户指令采集所述用户在所述可信用户界面上输入的信息。
- 如权利要求9至12、14任一项所述的装置,其特征在于,所述用户在所述可信用户界面的信息输入界面上输入的信息包括账户信息和/或密码信息。
- 一种计算设备,其特征在于,包括:存储器,用于存储程序指令;处理器,用于调用所述存储器中存储的程序指令,按照获得的程序执行权利要求1至8任一项所述的方法。
- 一种计算机可读非易失性存储介质,其特征在于,包括计算机可读指令,当计算机读取并执行所述计算机可读指令时,使得计算机执行如权利要求1至8任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110133354.3 | 2021-02-01 | ||
CN202110133354.3A CN112862497A (zh) | 2021-02-01 | 2021-02-01 | 一种信息处理方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022160789A1 true WO2022160789A1 (zh) | 2022-08-04 |
Family
ID=75987146
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/124673 WO2022160789A1 (zh) | 2021-02-01 | 2021-10-19 | 一种信息处理方法及装置 |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN112862497A (zh) |
TW (1) | TWI825496B (zh) |
WO (1) | WO2022160789A1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115689553A (zh) * | 2021-07-27 | 2023-02-03 | 华为技术有限公司 | 一种支付方法、装置及终端设备 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104598810A (zh) * | 2015-01-09 | 2015-05-06 | 天津三星通信技术研究有限公司 | 实现智能终端的安全使用的方法和设备 |
US20160253519A1 (en) * | 2015-02-27 | 2016-09-01 | Samsung Electronics Co., Ltd. | Apparatus and method for trusted execution environment file protection |
CN106295387A (zh) * | 2015-06-05 | 2017-01-04 | 北京壹人壹本信息科技有限公司 | 一种安全防护方法及装置 |
CN108229117A (zh) * | 2017-11-29 | 2018-06-29 | 努比亚技术有限公司 | 柔性屏终端及其安全控制方法及计算机可读存储介质 |
US20190311175A1 (en) * | 2016-10-08 | 2019-10-10 | Huawei Technologies Co., Ltd. | Fingerprint Collection Method and Terminal |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106200891B (zh) * | 2015-05-08 | 2019-09-06 | 阿里巴巴集团控股有限公司 | 显示用户界面的方法、装置及系统 |
CN105574389A (zh) * | 2015-06-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种指纹识别方法和终端 |
CN107153958A (zh) * | 2017-04-19 | 2017-09-12 | 北京小米移动软件有限公司 | Nfc支付方法及设备 |
TWI682301B (zh) * | 2018-11-19 | 2020-01-11 | 歐生全科技股份有限公司 | 多功能認證裝置與運作方法 |
CN111107525B (zh) * | 2019-04-26 | 2022-01-14 | 华为技术有限公司 | 一种se的自动路由方法及电子设备 |
CN112288425B (zh) * | 2020-12-23 | 2021-04-13 | 中国银联股份有限公司 | 支付功能开通方法、终端设备、服务器、系统及存储介质 |
CN115689553A (zh) * | 2021-07-27 | 2023-02-03 | 华为技术有限公司 | 一种支付方法、装置及终端设备 |
CN117808474B (zh) * | 2024-03-01 | 2024-06-18 | 花瓣支付(深圳)有限公司 | 可信用户界面的显示方法、设备、可读存储介质及芯片 |
-
2021
- 2021-02-01 CN CN202110133354.3A patent/CN112862497A/zh active Pending
- 2021-10-19 WO PCT/CN2021/124673 patent/WO2022160789A1/zh active Application Filing
- 2021-10-21 TW TW110138972A patent/TWI825496B/zh active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104598810A (zh) * | 2015-01-09 | 2015-05-06 | 天津三星通信技术研究有限公司 | 实现智能终端的安全使用的方法和设备 |
US20160253519A1 (en) * | 2015-02-27 | 2016-09-01 | Samsung Electronics Co., Ltd. | Apparatus and method for trusted execution environment file protection |
CN106295387A (zh) * | 2015-06-05 | 2017-01-04 | 北京壹人壹本信息科技有限公司 | 一种安全防护方法及装置 |
US20190311175A1 (en) * | 2016-10-08 | 2019-10-10 | Huawei Technologies Co., Ltd. | Fingerprint Collection Method and Terminal |
CN108229117A (zh) * | 2017-11-29 | 2018-06-29 | 努比亚技术有限公司 | 柔性屏终端及其安全控制方法及计算机可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
TW202232408A (zh) | 2022-08-16 |
CN112862497A (zh) | 2021-05-28 |
TWI825496B (zh) | 2023-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11372963B2 (en) | Client login method and apparatus and storage medium | |
US20140115662A1 (en) | Mechanism for Detecting Human Presence Using Authenticated Input Activity Timestamps | |
JP2024059748A (ja) | セキュアな動作を管理するためのユーザインタフェース | |
EP3176719B1 (en) | Methods and devices for acquiring certification document | |
CN107924449A (zh) | 一种通知消息处理方法、装置及终端 | |
CN108549799A (zh) | 安卓权限的管理方法、装置、终端和计算机存储介质 | |
WO2019214438A1 (zh) | 一种射频卡功能调用方法及装置 | |
CN107193666A (zh) | 应用程序之间调用的控制方法及装置 | |
US11838382B2 (en) | Cross-network differential determination | |
TW201821961A (zh) | 用戶操作處理方法及相關設備 | |
WO2022160789A1 (zh) | 一种信息处理方法及装置 | |
AU2021358028B2 (en) | Delayed user authentication | |
US20120304264A1 (en) | Key protecting method and a computing apparatus | |
WO2022001726A1 (zh) | 数据处理方法、装置、电子设备及介质 | |
CN110120933B (zh) | 风控、人机识别与数据处理方法、设备及系统 | |
WO2017173575A1 (zh) | 一种进入目标应用的方法和终端 | |
CN109426961A (zh) | 一种绑卡风险控制方法及装置 | |
CN107786349B (zh) | 一种针对用户账号的安全管理方法及装置 | |
CN111681364A (zh) | 一种饮水机的使用方法、装置、饮水机及存储介质 | |
US10652276B1 (en) | System and method for distinguishing authentic and malicious electronic messages | |
CN114500426B (zh) | 消息提醒方法、装置、计算机设备和存储介质 | |
WO2017197976A1 (zh) | 隐藏/显示应用程序的方法及终端设备 | |
JPH11282672A (ja) | オンラインプログラム転送方法およびオンラインプログラム実行システム | |
CN114428955A (zh) | 一种基于操作信息判断异常风险的方法、系统及电子设备 | |
CN115689553A (zh) | 一种支付方法、装置及终端设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21922380 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21922380 Country of ref document: EP Kind code of ref document: A1 |