[go: up one dir, main page]

WO2018107727A1 - Procédé et dispositif de traitement d'informations, et terminal - Google Patents

Procédé et dispositif de traitement d'informations, et terminal Download PDF

Info

Publication number
WO2018107727A1
WO2018107727A1 PCT/CN2017/091712 CN2017091712W WO2018107727A1 WO 2018107727 A1 WO2018107727 A1 WO 2018107727A1 CN 2017091712 W CN2017091712 W CN 2017091712W WO 2018107727 A1 WO2018107727 A1 WO 2018107727A1
Authority
WO
WIPO (PCT)
Prior art keywords
identity information
target application
user
unit
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/091712
Other languages
English (en)
Chinese (zh)
Inventor
郝志坚
朱钰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Publication of WO2018107727A1 publication Critical patent/WO2018107727A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Definitions

  • the present invention relates to control technologies in the field of communication technologies, and in particular, to an information processing method, apparatus, and terminal.
  • a plurality of avatar icons are created in advance for an application by using an instance identifier tag, that is, an application corresponds to a plurality of avatar icons in addition to a native icon, so that the user can implement different accounts by clicking different icons. Sign in to the app.
  • the problem in the prior art is that the application icon management is complicated and wastes user time. Moreover, when multiple application icons are simultaneously in the same user operating system interface, it is easy to cause the user to forget the account corresponding to each application icon. Pointing the wrong application icon, causing a misoperation, requires repeated operations, making the mobile terminal less intelligent.
  • the embodiment of the present invention is to provide an information processing method, device, and terminal, so as to reduce user misoperation, improve the intelligence of the terminal, and improve the user experience.
  • an embodiment of the present invention provides an information processing method, where the method includes: obtaining a first operation of a user with a native icon of a target application; and responding to the first operation, by using a pre-stored operation and identity information And mapping the first identity information corresponding to the first operation; and logging in the target application by using the first identity information.
  • the logging in the target application by using the first identity information includes: acquiring corresponding target application data according to the first identity information; The target application data runs the target application and logs in to the target application with the first identity information.
  • the obtaining, by the user, the first operation of the native icon of the target application includes: collecting user biometric information corresponding to the first operation in the process of obtaining the first operation; The user biometric information is matched with the pre-stored biometric information; correspondingly, the responding to the first operation, searching for the first operation corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information And the first identity information corresponding to the first operation is searched for by the mapping relationship between the pre-stored operation and the identity information.
  • the method before the logging in to the target application by using the first identity information, the method further includes: setting an access right of the first identity information to a restricted access permission, where The restricted access right is used to indicate that access to the at least part of the user data of the target application is prohibited after the first identity information is logged into the target application.
  • the method before the obtaining the first operation of the user's native icon of the target application, the method further comprises: obtaining a second operation of the native icon by the user, wherein the second operation Different from the first operation; determining whether the target application supports the multi-identity information login function; if supported, responding to the second operation, searching for the second identity information corresponding to the second operation by using the mapping relationship; Logging in to the target application with the second identity information.
  • an embodiment of the present invention provides an information processing apparatus, where the apparatus includes: a first obtaining unit, a first responding unit, and a first login unit; wherein the first obtaining unit is configured to obtain a user-targeted a first operation of the native icon of the application; the first response unit is configured to: in response to the first operation, search for a first identity corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information The first login unit is configured to log in to the target application with the first identity information.
  • the first login unit is further configured to: acquire corresponding target application data according to the first identity information; run the target application based on the target application data, and use the first An identity information is logged into the target application.
  • the first obtaining unit is further configured to: collect, during the obtaining the first operation, user biometric information corresponding to the first operation; and the biometric information of the user Pre-stored biometric information is matched; the first response unit is further configured to: if the matching, respond to the first operation, search for the first operation by using a mapping relationship between the pre-stored operation and the identity information First identity information.
  • the apparatus further includes: a second obtaining unit, a determining unit, a second responding unit, and a second login unit; wherein the second obtaining unit is configured to obtain a user to the native icon a second operation, wherein the second operation is different from the first operation; the determining unit is configured to determine whether the target application supports a multi-identity information login function; the second response unit is set to if Supporting, in response to the second operation, searching for the second identity information corresponding to the second operation by using the mapping relationship; the second login unit is configured to log in to the target application by using the second identity information.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a touchable display screen and a processor; wherein the touchable display screen is configured to obtain a first operation of a user's native icon of the target application;
  • the processor is configured to: in response to the first operation, search for first identity information corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information; and log in with the first identity information The target application.
  • a storage medium comprising a stored program, wherein the program is executed to perform the method of any of the above.
  • An embodiment of the present invention provides an information processing method, apparatus, and terminal. First, a first operation of a user's native icon for a target application is obtained, and then a first operation corresponding to a mapping relationship between the previously stored operation and the identity information is performed. The first identity information, and the first identity information is logged into the target application. Therefore, if the information processing method of the embodiment of the present invention is applied to the multi-identity information login application, the user may obtain the first identity information before logging in to the target application.
  • the second operation of the native icon is performed by the user, and the second identity information corresponding to the second operation is used to log in to the target application. In this way, the user can log in to the target application with different identity information through different operations on the native icon of the application. Therefore, the user can be effectively prevented from misoperation, the intelligence of the terminal is improved, and a good user experience is provided.
  • FIG. 1-1 is a schematic flowchart of an information processing method in Embodiment 1 of the present invention.
  • Embodiment 1 of the present invention is a schematic diagram of an application setting interface in Embodiment 1 of the present invention.
  • FIG. 1 are schematic diagrams of a login identity information selection interface in Embodiment 1 of the present invention.
  • Embodiment 2 is a schematic flowchart of an information processing method in Embodiment 2 of the present invention.
  • Embodiment 3 is a schematic flowchart of an information processing method in Embodiment 3 of the present invention.
  • Embodiment 4 is a schematic flowchart of an information processing method in Embodiment 4 of the present invention.
  • FIG. 5 is a schematic structural diagram of an information processing apparatus according to Embodiment 5 of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal in Embodiment 6 of the present invention.
  • the embodiment provides an information processing method, and the information processing method is applied to a terminal.
  • the terminal may be a smart phone, a tablet computer, or the like.
  • the function implemented by the information processing method can be implemented by a processor calling program code in the terminal.
  • the program code can be saved in a computer storage medium.
  • the terminal includes at least a processor and a storage medium.
  • the information processing method can be applied to applications where multiple applications can log in, such as logging in to the same application and switching between two accounts of the same application.
  • Figure 1-1 is a schematic flowchart of the information processing method in the first embodiment of the present invention. As shown in FIG. 1, the information processing method includes:
  • S101 Obtain a first operation of a user's native icon of the target application
  • the user when the user wants to log in to the target application, the user can perform the first operation on the native icon of the target application to achieve the purpose of logging in the target application.
  • the native icon of the target application may refer to an application icon originally generated when the target application is installed.
  • the target application may be a social application, or a shopping application, and may be other types of applications that can be logged in with multiple identity information.
  • the user may generate a first operation by using one or more combinations of clicking, touching, or sliding the native icon of the target application on the operating system interface, and the user may also use the application list and pull down.
  • the first operation of the native icon is performed in a place where the original icon of the target application can be operated, for example, and the first operation may be performed in other manners, and the embodiment of the present invention is not specifically limited.
  • the specific action of the first operation may be set by the user, or may be set by the system by default.
  • the specific action of the first operation may be a click, such as a click, a double click, or a triple click, or a press, such as a long press or a short press, or a sliding, dragging, etc., of course, It is a combination of the action, such as a long press and a slide, which is determined by a person skilled in the art in the specific implementation.
  • the embodiment of the present invention is not specifically limited.
  • the S101 further includes: collecting the biometric information of the user corresponding to the first operation in the process of obtaining the first operation; The biometric information is matched with the pre-stored biometric information.
  • the user can protect their privacy through secure authentication.
  • the user can set the security level when logging in to the application by using the application icon. Different security levels correspond to different processing. For example, when the security level is the highest, the security authentication fails to log in. If the security level is medium, the security authentication is performed. If you do not pass, log in with restricted access; if the security level is lowest, You can log in directly without security authentication.
  • the biometric information of the user is collected when the first operation is obtained, and the security authentication is performed by matching the biometric information of the user corresponding to the first operation with the biometric information stored in advance. If the user biometric information corresponding to the first operation matches the pre-stored biometric information, it indicates that the security authentication is passed, and S102 may be performed; if the biometric information corresponding to the first operation does not match the pre-stored biometric information, The security authentication is not passed. In this case, the access right of the first identity information may be set to the restricted access permission, so that the current login user is prohibited from accessing the protected private data after the first identity information is applied to the target application. Of course, when the security authentication fails, the processing may be directly ended, and S102 to S103 are not executed.
  • the foregoing information processing method may further include: obtaining a second operation of the user on the native icon, where the second operation is different from the first operation; determining whether the target application supports the multiple identity information login function; And responding to the second operation, searching for the second identity information corresponding to the second operation by using the mapping relationship between the operation and the identity information; and logging in the target application by using the second identity information.
  • the user may set the first operation to correspond to logging in the target application with the first identity information, and setting the second operation to correspond to logging in the target application with the second identity information. Therefore, in order to simultaneously log in the target application with the first identity information and the second identity information, or to switch the second identity information of the current login target application to log in with the first identity information, the second operation may be adopted first to the second identity. The information is logged into the target application, and then the first operation is used to log in to the target application with the first identity information. That is to say, before logging in to the target application with the first identity information, the target application may be logged in with the second identity information.
  • the specific action of the second operation may be set by the user, or may be set by the system by default.
  • the specific action of the second operation may be a click, such as a click, a double click, or a triple click, or a press, such as a long press or a short press, or a slide, drag, etc., of course, It is an action, such as a long press and a slide, which is determined by a person skilled in the art in a specific implementation.
  • the embodiment of the present invention is not specifically limited. However, it needs to be explained that the second operation The specific action is different from the first operation. For example, when the second operation is set to be long pressed, the first operation may be set as a click.
  • the first identity information is different from the second identity information.
  • the second identity information may be set as account B and password B.
  • the identity information corresponding to the first operation and the second operation is set by the user, and when the user does not want to log in the multiple identity information, the identity information corresponding to the first operation and the second operation may also be set. For consistency.
  • the target application may be determined first. Supporting the multi-identity information login function; if it is determined that the target application supports the multi-identity information login function, and then responding to the first operation or the second operation, searching for the identity information corresponding to the first operation or the second operation by the mapping relationship between the operation and the identity information .
  • the embodiment of the present invention is not specifically limited.
  • attribute information of all applications having multiple identity information login functions such as an application name, an application installation time, and the like, may be saved to a corresponding mapping table, such as an application white.
  • a mapping table such as an application white.
  • it when it is necessary to determine whether the target application supports multi-identity information, it only needs to obtain the attribute information of the target application first, and then finds whether the attribute information exists in the mapping table, and if so, indicates the target.
  • the application supports the multi-identity information login function. Otherwise, it indicates that the target application does not support the multi-identity information login function.
  • other methods may also be adopted, which are determined by those skilled in the art according to actual conditions in a specific implementation process.
  • S102 responsive to the first operation, searching for the first identity information corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information;
  • the first identity information corresponding to the first operation may be searched by the mapping relationship between the pre-stored operation and the identity information, so as to An identity message to log in to the target application.
  • the first identity information corresponding to the first operation may be preset by the user in the setting of the target application.
  • the user may be in the application setting interface as shown in FIG. 1-2.
  • the action 11 corresponding to the first operation is selected as "long press” 111, and the button "Account A and Password A" 122 is pressed at the login identity information 12, indicating that the identity information corresponding to the first operation is set to the account A and The password A, then, when the user long presses the original icon of the target application, the account A and the password A are obtained; the first identity information corresponding to the first operation may also be selected by the user in real time, for example, the user may In the application setting interface shown in FIG.
  • the action 11 corresponding to the first operation is set to "long press and slide” 112
  • the login identity information 12 is set to "display identity information list” 121
  • the interface shown in Figure 1-3 is displayed.
  • the user can select the identity information for login according to the need, for example, the user can press "Account B and Password B" 14 indicates that the account B and the password B are selected to log in to the application, or the new identity information can be directly added.
  • the user can press the "new identity information” 15 to add new identity information.
  • the embodiment of the present invention is not specifically limited.
  • the mapping relationship is generated according to the setting of the user in the target application, and the mapping relationship between each operation corresponding to the target application and the identity information is stored.
  • the setting in the target application is: long press to log in to the target application with account A and password A
  • the corresponding "long press” operation and its corresponding identity information "account A” are saved in the mapping relationship.
  • password A Therefore, after obtaining the “long press” operation of the original icon of the target application by the user, the mapping relationship may be queried, and if there is information of the corresponding operation, the identity information corresponding to the operation “account A and Password A”.
  • S103 Log in the target application by using the first identity information.
  • the target application can be logged in with the first identity information.
  • S103 may include: acquiring corresponding target application data according to the first identity information; running the target application based on the target application data, and logging the target with the first identity information application.
  • each identity information needs to correspond to a separate target application data capable of running the target application, and the target application data can independently run the target application and mutually Do not interfere. Therefore, in order to log in the target application with the first identity information, the target application data corresponding to the first identity information may be obtained according to the first identity information, and then the target application is run based on the target application data, and the first identity information is used. Log in to the target app.
  • the application data corresponding to the target application may be obtained according to the attribute information of the target application; and then each identity information corresponding to each application data is obtained, and respectively Matching each identity information with the first identity information. Finally, determining, according to the matching result, whether identity information matching the first identity information exists in each identity information; if yes, determining application data corresponding to the matched identity information Apply data to the target; otherwise, you can copy any of the application data to generate the target application data.
  • the attribute information of the target application may include: a name of the first application, a unique identifier, a download address, a category, a version, a detailed description, a thumbnail, a package name, a size, a developer, etc., of course, may also be other, this
  • a name of the first application a unique identifier
  • a download address a category
  • a version a version
  • a detailed description a thumbnail
  • a package name a size
  • a developer etc.
  • the technical solution provided by the embodiment of the present invention after obtaining the first operation of the original icon of the target application by the user, searches for the first operation corresponding to the mapping relationship between the pre-stored operation and the identity information.
  • the first identity information, and the first identity information is logged into the target application.
  • the information processing method provided by the embodiment of the present invention can obtain the second operation of the user's native icon on the target application, and after logging in the target application with the second identity information, the first operation is used to use the first identity.
  • Information login target application thus, by performing different operations on the same application icon, the application is logged in with different identity information.
  • the complexity of managing multiple icons of the same application is reduced, and on the other hand, the original login identity information can be directly used without leaving the original login identity information.
  • Log in to the app with an identity message you can quickly switch between different accounts and reduce The complexity of switching different identity information login applications. Further, the operation complexity is reduced, the intelligence of the terminal is improved, and a good user experience can be provided for the user.
  • the present embodiment provides an information processing method, which is applied to the following scenario, and assumes that the user sets the native icon of the click target application to correspond to the target application by using the identity information A, and sets the primary application of the double-click target application.
  • the icon corresponds to the display identity information list, so that the user selects the identity information B that needs to be logged in or creates a new identity information B that needs to be logged in.
  • FIG. 2 is a schematic flowchart of an information processing method in Embodiment 2 of the present invention. Referring to FIG. 2, the method includes:
  • S202 responsive to the click operation, searching for the identity information A corresponding to the click operation by the mapping relationship between the pre-stored operation and the identity information;
  • S203 Obtain target application data corresponding to the identity information A.
  • S209 Log in to the target application by using the identity information B.
  • the application can be logged in with different identity information by performing different operations on the same application icon.
  • the target application is simultaneously registered with the identity information B, or after the target application is logged in with the identity information A, the application is switched to the target application by using the identity information B. It reduces the complexity of the operation, improves the intelligence of the terminal, and provides a good user experience for the user.
  • FIG. 3 is a schematic flowchart of an information processing method according to Embodiment 3 of the present invention.
  • the information processing method includes:
  • S301 Obtain a first operation of a user's native icon of the target application
  • S302 collect user biometric information corresponding to the first operation in the process of obtaining the first operation
  • the biometric information of the user corresponding to the first operation may be the fingerprint information of the user.
  • the terminal that can collect the fingerprint in the full screen may directly use the touch in the process of using the finger to operate the native icon of the target application.
  • the screen collects fingerprint information of the user; for a terminal that can collect fingerprints without a full screen, after the user uses the finger to operate the original icon of the target application, when the user raises the finger, the user uses a special fingerprint collection module to collect the user. Fingerprint information.
  • the user biometric information corresponding to the first operation may also be biometrics of other users, such as voice information, as long as the biometrics acquisition module can be acquired after obtaining the user's first operation on the native icon of the target application.
  • the embodiment of the present invention is not specifically limited.
  • the biometric information of the user may be collected through the photoelectric conversion module on the terminal, or the biometric information of the user may be collected through the silicon crystal sensor on the terminal.
  • the user's biological activity may be collected by other means.
  • the feature information is not specifically limited in the embodiment of the present invention.
  • the biometric information may be fingerprint information or sound information, which is not specifically limited in the embodiment of the present invention; in actual applications, the fingerprint information of the user may be collected by the optical sensor/capacitance sensor/temperature sensor/super sensor.
  • Information preprocessing and feature extraction The main steps of the method include: pattern calculation, image filtering, binarization, refinement, feature extraction and post-processing.
  • S303 Determine whether the user biometric information matches the pre-stored biometric information, if yes, perform S304 to S306; if not, perform S307 to S310.
  • whether the user biometric information matches the pre-stored biometric information can be determined by calculating the similarity between the user biometric information and the pre-stored biometric information.
  • a commonly used method for calculating the similarity such as a histogram matching, a mathematical matrix decomposition, and an image similarity calculation based on a feature point, may be used, and the embodiment of the present invention is not specifically limited.
  • S304 responsive to the first operation, searching for the first identity information corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information;
  • S305 Acquire corresponding target application data according to the first identity information.
  • S306 Run the target application based on the target application data, and log in the target application by using the first identity information;
  • S307 responsive to the first operation, searching for the first identity information corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information;
  • S308 Acquire corresponding target application data according to the first identity information.
  • the restricted access right is used to indicate that at least a part of the user data of the target application is prohibited from being accessed after the first identity information is logged into the target application. That is to say, the restricted access right is used to prohibit the currently operated user from accessing the private data set by the original user, thereby realizing protection of user privacy.
  • a mapping relationship between the access authority and the first identity information may be established.
  • the corresponding permission may be invoked to determine which data can be displayed and which data. Can not be displayed.
  • S310 Run the target application based on the target application data, and log in the target application by using the first identity information.
  • the multi-identity information login application or the security management when switching the identity information login can be implemented, and the user privacy data is protected.
  • the present embodiment provides an information processing method, which is applied to the following scenario, and assumes that the user's operation on the native icon of the target application is a touch operation, then the touch duration of the native icon may be determined according to the touch duration of the native icon.
  • Which identity information runs the target application. The user sets the short icon of the target application to correspond to the login to the target application with the identity information A, and sets the native icon of the long-pressed target application to correspond to the target application by the identity information B.
  • the information processing method includes:
  • S402 Determine whether the touch duration of the touch operation is less than a preset duration threshold
  • S403 Generate a first operation, and collect current biometric information of the user.
  • S404 Determine whether the current biometric information of the user matches the pre-stored biometric information
  • S407 Determine whether the number of mismatches is greater than a preset matching threshold.
  • the display screen of the terminal is locked in a preset time according to the prior art.
  • the embodiments of the present invention are not described in detail.
  • S409 Collect current biometric information of the user
  • S404 is continued until S408 or S405 is executed.
  • the embodiment provides an information processing apparatus.
  • 5 is a schematic structural diagram of an information processing apparatus according to Embodiment 5 of the present invention.
  • the information processing apparatus 50 includes: a first obtaining unit 501, a first response unit 502, and a first login unit 503, where
  • the first obtaining unit 501 is configured to obtain a first operation of the user to the native icon of the target application;
  • the first response unit 502 is configured to, in response to the first operation, search for the mapping relationship between the pre-stored operation and the identity information.
  • the first identity information corresponding to the operation is performed;
  • the first login unit 503 is configured to log in the target application with the first identity information.
  • the first login unit is further configured to: acquire the corresponding target application data according to the first identity information; run the target application based on the target application data, and log in the target application by using the first identity information.
  • the first obtaining unit is further configured to: collect user biometric information corresponding to the first operation during the obtaining the first operation; and match the user biometric information with the pre-stored biometric information; the first response Unit, also set to match, if it matches, then In response to the first operation, the first identity information corresponding to the first operation is searched by a mapping relationship between the pre-stored operation and the identity information.
  • the information processing apparatus further includes: a rights management unit, configured to set an access right of the first identity information to a restricted access right, where the restricted access right is used in After the first identity information is registered in the target application, access to at least a portion of the user data in the data of the target application is prohibited.
  • a rights management unit configured to set an access right of the first identity information to a restricted access right, where the restricted access right is used in After the first identity information is registered in the target application, access to at least a portion of the user data in the data of the target application is prohibited.
  • the information processing apparatus further includes: a second obtaining unit, a determining unit, a second responding unit, and a second login unit, wherein the second obtaining unit is configured to obtain a second operation of the user on the native icon, where The second operation is different from the first operation; the determining unit is configured to determine whether the target application supports the multi-identity information login function; the second response unit is configured to, if supported, respond to the second operation, and search for the second operation by using the mapping relationship
  • the second identity information is configured to log in to the target application with the second identity information.
  • the first obtaining unit, the first response unit, the first login unit, the rights management unit, the second obtaining unit, the determining unit, the second responding unit, and the second login unit may each be configured by a central processing unit (CPU, Central Processing Unit), Microprocessor Unit (MPU), Digital Signal Processor (DSP), or Field Programmable Gate Array (FPGA).
  • CPU Central Processing Unit
  • MPU Microprocessor Unit
  • DSP Digital Signal Processor
  • FPGA Field Programmable Gate Array
  • FIG. 6 is a schematic structural diagram of a terminal according to Embodiment 6 of the present invention.
  • the terminal 60 includes: a touchable display screen 601 and a processor 602.
  • the touchable display screen 601 is configured to obtain a user-targeted a first operation of the native icon of the application; the processor 602, configured to respond to the first operation by The mapping between the stored operation and the identity information, searching for the first identity information corresponding to the first operation; and logging in the target application by using the first identity information.
  • the processor is further configured to: acquire the corresponding target application data according to the first identity information; run the target application based on the target application data, and log in the target application by using the first identity information.
  • the touch screen is further configured to collect user biometric information corresponding to the first operation during the obtaining of the first operation
  • the processor is further configured to set the user biometric information and the pre-stored biometric information. Perform matching; if yes, in response to the first operation, find the first identity information corresponding to the first operation by using a mapping relationship between the pre-stored operation and the identity information.
  • the processor is further configured to set the access right of the first identity information to the restricted access right, where the restricted access right is used to indicate that the access to the target application is prohibited after the first identity information is logged into the target application. At least a portion of user data.
  • the touch screen is further configured to obtain a second operation of the user on the native icon, wherein the second operation is different from the first operation; the processor is further configured to determine whether the target application supports the multi-identity information login function; If yes, in response to the second operation, the second identity information corresponding to the second operation is searched by the mapping relationship; and the target application is logged in the second identity information.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • an information processing method, apparatus, and terminal provided by an embodiment of the present invention have the following beneficial effects: a user can log in to a target application with different identity information by different operations on the native icon of the application. Therefore, the user can be effectively prevented from misoperation, the intelligence of the terminal is improved, and a good user experience is provided.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne un procédé et un dispositif de traitement d'informations, et un terminal. Le procédé consiste : à obtenir une première opération effectuée par un utilisateur sur l'icône native d'une application cible (S101) ; en réponse à la première opération, à rechercher, au moyen d'une relation de mappage entre des opérations préalablement mémorisées et des informations d'identité, des premières informations d'identité correspondant à la première opération (S102) ; et à se connecter à l'application cible à l'aide des premières informations d'identité (S103). Au moyen du procédé, il est possible de se connecter à l'application cible à l'aide d'informations d'identité différentes en effectuant diverses opérations sur l'icône native, ce qui permet de résoudre un problème de mauvaise opération d'utilisateur et d'augmenter l'intelligence du terminal.
PCT/CN2017/091712 2016-12-13 2017-07-04 Procédé et dispositif de traitement d'informations, et terminal Ceased WO2018107727A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611159088.7 2016-12-13
CN201611159088.7A CN108460259B (zh) 2016-12-13 2016-12-13 一种信息处理方法、装置及终端

Publications (1)

Publication Number Publication Date
WO2018107727A1 true WO2018107727A1 (fr) 2018-06-21

Family

ID=62558183

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/091712 Ceased WO2018107727A1 (fr) 2016-12-13 2017-07-04 Procédé et dispositif de traitement d'informations, et terminal

Country Status (2)

Country Link
CN (1) CN108460259B (fr)
WO (1) WO2018107727A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924258A (zh) * 2018-08-14 2018-11-30 深圳壹账通智能科技有限公司 后台信息推送方法、装置、计算机设备和存储介质
CN112165493A (zh) * 2020-09-30 2021-01-01 惠州市善居电子商务有限公司 身份登录切换方法、装置、计算机设备和存储介质
CN112783579A (zh) * 2021-01-05 2021-05-11 北京小米松果电子有限公司 应用程序控制方法、装置及存储介质
CN113240500A (zh) * 2021-06-11 2021-08-10 维沃移动通信有限公司 信息显示方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111427709B (zh) * 2020-03-30 2023-07-21 努比亚技术有限公司 一种应用程序分身控制方法、设备及计算机可读存储介质
CN111459358B (zh) * 2020-03-31 2021-08-17 维沃移动通信有限公司 一种应用程序控制方法及电子设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425914A (zh) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法及通信终端
CN103576847A (zh) * 2012-08-09 2014-02-12 腾讯科技(深圳)有限公司 获取账号信息的方法和装置
CN104363205A (zh) * 2014-10-17 2015-02-18 小米科技有限责任公司 应用登录方法和装置
CN105094898A (zh) * 2015-07-08 2015-11-25 广东欧珀移动通信有限公司 一种应用程序账号切换的方法及终端

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050269402A1 (en) * 2004-06-03 2005-12-08 Tyfone, Inc. System and method for securing financial transactions
CN102368750A (zh) * 2011-09-30 2012-03-07 上海量明科技发展有限公司 一种多账号登录的界面显示方法及系统
US20130312073A1 (en) * 2012-05-16 2013-11-21 Rajdeep Srivastav Methods and systems for authentication of multiple sign-in accounts
CN104125063B (zh) * 2013-04-28 2016-10-12 腾讯科技(深圳)有限公司 授权认证方法、设备及系统
CN104394133B (zh) * 2014-11-14 2017-12-22 百度在线网络技术(北京)有限公司 登录方法和登录系统
CN106034134B (zh) * 2015-03-19 2019-12-20 腾讯科技(深圳)有限公司 网页应用程序中进行身份认证请求的方法、辅助方法及装置
CN106161392B (zh) * 2015-04-17 2019-08-23 深圳市腾讯计算机系统有限公司 一种身份验证方法和设备
CN104866752B (zh) * 2015-05-12 2018-09-04 广东欧珀移动通信有限公司 一种应用保护方法及用户终端
CN105117209B (zh) * 2015-07-27 2019-02-12 小米科技有限责任公司 应用交互方法和装置
CN105760045A (zh) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法、应用程序的登录装置和终端
CN105871841A (zh) * 2016-03-31 2016-08-17 乐视控股(北京)有限公司 登录目标设备、生成登录信息的方法及装置
CN106201748A (zh) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 一种基于移动终端的消息处理的方法、装置及移动终端
CN106203143A (zh) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 一种应用程序锁定的方法、装置及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425914A (zh) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法及通信终端
CN103576847A (zh) * 2012-08-09 2014-02-12 腾讯科技(深圳)有限公司 获取账号信息的方法和装置
CN104363205A (zh) * 2014-10-17 2015-02-18 小米科技有限责任公司 应用登录方法和装置
CN105094898A (zh) * 2015-07-08 2015-11-25 广东欧珀移动通信有限公司 一种应用程序账号切换的方法及终端

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924258A (zh) * 2018-08-14 2018-11-30 深圳壹账通智能科技有限公司 后台信息推送方法、装置、计算机设备和存储介质
CN108924258B (zh) * 2018-08-14 2022-07-08 深圳壹账通智能科技有限公司 后台信息推送方法、装置、计算机设备和存储介质
CN112165493A (zh) * 2020-09-30 2021-01-01 惠州市善居电子商务有限公司 身份登录切换方法、装置、计算机设备和存储介质
CN112165493B (zh) * 2020-09-30 2023-02-21 惠州市善居电子商务有限公司 身份登录切换方法、装置、计算机设备和存储介质
CN112783579A (zh) * 2021-01-05 2021-05-11 北京小米松果电子有限公司 应用程序控制方法、装置及存储介质
CN113240500A (zh) * 2021-06-11 2021-08-10 维沃移动通信有限公司 信息显示方法及装置

Also Published As

Publication number Publication date
CN108460259A (zh) 2018-08-28
CN108460259B (zh) 2022-12-02

Similar Documents

Publication Publication Date Title
WO2018107727A1 (fr) Procédé et dispositif de traitement d'informations, et terminal
CN106055996B (zh) 一种多媒体信息分享方法及移动终端
EP2904537B1 (fr) Identification sécurisée de dispositif informatique et procédés d'identification sécurisée
US9606643B2 (en) Extended above the lock-screen experience
KR20190085543A (ko) 보안 질문들을 생성하고 아이덴티티들을 검증하기 위한 방법 및 장치
US20140250105A1 (en) Reliable content recommendations
CN106648384B (zh) 一种服务调用方法及装置
WO2017020386A1 (fr) Procédé et appareil de vérification d'empreinte digitale
US9455985B2 (en) Method for secure key injection with biometric sensors
CN104182668A (zh) 基于屏幕解锁的身份识别方法
KR102108695B1 (ko) 신원 인증을 위한 방법 및 디바이스
CN104809174A (zh) 一种终端应用的打开方法
CN107704759A (zh) 敏感操作的控制方法、装置、存储介质及电子设备
WO2017088745A1 (fr) Procédé et appareil de traitement d'informations, et dispositif électronique
CN104808899A (zh) 一种终端
WO2017016115A1 (fr) Procédé et dispositif de contrôle d'accès
Vecchiato et al. The perils of Android security configuration
CN107808086A (zh) 一种智能终端的解锁方法、装置及设备
CN111651749A (zh) 基于密码找回账号的方法、装置、计算机设备及存储介质
CN106778344A (zh) 一种数据权限控制方法及终端
CN111597564B (zh) 数据访问和权限配置方法、装置、终端及存储介质
CN105450610B (zh) 终端之间快速建立可信任的连接的方法及其系统
WO2017197976A1 (fr) Procédé pour cacher ou afficher un programme d'application, et dispositif terminal
CN106202466A (zh) 一种生物特征信息的处理方法、装置及移动终端
CN109618342A (zh) 一种用于确定用户的操作权限信息的方法与设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17881527

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17881527

Country of ref document: EP

Kind code of ref document: A1