CN104346161A - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN104346161A
CN104346161A CN201310347594.9A CN201310347594A CN104346161A CN 104346161 A CN104346161 A CN 104346161A CN 201310347594 A CN201310347594 A CN 201310347594A CN 104346161 A CN104346161 A CN 104346161A
Authority
CN
China
Prior art keywords
electronic equipment
client application
token
information
sign information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310347594.9A
Other languages
Chinese (zh)
Other versions
CN104346161B (en
Inventor
董强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201310347594.9A priority Critical patent/CN104346161B/en
Publication of CN104346161A publication Critical patent/CN104346161A/en
Application granted granted Critical
Publication of CN104346161B publication Critical patent/CN104346161B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses an information processing method and electronic equipment. The method comprises the following steps: receiving a login trigger signal; based on the login trigger signal, generating a first token corresponding to a client application, and acquiring first physical sign information; sending the first token and the first physical sign information to second electronic equipment; receiving a successful matching signal returned by the second electronic equipment, wherein the successful matching signal is the signal sent by the second electronic equipment after the situation that the first token is successfully matched with the first physical sign information is determined on the basis of the corresponding relationship of prestored physical sign information and the token; based on the successful matching signal, logging in the client application. The method and the electronic equipment, provided by the application, are used for solving the technical problem of unsafety that entry codes are easy to steal in a login scheme in the prior art. The technical effect of improving login safety when a user logs in third party application software on the electronic equipment is realized.

Description

A kind of method of information processing and electronic equipment
Technical field
The present invention relates to electronic technology field, particularly relate to a kind of method and electronic equipment of information processing.
Background technology
Along with the develop rapidly of electronic technology, the electronic product of the life of people and network and various Various Functions links together all the more closely, simultaneously, various network application that is abundant and that be convenient for people to live also emerges in an endless stream, similar microblogging application, chat application, shopping application, the third party software application such as mailbox application have become a lot of people and have lain fallow every day, make friends, the requisite instrument of shopping, and after logging in the application of these third party softwares, the photograph of user can be obtained, good friend, personal information, even some bank informations, therefore the security logged in, become the significant consideration of user's selective gist software, also have influence on greatly third party software application institute obtains and by acquisition the market share.
At present, in order to ensure the security that user logs in, third party software application roughly has two kinds to log in protection scheme: one is that account password logs in, and this is login scheme the most frequently used at present, and user carries out login protection in software login interface input account and password; Two is that mobile phone identifying code logs in, and is used for shopping class software application, and user, at login interface, selects identifying code to send the phone number causing acquiescence, then is logged in by the identifying code that mobile phone receives input login interface.
But present inventor is in the process realizing invention technical scheme in the embodiment of the present application, find that above-mentioned technology at least exists following technical matters:
For the scheme that account password logs in, because various Trojan for stealing numbers is rampant, input password and account exist by the risk of steal-number on an electronic device, and user needs memory cipher and account, also need the login being realized third party software application by the account register of complexity, complicated operation.
For the scheme that mobile phone identifying code logs in; there is the hand-set from stolen risk causing other people to log in; and although user is without memory cipher, when login electronic equipment is this mobile phone, need to exit software login interface; enter note read interface; under login electronic equipment is not this mobile phone situation, also need the roundtrip operation carrying out distinct electronic apparatuses, operating process is very complicated; but also the situation that note is incured loss through delay or mobile phone is shut down can be there is, consuming time very long.
That is, the login scheme of prior art all exists easily by unsafe technical matters of steal-number.
In addition, also there is the technical matters of complicated operation and length consuming time in the login scheme of prior art.
Summary of the invention
The embodiment of the present application is by providing a kind of method and electronic equipment of information processing, and what solve that login scheme in prior art exists is easy in unsafe technical matters of steal-number.Achieve and improve the technique effect that user logs in the login security of third-party application software on an electronic device.
On the one hand, the embodiment of the present application provides following technical scheme:
A method for information processing, the method is applied in the first electronic equipment, and described first electronic equipment is connected with the second electronic equipment, comprising:
Receive one for logging in the login trigger pip of client application;
Based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Send described first token and described first sign information causes described second electronic equipment;
Receive described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Based on described the match is successful signal, log in described client application.
Optionally, described first token specifically comprises: one or more the combination in the name information of described client application, address information, access authority information and access time information.
Optionally, described first sign information is any one in fingerprint, iris, face, palmmprint or sound.
Optionally, based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application, specifically comprise: based on described login trigger pip, generate first token corresponding with described client application; Show a sign collection prompting, wherein, described sign collection prompting for guiding described user to carry out the first operation, the described first operation of appointment body part near the collection position of specifying being operating as described user; Responding described first operation that described user carries out based on described sign collection prompting, gathering first sign information of the described user for logging in described client application.
On the other hand, the embodiment of the present application additionally provides a kind of electronic equipment, is specially the first electronic equipment, is connected with the second electronic equipment, and described electronic equipment comprises:
First receiver module, for receiving one for logging in the login trigger pip of client application;
Processing module, for based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Sending module, for sending described first token and described first sign information causes described second electronic equipment;
Second receiver module, for receiving described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Login module, for based on described the match is successful signal, logs in described client application.
Optionally, described processing module also for, based on described login trigger pip, generate corresponding with described client application, comprise the first token of one or more the combination in the name information of described client application, address information, access authority information and access time information.
Optionally, described processing module also for, gather in the fingerprint of the user for logging in described client application, iris, face, palmmprint or sound any one.
Optionally, described processing module comprises: token generation unit, for based on described login trigger pip, generates first token corresponding with described client application; Display unit, for showing a sign collection prompting, wherein, described sign collection prompting for guiding described user to carry out the first operation, the described first operation of appointment body part near the collection position of specifying being operating as described user; Collecting unit, for responding described first operation that described user carries out based on described sign collection prompting, gathers first sign information of the described user for logging in described client application.
The one or more technical schemes provided in the embodiment of the present application, at least have following technique effect or advantage:
1, the method that provides of the embodiment of the present application and electronic equipment, use the first sign information to log in, avoid the risk of steal-number, and take the coupling of carrying out the first sign information and the first token on the second electronic equipment, because the second electronic equipment is not direct and Client application end connects, client can not access the corresponding relation of sign information and the token that acquisition second electronic equipment stores, avoid the leakage of sign information, what solve that third party software login scheme in prior art exists is easy in unsafe technical matters of steal-number.Achieve user's safety and log in the technique effect of third-party application software easily on an electronic device.
2, the method that provides of the embodiment of the present application and electronic equipment, use the first sign information to log in, user is only with according to prompting input first sign information, login can be completed, user need not remember account and password, also need not carry out complicated register, also not need to wait for message reply, solve the technical matters that login scheme of the prior art also exists complicated operation and length consuming time.Achieve the technique effect that user can easily log in third-party application software on the basis of safety.
3, the method that provides of the embodiment of the present application and electronic equipment; any one in use fingerprint, iris, face, palmmprint or sound is used as the first sign information; because fingerprint, iris, face, palmmprint or sound have uniquely and the feature of not transreplication; add the security logged in synchronous operation, the privacy of user can better be protected.
4, the method that provides of the embodiment of the present application and electronic equipment, based on described login trigger pip, showing a sign collection prompting instructs user to specify body part near the collection position of specifying, to guarantee the collection completing the sign information such as fingerprint, iris, face, palmmprint or sound easily and fast, avoid invalidated acquisitions.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the method for information processing in the embodiment of the present invention;
Fig. 2 is the structural drawing of electronic equipment in the embodiment of the present invention.
Embodiment
The embodiment of the present application is by providing a kind of method and electronic equipment of information processing, and what solve that login scheme in prior art exists is easy in unsafe technical matters of steal-number.Achieve and improve the technique effect that user logs in the login security of third-party application software on an electronic device.
For solving unsafe technical matters that above-mentioned existing login scheme exists, the general thought of the technical scheme that the embodiment of the present application provides is as follows:
A method for information processing, the method is applied in the first electronic equipment, and described first electronic equipment is connected with the second electronic equipment, comprising:
Receive one for logging in the login trigger pip of client application;
Based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Send described first token and described first sign information causes described second electronic equipment;
Receive described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Based on described the match is successful signal, log in described client application.
Can be found out by foregoing, use the first sign information to log in, avoid the risk of steal-number, and take the coupling of carrying out the first sign information and the first token on the second electronic equipment, because the second electronic equipment is not direct and Client application end connects, client can not access the corresponding relation of sign information and the token that acquisition second electronic equipment stores, avoid the leakage of sign information, what solve that third party software login scheme in prior art exists is easy in unsafe technical matters of steal-number.Achieve user's safety and log in the technique effect of third-party application software easily on an electronic device.
In order to better understand technique scheme, below in conjunction with Figure of description and concrete embodiment, technique scheme is described in detail.
Embodiment one:
A kind of method of information processing is provided in embodiment one, the method is applied in the first electronic equipment, described first electronic equipment is connected with the second electronic equipment, in actual applications, described first electronic equipment can be the electronic equipments such as smart mobile phone, panel computer, notebook, described second electronic equipment also can be the electronic equipments such as smart mobile phone, panel computer, notebook, described second electronic equipment can also be common server or cloud server, will not enumerate in the present embodiment.
Please refer to Fig. 1, Fig. 1 is the main flow figure of the method for information processing in the embodiment of the present application one, and the method comprises the following steps:
Step S101, receives one for logging in the login trigger pip of client application;
Step S102, based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Step S103, sends described first token and described first sign information causes described second electronic equipment;
Step S104, receive described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Step S105, based on described the match is successful signal, logs in described client application.
Below the principle that realizes of above steps is described in detail:
In specific implementation process, step S101, namely receiving one for logging in the login trigger pip of client application can be: user carries out selection operation by modes such as button, touch screen or mouse clicks to the icon of the client application on the first electronic equipment, making described first electronic equipment receive login trigger pip for logging in client application, opening login interface.
In the embodiment of the present application, after step slol, can also based on described login trigger pip, judge whether to receive the first authorization message that described client application sends based on described login trigger pip, obtain the first judged result, wherein said first authorization message is that described client application is in advance from the authorization message that described second electronic equipment obtains.
In specific implementation process, when described first electronic equipment receives a login trigger pip, described login trigger pip can be sent to described client application, if described client application has the first authorization message, then can respond login trigger pip, described first authorization message be sent and causes the first electronic equipment; If described client application does not have the first authorization message, then can respond login trigger pip, enter the common login interface of its acquiescence, the inputting interface of such as account password.
Client application is obtained to the mode of described first authorization message, for the second electronic equipment for cloud server is described: client application sends the authorization requests of acquisition request first authorization message in advance to the provider of cloud server, wherein, one or more the combination in the information such as address, title, code, extent of competence, authority time limit of described client application is carried in described authorization requests; Cloud server carries out certification according to the information of carrying in authorization requests to described client application, if certification is passed through, then issues the first authorization message to described client application.
Below with when the second electronic equipment is for cloud server, smart mobile phone logs in microblogging and is applied as example, the first authorization message judging whether to receive described client application and send based on described login trigger pip is described, obtains the implementation procedure of the first judged result:
First, microblogging client sends authorization requests to the provider of cloud server, incidentally sends the characteristic information of microblogging client simultaneously, and the provider for cloud server determines that whether giving it authorizes; After cloud server determines to give mandate, the first authorization message of similar for transmission one client identification is caused described microblogging client.
Secondly, when user needs to log in this microblogging client on smart mobile phone, on smart mobile phone, touch screen clicks the icon of microblogging client, a login trigger pip is received to make smart mobile phone, this login trigger pip is sent to microblogging client by smart mobile phone, trigger pip is logged in described in microblogging client end response, the first authorization message previously obtained is sent to described smart mobile phone, smart mobile phone judges whether the first authorization message receiving the transmission of described microblogging client, obtains the first judged result.
Specifically, only when judging that described client application has the first authorization message that described second electronic equipment authorizes, just gather the first sign information to log in, ensure that the security of the sign information be pre-stored in the second electronic equipment and user input the security of sign information, avoid the leakage of user's sign information.
In specific implementation process, can also after step slol, judge whether to receive the instruction that a use sign information logs in, obtain the first judged result.
Specifically, fingerprint for described sign information, can be after the login trigger pip received for logging in client application when the first electronic equipment, open login interface, described log-in interface there are " account password logs in " and " fingerprint logs in " two kinds of options, user have selected " fingerprint log in option after ", the instruction that the first electronic equipment will receive a use fingerprint and logs in, and obtains the first judged result.
Passing through step S101, after receiving a login trigger pip, or after step S101, determine that described first judged result is for after being, enter step S102, namely based on described login trigger pip, generating the first token corresponding with described client application, gathering first sign information of the user for logging in described client application.
In the embodiment of the present application step S102, described first token specifically comprises: one or more the combination in the name information of described client application, address information, access authority information and access time information.
In specific implementation process, described first token can generate based on the information of the client application prestored or log in trigger pip institute feedack based on client application response and generate.Be applied as example to log in mailbox with fingerprint on notebook computer below, the generation method of above-mentioned two kind of first token be described:
A, to generate based on the information of the client application prestored, that is, notebook computer is previously stored with the information needing the client application using fingerprint to log in, when user needs to log in mailbox application, then notebook computer can generate the first token based on the information of the mailbox application in the client application information prestored.
B, log in trigger pip institute feedack based on client application response and generate, that is, when user double-clicks the link of mailbox application on notebook computer, not only notebook computer receives a login trigger pip, mailbox client also receives a login trigger pip, mailbox application end can respond this login trigger pip, and unique characteristics information is sent to notebook computer, and notebook computer can generate the first token based on the characteristic information of the mailbox application received.
In the embodiment of the present application step S102, described first sign information can be any one in fingerprint, iris, face, palmmprint or sound.
In specific implementation process, the mode gathering sign information comprises multiple, below enumerates several mode the most conventional:
Described fingerprint can be gathered by Fingerprint Identification Unit or camera; Described iris is gathered by iris recognition device or camera; Described face is gathered by recognition of face device or camera; Gather described palmmprint by personal recognition device or camera or gather described sound by sound collector.
In embodiments of the present invention; any one can selecting in fingerprint, iris, face, palmmprint or sound is used as the first sign information; because it has uniquely and the feature of not transreplication, add the security logged in synchronous operation, the privacy of user can better be protected.
In the embodiment of the present application, step S102, namely based on described login trigger pip, generate first token corresponding with described client application, gather first sign information of the user for logging in described client application, specifically comprise: based on described login trigger pip, generate first token corresponding with described client application; Show a sign collection prompting, wherein, described sign collection prompting for guiding described user to carry out the first operation, the described first operation of appointment body part near the collection position of specifying being operating as described user; Responding described first operation that described user carries out based on described sign collection prompting, gathering first sign information of the described user for logging in described client application.
Based on described login trigger pip, show a sign collection prompting and instruct user by specifying body part near the collection position of specifying, can ensure to complete fingerprint collecting easily and fast, avoid invalidated acquisitions.
Generated the first token by step S102 and after gathering the first sign information, enter step S103, S104 and S105:
Send described first token and described first sign information causes described second electronic equipment;
Receive described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Based on described the match is successful signal, log in described client application.
Embodiment two:
A kind of electronic equipment is provided in embodiment two, be specially the first electronic equipment, be connected with the second electronic equipment, in actual applications, described first electronic equipment can be the electronic equipments such as smart mobile phone, panel computer, notebook, described second electronic equipment can be also the electronic equipments such as smart mobile phone, panel computer, notebook, and described second electronic equipment can also be common server or cloud server, will not enumerate in the present embodiment.
Please refer to Fig. 2, Fig. 2 is the structural drawing of electronic equipment in the embodiment of the present application, and described electronic equipment comprises:
First receiver module 201, for receiving one for logging in the login trigger pip of client application;
Processing module 202, for based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Sending module 203, for sending described first token and described first sign information causes described second electronic equipment;
Second receiver module 204, for receiving described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Login module 205, for based on described the match is successful signal, logs in described client application.
In the embodiment of the present application, described processing module 202 also for, based on described login trigger pip, generate corresponding with described client application, comprise the first token of one or more the combination in the name information of described client application, address information, access authority information and access time information.
In the embodiment of the present application, described processing module 202 also for, gather in the fingerprint of the user for logging in described client application, iris, face, palmmprint or sound any one.
In the embodiment of the present application, described processing module 202 comprises: token generation unit, for based on described login trigger pip, generates first token corresponding with described client application; Display unit, for showing a sign collection prompting, wherein, described sign collection prompting for guiding described user to carry out the first operation, the described first operation of appointment body part near the collection position of specifying being operating as described user; Collecting unit, for responding described first operation that described user carries out based on described sign collection prompting, gathers first sign information of the described user for logging in described client application.
The method of the information processing in the electronic equipment provided in the present embodiment and embodiment one, based on the aspect of two under same inventive concept, detailed description is done to the implementation process of method above, so those skilled in the art can according to the structure of the electronic equipment in aforementioned understanding the present embodiment be described clearly and implementation process, succinct in order to instructions, has just repeated no more at this.
In order to more clearly allow the application person of ordinary skill in the field understand technical scheme in the embodiment of the present application, below, station there is is man-machine interaction angle, and by example, the method implementation process in the embodiment of the present application is introduced:
Suppose that user Wang Lan has smart mobile phone, when Wang Lan needs to log in microblogging application on this smart mobile phone, will following operation be carried out:
First, open this smart mobile phone, and on smart mobile phone screen, carry out the icon that swiping applies to find described microblogging.
Then, click this microblogging application icon, by the click to microblogging application icon, make this smart mobile phone receive a login trigger pip, the client also making this microblogging apply receives a login trigger pip.
Now, if the first authorization message that described microblogging client has cloud server to authorize, described microblogging client can respond described login trigger pip, and the first authorization message is sent to this smart mobile phone.After this smart mobile phone judges to receive the first authorization message, the first token can be generated based on described first authorization message, and on screen, eject a fingerprint collecting prompt window, described fingerprint collecting prompt window there is text prompt: " please inputting fingerprint at blue region ", and graphical cues: the blue region of a circle.
Next, the finger that Wang Lan is preset, such as right hand forefinger is placed into the circular blue region on smart mobile phone screen, collects the fingerprint of Wang Lan right hand forefinger to make this smart mobile phone by its fingerprint capturer.When gathering successfully, the sound collection that smart mobile phone can send " serge " is successfully pointed out, and closes described fingerprint collecting prompt window.
First token information of the fingerprint collected and generation is sent to cloud server by smart mobile phone, cloud server can based on the corresponding relation of the sign information prestored and token, judge whether Wang Lan index fingerprint is the fingerprint for logging in the application of described microblogging prestored, if, then cloud server can send one the match is successful that signal causes described smart mobile phone, smart mobile phone receives this match is successful after signal can microblogging application described in Successful login, and the interface display after the application of this microblogging being logged in is on screen.
If the first authorization message that described microblogging client does not have cloud server to authorize, after this smart mobile phone judges not receive the first authorization message, can show the inputting interface of an account and password on screen, Wang Lan can log in the application of described microblogging by the mode inputting default volume account and password.
Technical scheme in above-mentioned the embodiment of the present application, at least has following technique effect or advantage:
1, the method that provides of the embodiment of the present application and electronic equipment, use the first sign information to log in, avoid the risk of steal-number, and take the coupling of carrying out the first sign information and the first token on the second electronic equipment, because the second electronic equipment is not direct and Client application end connects, client can not access the corresponding relation of sign information and the token that acquisition second electronic equipment stores, avoid the leakage of sign information, what solve that third party software login scheme in prior art exists is easy in unsafe technical matters of steal-number.Achieve user's safety and log in the technique effect of third-party application software easily on an electronic device.
2, the method that provides of the embodiment of the present application and electronic equipment, use the first sign information to log in, user is only with according to prompting input first sign information, login can be completed, user need not remember account and password, also need not carry out complicated register, also not need to wait for message reply, solve the technical matters that login scheme of the prior art also exists complicated operation and length consuming time.Achieve the technique effect that user can easily log in third-party application software on the basis of safety.
3, the method that provides of the embodiment of the present application and electronic equipment; any one in use fingerprint, iris, face, palmmprint or sound is used as the first sign information; because fingerprint, iris, face, palmmprint or sound have uniquely and the feature of not transreplication; add the security logged in synchronous operation, the privacy of user can better be protected.
4, the method that provides of the embodiment of the present application and electronic equipment, based on described login trigger pip, showing a sign collection prompting instructs user to specify body part near the collection position of specifying, to guarantee the collection completing the sign information such as fingerprint, iris, face, palmmprint or sound easily and fast, avoid invalidated acquisitions.
Those skilled in the art should understand, embodiments of the invention can be provided as method, system or computer program.Therefore, the present invention can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the present invention can adopt can by the form of installing the upper computer program implemented of medium (including but not limited to disk erector, CD-ROM, optics erector etc.) at one or more computing machine wherein including computer usable program code.
The present invention describes with reference to according to the process flow diagram of the method for the embodiment of the present invention, equipment (system) and computer program and/or block scheme.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block scheme and/or square frame and process flow diagram and/or block scheme and/or square frame.These computer program instructions can being provided to the processor of multi-purpose computer, special purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computing machine or other programmable data processing device produce device for realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be arranged on can in the computer-readable erector that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be arranged in this computer-readable erector produces the manufacture comprising command device, and this command device realizes the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
These computer program instructions also can be loaded in computing machine or other programmable data processing device, make on computing machine or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computing machine or other programmable devices is provided for the step realizing the function of specifying in process flow diagram flow process or multiple flow process and/or block scheme square frame or multiple square frame.
Obviously, those skilled in the art can carry out various change and modification to the present invention and not depart from the spirit and scope of the present invention.Like this, if these amendments of the present invention and modification belong within the scope of the claims in the present invention and equivalent technologies thereof, then the present invention is also intended to comprise these change and modification.

Claims (8)

1. a method for information processing, the method is applied in the first electronic equipment, and described first electronic equipment is connected with the second electronic equipment, it is characterized in that, comprising:
Receive one for logging in the login trigger pip of client application;
Based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Send described first token and described first sign information causes described second electronic equipment;
Receive described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Based on described the match is successful signal, log in described client application.
2. the method for claim 1, is characterized in that, described first token specifically comprises:
One or more combination in the name information of described client application, address information, access authority information and access time information.
3. the method for claim 1, is characterized in that, described first sign information is any one in fingerprint, iris, face, palmmprint or sound.
4. the method for claim 1, is characterized in that, described based on described login trigger pip, generates first token corresponding with described client application, gathering first sign information of the user for logging in described client application, specifically comprising:
Based on described login trigger pip, generate first token corresponding with described client application;
Show a sign collection prompting, wherein, described sign collection prompting for guiding described user to carry out the first operation, the described first operation of appointment body part near the collection position of specifying being operating as described user;
Responding described first operation that described user carries out based on described sign collection prompting, gathering first sign information of the described user for logging in described client application.
5. an electronic equipment, is specially the first electronic equipment, is connected, it is characterized in that with the second electronic equipment, and described electronic equipment comprises:
First receiver module, for receiving one for logging in the login trigger pip of client application;
Processing module, for based on described login trigger pip, generating first token corresponding with described client application, gathering first sign information of the user for logging in described client application;
Sending module, for sending described first token and described first sign information causes described second electronic equipment;
Second receiver module, for receiving described second electronic equipment based on described first token and the described first sign information signal that returns that the match is successful, wherein, described the match is successful signal is described second electronic equipment based on the corresponding relation of the sign information prestored and token, the signal sent after determining described first token and described first sign information the match is successful;
Login module, for based on described the match is successful signal, logs in described client application.
6. electronic equipment as claimed in claim 5, it is characterized in that, described processing module also for, based on described login trigger pip, generate corresponding with described client application, comprise the first token of one or more the combination in the name information of described client application, address information, access authority information and access time information.
7. electronic equipment as claimed in claim 5, is characterized in that, described processing module also for, gather in the fingerprint of the user for logging in described client application, iris, face, palmmprint or sound any one.
8. electronic equipment as claimed in claim 5, it is characterized in that, described processing module comprises:
Token generation unit, for based on described login trigger pip, generates first token corresponding with described client application;
Display unit, for showing a sign collection prompting, wherein, described sign collection prompting for guiding described user to carry out the first operation, the described first operation of appointment body part near the collection position of specifying being operating as described user;
Collecting unit, for responding described first operation that described user carries out based on described sign collection prompting, gathers first sign information of the described user for logging in described client application.
CN201310347594.9A 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing Active CN104346161B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310347594.9A CN104346161B (en) 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310347594.9A CN104346161B (en) 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing

Publications (2)

Publication Number Publication Date
CN104346161A true CN104346161A (en) 2015-02-11
CN104346161B CN104346161B (en) 2017-12-29

Family

ID=52501860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310347594.9A Active CN104346161B (en) 2013-08-09 2013-08-09 The method and electronic equipment of a kind of information processing

Country Status (1)

Country Link
CN (1) CN104346161B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028132A1 (en) * 2015-08-16 2017-02-23 赵政荣 Method of indicating information upon face-based remote verification and automatic teller machine
WO2017028119A1 (en) * 2015-08-16 2017-02-23 赵政荣 Face-based remote verification method and automatic teller machine
CN111654468A (en) * 2020-04-29 2020-09-11 平安国际智慧城市科技股份有限公司 Secret-free login method, device, equipment and storage medium
CN114844657A (en) * 2021-01-15 2022-08-02 华为技术有限公司 Website login method, communication system and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6507912B1 (en) * 1999-01-27 2003-01-14 International Business Machines Corporation Protection of biometric data via key-dependent sampling
CN1457587A (en) * 2000-08-15 2003-11-19 维亚克沃公司 Method and apparatus for web-based application service model for security management
CN101316169A (en) * 2008-07-18 2008-12-03 张曌 Network identity verification method based on internet third party biological characteristic validation

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6507912B1 (en) * 1999-01-27 2003-01-14 International Business Machines Corporation Protection of biometric data via key-dependent sampling
CN1457587A (en) * 2000-08-15 2003-11-19 维亚克沃公司 Method and apparatus for web-based application service model for security management
CN101316169A (en) * 2008-07-18 2008-12-03 张曌 Network identity verification method based on internet third party biological characteristic validation

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017028132A1 (en) * 2015-08-16 2017-02-23 赵政荣 Method of indicating information upon face-based remote verification and automatic teller machine
WO2017028119A1 (en) * 2015-08-16 2017-02-23 赵政荣 Face-based remote verification method and automatic teller machine
CN111654468A (en) * 2020-04-29 2020-09-11 平安国际智慧城市科技股份有限公司 Secret-free login method, device, equipment and storage medium
CN114844657A (en) * 2021-01-15 2022-08-02 华为技术有限公司 Website login method, communication system and electronic equipment
CN114844657B (en) * 2021-01-15 2023-06-27 华为技术有限公司 Website login method, communication system and electronic equipment

Also Published As

Publication number Publication date
CN104346161B (en) 2017-12-29

Similar Documents

Publication Publication Date Title
KR102511811B1 (en) Techniques for securely authenticating bot users
CN110399713B (en) Information authentication method and related device
CN107222485B (en) Authorization method and related equipment
US20150089610A1 (en) Login using qr code
WO2014108005A1 (en) Co-verification method, two-dimensional code generation method, and device and system therefor
WO2015055095A1 (en) Identity authentication method and device and storage medium
EP3272093B1 (en) Method and system for anti-phishing using smart images
CN104954126B (en) Sensitive operation verification method, device and system
EP2395446A1 (en) Method for pairing a first device with a second device
CN108234124B (en) Identity verification method, device and system
WO2016085683A1 (en) User-authentication-based approval of a first device via communication with a second device
CN108702357A (en) A kind of method, terminal device and service server authorizing authority migration
CN104348687B (en) A kind of method and electronic equipment of generation authorization
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN105323218A (en) Identity verifying method and device
TWI680687B (en) Communication method and device
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
WO2018108062A1 (en) Method and device for identity verification, and storage medium
CN103873455A (en) Method and device for information check
TW201821961A (en) Method and device for processing user operation
CN104346161A (en) Information processing method and electronic equipment
CN108234412B (en) Identity verification method and device
CN108234113B (en) Identity verification method, device and system
CN110990821B (en) Identity type verification method, device and storage medium
TW201616411A (en) Systems and methods for interaction among terminal devices and servers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant