CN108460259A - A kind of information processing method, device and terminal - Google Patents
A kind of information processing method, device and terminal Download PDFInfo
- Publication number
- CN108460259A CN108460259A CN201611159088.7A CN201611159088A CN108460259A CN 108460259 A CN108460259 A CN 108460259A CN 201611159088 A CN201611159088 A CN 201611159088A CN 108460259 A CN108460259 A CN 108460259A
- Authority
- CN
- China
- Prior art keywords
- identity information
- intended application
- user
- information
- unit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the invention discloses a kind of information processing methods, including:Obtain first operation of the user to the primary icon of intended application;First operation is responded, response first operation searches corresponding first identity information of first operation by the mapping relations between pre-stored operation and identity information;The intended application is logged in first identity information.The embodiment of the present invention also discloses a kind of information processing unit and terminal simultaneously.
Description
Technical field
The present invention relates to a kind of control technology of field of communication technology more particularly to information processing method, device and terminals.
Background technology
With the development of development of Mobile Internet technology and popularizing for mobile terminal, in actual life, answered for same
It is often possible to have multiple accounts with user, user is also increasing for using the demand that more accounts log in application.Existing
In technology, is marked using Provisioning Instance Identifier and create multiple icons of attending to anything else in advance for application, is i.e. an application is in addition to a corresponding original
Outside raw icon, multiple icons of attending to anything else can be also corresponded to, to which user can realize by clicking different icons with the login of different accounts
Using.
Therefore, problem of the existing technology is:Application icon management is complex, wastes user time, moreover, when more
When a application icon is in same operating system of user interface simultaneously, since user forgets corresponding to each application icon difference
Account is easy to cause a wrong application icon, generates maloperation, need that operation is repeatedly repeated so that the intelligence of mobile terminal
Degree is low.
Invention content
In view of this, an embodiment of the present invention is intended to provide a kind of information processing method, device and terminal, used with realizing to reduce
Family maloperation promotes the degree of intelligence of terminal, improves user experience.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of information processing method, the method includes:User is obtained to target
First operation of the primary icon of application;First operation is responded, by between pre-stored operation and identity information
Mapping relations search corresponding first identity information of first operation;The target is logged in first identity information to answer
With.
In other embodiments of the present invention, described that the intended application is logged in first identity information, including:According to
First identity information obtains corresponding intended application data;Based on intended application described in the intended application data run,
And the intended application is logged in first identity information.
In other embodiments of the present invention, first operation for obtaining user to the primary icon of intended application, including:
During obtaining first operation, the corresponding user biological characteristic information of acquisition first operation;By the user
Biological information is matched with pre-stored biological information;Correspondingly, the response first operation, passes through
It is pre-stored to operate the first identity information corresponding with the first operation described in the mapping relationship searching between identity information, packet
It includes:If it does, then response first operation, passes through the mapping relationship searching between pre-stored operation and identity information
Described first operates corresponding first identity information.
In other embodiments of the present invention, before the intended application with first identity information login, institute
The method of stating further includes:Set the access rights of first identity information to limited access rights, wherein described limited
Access rights are used to indicate forbids accessing at least the one of the intended application after first identity information logs in intended application
Portion of user data.
In other embodiments of the present invention, in the acquisition user to the first operation of the primary icon of intended application
Before, the method further includes:Obtain second operation of the user to the primary icon, wherein second operation is different from institute
State the first operation;Determine whether the intended application supports more identity information login functions;If supported, described second is responded
Operation passes through corresponding second identity information of the second operation described in the mapping relationship searching;It is stepped on second identity information
Record the intended application.
Second aspect, the embodiment of the present invention provide a kind of information processing unit, and described device includes:First obtains unit,
First response unit and the first login unit;Wherein, the first obtains unit, for obtaining original of the user to intended application
First operation of raw icon;First response unit passes through pre-stored operation and body for responding first operation
Mapping relations between part information search corresponding first identity information of first operation;Described first logs in unit, with institute
It states the first identity information and logs in the intended application.
In other embodiments of the present invention, described first unit is logged in, is additionally operable to, according to first identity information, obtain
Corresponding intended application data;Based on intended application described in the intended application data run, and with first identity information
Log in the intended application.
In other embodiments of the present invention, the first obtains unit is additionally operable in the process for obtaining first operation
In, the corresponding user biological characteristic information of acquisition first operation;By the user biological characteristic information with it is pre-stored
Biological information is matched;First response unit is additionally operable to operate if it does, then responding described first, pass through
It is pre-stored to operate the first identity information corresponding with the first operation described in the mapping relationship searching between identity information.
In other embodiments of the present invention, described device further includes:Second obtaining unit, determination unit, the second response are single
Member and the second login unit;Wherein, second obtaining unit, for obtaining second behaviour of the user to the primary icon
Make, wherein second operation is different from described first and operates;The determination unit, for whether determining the intended application
Support more identity information login functions;If second response unit responds second operation, passes through for supporting
Corresponding second identity information of second operation described in the mapping relationship searching;Described second logs in unit, for described the
Two identity informations log in the intended application.
The third aspect, the embodiment of the present invention provide a kind of terminal, and the terminal includes:Tangible display screen and processing
Device;Wherein, the tangible display screen, for obtaining first operation of the user to the primary icon of intended application;The processing
Device searches described for responding first operation by the mapping relations between pre-stored operation and identity information
Corresponding first identity information of one operation;The intended application is logged in first identity information.
A kind of information processing method of offer of the embodiment of the present invention, device and terminal obtain user to intended application first
Then first operation of primary icon is grasped by the mapping relationship searching first between pre-stored operation and identity information
Make corresponding first identity information, and intended application is logged in the first identity information.To if by the letter of the embodiment of the present invention
When ceasing the case where processing method is applied to the login application of more identity informations, intended application can also logged in the first identity information
Before, second operation of the user for the primary icon is obtained, which is logged in the second identity information that the second operation is corresponding
Mark application.In this way, user can be realized by the different operation of the primary icon to application with different identity information registration
Intended application.It is thus possible to be effectively prevented user misoperation, the degree of intelligence of terminal is promoted, good user experience is provided.
Description of the drawings
Fig. 1-1 is the flow diagram of the information processing method in the embodiment of the present invention one;
Fig. 1-2 is the schematic diagram at the application setting interface in the embodiment of the present invention one;
Fig. 1-3 is the schematic diagram of the login identity information selection interface in the embodiment of the present invention one;
Fig. 2 is the flow diagram of the information processing method in the embodiment of the present invention two;
Fig. 3 is the flow diagram of the information processing method in the embodiment of the present invention three;
Fig. 4 is the flow diagram of the information processing method in the embodiment of the present invention four;
Fig. 5 is the structural schematic diagram of the information processing unit in the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the terminal in the embodiment of the present invention six.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes.
Embodiment one
The present embodiment provides a kind of information processing method, which is applied to terminal, and here, terminal can be
Smart mobile phone, tablet computer etc..The function that the information processing method is realized can pass through the processor caller in terminal
Code realizes that certain program code can be stored in computer storage media, it is seen then that the terminal include at least processor and
Storage medium.In practical applications, the information processing method can be applied to it is various can the more identity informations applications that log in
The occasion logged in is needed, is logged in as logged in switch between same application, two accounts of same application using two accounts simultaneously
Deng.
So, Fig. 1-1 is the flow diagram of the information processing method in the embodiment of the present invention one, shown in Figure 1, should
Information processing method includes:
S101:Obtain first operation of the user to the primary icon of intended application;
Here, when user wants to log in intended application, user can carry out the primary icon of intended application the first behaviour
Make, to realize the purpose for logging in intended application.Specifically, the primary icon of intended application can refer to when installing the intended application
The application icon being originally generated.
In practical applications, which can be social class application, can also be shopping class application, certainly can be with
It is the other kinds of application that can be logged in more identity informations, here, the embodiment of the present invention is not specifically limited.
In specific implementation process, user can pass through the primary icon to intended application in operation system interface
Click, touch or one or more combinations of sliding etc. generate the first operation, user can also by list of application, under
The place of other primary icons that can operate the intended application such as menu is drawn to carry out the first operation to the primary icon, certainly,
Or other manner generates the first operation, here, the embodiment of the present invention is not specifically limited.
In practical applications, the specific action of the first operation can be set by user, can also be system default setting
's.Illustratively, the specific action of the first operation can be clicked, such as click, double-click or three hit, and can also be to press, such as
Long-press or short-press etc. can also be sliding, dragging etc., it is, of course, also possible to be combinative movement, such as long-press is simultaneously slided, by this field
Technical staff determines that here, the embodiment of the present invention is not specifically limited in the specific implementation.
In specific implementation process, in order to protect the privacy of user, in case because other people maloperation makes user information
Leakage, S101 further include:During obtaining the first operation, the corresponding user biological characteristic information of the first operation of acquisition;It will
User biological characteristic information is matched with pre-stored biological information.
Illustratively, it is assumed that when user is not intended to others to find that the social networking application of oneself has multiple accounts, peace can be passed through
The mode of full certification protects the privacy of oneself.User, which can be arranged, to be answered being logged in using the mode that is operated to application icon
The safe class of used time, different safety class correspond to different processing, and such as in safe class highest, safety certification is not by then
Refusal logs in;When safe class is medium, safety certification is logged in the access mode being limited not by then;Such as in safe class
When minimum, can directly it be logged in without safety certification.
Specifically, the biological information that user is acquired when obtaining the first operation, by operating corresponding use by first
Family biological information carries out matched mode with pre-stored biological information, carries out safety certification.If the first behaviour
Make corresponding user biological characteristic information with pre-stored biological information to match, then shows that safety certification passes through, it can
To execute S102;If the corresponding user biological characteristic information of the first operation is mismatched with pre-stored biological information,
Then show that safety certification does not pass through, at this point it is possible to set the access rights of the first identity information to limited access rights, with
Just after the first identity information logs in intended application, current login user is forbidden to access shielded private data;Certainly, exist
Safety certification is obstructed out-of-date, can also directly end processing process, does not execute S102 to S103.
Further, before S101, above- mentioned information processing method can also include:User is obtained to the of primary icon
Two operations, wherein the second operation is different from the first operation;Determine whether intended application supports more identity information login functions;Such as
Fruit is supported, then responds the second operation, corresponding second is operated by the mapping relationship searching between operation and identity information second
Identity information;Intended application is logged in the second identity information.
Illustratively, user can set the first operation and correspond to the first identity information login intended application, and set
Second operation corresponds to logs in intended application with the second identity information.Therefore, in order to realize with the first identity information and the second body
Part information logs in intended application simultaneously, or in order to be switched to current the second identity information for logging in intended application with the first body
Part information registration can first use the second operation to log in intended application with the second identity information, then use first to operate again with
First identity information logs in intended application.That is, before logging in intended application with the first identity information, it can be first with the
Two identity informations log in intended application.
In practical applications, the specific action of the second operation can be set by user, can also be system default setting
's.Illustratively, the specific action of the second operation can be clicked, such as click, double-click or three hit, and can also be to press, such as
Long-press or short-press etc. can also be sliding, dragging etc., it is, of course, also possible to be action, such as long-press is simultaneously slided, by art technology
Personnel determine that here, the embodiment of the present invention is not specifically limited in the specific implementation.However, it is desirable to explanation, the second behaviour
Specific act of work and the first operation is different, and such as setting second operates as length on time, and it is to click that the first operation, which can be arranged,.
It should be noted that under normal circumstances, the first identity information is different with the second identity information, such as setting first
When identity information is account A and password A, it is account B and password B that the second identity information, which can be arranged,.In practical applications, first
It operates and is set by user with the corresponding identity information of the second operation, when user, which is not desired to more identity informations, to be logged in, also may be used
The first operation and the identity information corresponding to the second operation respectively are set as consistent.
Specifically, in order to determine the validity of operation of the user to the primary icon of intended application, use can obtained
After family is to the operation of the primary icon of intended application, such as the first operation or the second operation, it can also first determine that intended application is
It is no to support more identity information login functions;If it is determined that intended application supports more identity information login functions, then respond the first behaviour
Make or the second operation, passes through the operation of mapping relationship searching first between operation and identity information or the corresponding identity of the second operation
Information.It is of course also possible to when whether uncertain intended application can be logged in at least two identity informations, directly in response to user
The operation of the primary icon of corresponding application.Here, the embodiment of the present invention is not specifically limited.
It illustratively, can be by all tools for the ease of determining whether intended application supports more identity information login functions
There is an attribute information of the application of more identity information login functions, such as Apply Names, preserves to corresponding and reflect using the set-up time
Firing table, as applied in white list, then, when it needs to be determined that whether intended application supports more identity informations, it is only necessary to first obtain
Then the attribute information of the intended application is searched whether in the mapping table there are the attribute information, if it is present table
The bright intended application supports more identity information login functions, otherwise, shows that the intended application does not support more identity informations to log in work(
Energy.It is, of course, also possible to using other modes, determined according to actual conditions in specific implementation process by those skilled in the art
It is fixed.
S102:The first operation of response searches first by the mapping relations between pre-stored operation and identity information
Operate corresponding first identity information;
Here, after obtaining user to the first operation of the primary icon of intended application, so that it may with by pre-stored
Operation locates corresponding first identity information of first operation with the mapping relations between identity information to search, so as to this first
Identity information logs in intended application.
In specific implementation process, the first corresponding identity information of the first operation can be user's setting in intended application
Preset in setting, illustratively, user can correspond to the first operation in application setting interface as shown in Figs. 1-2
Action 11 be selected as " long-press " 111, and lower button " account A and password A " 122 is pressed at identity information 12 logging in, show by
The corresponding identity information of first operation is set as account A and password A, then, when the primary icon of user's long-press intended application
Afterwards, account A and password A will be obtained;The first corresponding identity information of first operation can also be that user is selected in real time, show
Example property, user can operate corresponding action 11 by first and be set as " long in application setting interface as shown in Figs. 1-2
Press and slide " 112, and be set as " display identity information list " 121 by identity information 12 is logged in, then, when user's long-press simultaneously
After the primary icon for sliding intended application, interface as shown in Figs. 1-3 will be shown, at this point, user can select as needed
For the identity information of login, show that account B and password B is selected to log in if user can press " account B and password B " 14
Using alternatively, new identity information can also be added directly, as can to press " newly-built identity information " 15 new to increase by user
Identity information.Here, the embodiment of the present invention is not specifically limited.
Therefore, above-mentioned mapping relations are being arranged to generate in intended application according to user, store the target and answer
With the mapping relations between corresponding each operation and identity information.Illustratively, it is set as in intended application as user:
When long-press logs in intended application with account A and password A, corresponding " long-press " operation will be preserved in the mapping relations and its is corresponded to
Identity information " account A and password A ".To, after obtaining user to " long-press " operation of the primary icon of intended application,
The mapping relations can be inquired, if there is the information of corresponding operation, it is possible to obtain the identity corresponding to the operation
Information " account A and password A ".
S103:Intended application is logged in the first identity information.
Here, after obtaining the first identity information, it will be able to log in the intended application with the first identity information.
In specific implementation process, in order to log in intended application with the first identity information, S103 may include:According to
First identity information obtains corresponding intended application data;Based on intended application data run intended application, and with the first identity
Information registration intended application.
Specifically, for the intended application for the login that can be carried out with different identity information, each identity information
Corresponding a independent intended application data that can run the intended application are required for, these intended application data can be independent
Operational objective is applied and is not interfere with each other.It therefore, can be first according to first body in order to log in intended application with the first identity information
Part information, obtains the intended application data corresponding to first identity information, then answer based on the intended application data run target
With, and intended application is logged in the first identity information.
In practical applications, it in order to obtain the corresponding intended application data of the first identity information, can first be answered according to target
Attribute information, it is each using data corresponding to intended application to obtain;Then it is corresponding each that each application data are obtained
A identity information, and respectively match each identity information with the first identity information;Finally, according to matching result, judge
It whether there is and the matched identity information of the first identity information in each identity information;If it is present matched identity is believed
The corresponding application data of breath are determined as intended application data;Otherwise, so that it may each be answered using any of data with replicating
With data, to generate intended application data.
Here, the attribute information of intended application may include:The title of first application, download address, is divided at unique mark
The information such as class, version, detailed description, thumbnail, packet name, size, developer, it is of course also possible to be other, the embodiment of the present invention
It is not specifically limited.
So far, it just completes and intended application is logged in the first identity information.
As shown in the above, the technical solution that the embodiment of the present invention is provided is obtaining user to intended application
After first operation of primary icon, it can be operated by the mapping relationship searching first between pre-stored operation and identity information
Corresponding first identity information, and intended application is logged in the first identity information.In this way, the letter provided through the embodiment of the present invention
Processing method is ceased, second operation of the user to the primary icon of intended application can obtained, and step on the second identity information
After recording intended application, then using the first operation come with the first identity information login intended application.To by same application figure
Mark carries out different operation, realizes with different identity information registration application.It on the one hand, can be in same application simultaneously with multiple identity
In the case of information registration, the complexity of the multiple management of icons of same application is reduced, on the other hand, additionally it is possible to not exit original
In the case of logging in identity information, is directly applied, can be quickly carried out between different accounts to log in another identity information
Switching, and reduce the complexity of switching different identity information registration application.In turn, operation complexity is reduced, end is improved
The degree of intelligence at end can provide good user experience to the user.
Embodiment two
Based on previous embodiment, the present embodiment provides a kind of information processing methods, are applied in following scene, it is assumed that user
The primary icon that intended application is clicked in setting corresponds to identity information A login intended applications, and sets and double-click intended application
Primary icon corresponds to display identity information list, so that user selects to need the identity information B logged in or create to need to step on
The identity information B of record.
So, Fig. 2 is the flow diagram of the information processing method in the embodiment of the present invention two, shown in Figure 2, the party
Method includes:
S201:Obtain single-click operation of the user to the primary icon of intended application;
S202:Single-click operation is responded, by the mapping relations between pre-stored operation and identity information, lookup is clicked
Operate corresponding identity information A;
S203:Obtain the corresponding intended application data of identity information A;
S204:The corresponding intended application data run intended applications of identity-based information A, and mesh is logged in identity information A
Mark application;
S205:Obtain double click operation of the user to the primary icon of intended application;
S206:Determine whether intended application supports more identity information login functions;
If it is determined that intended application supports more identity information login functions, then S207 is executed, otherwise, terminated.
S207:Double click operation is responded, shows identity information list;
S208:According to the user's choice, identity information B is obtained;
S209:Intended application is logged in identity information B.
As shown in the above, the technical solution provided through this embodiment may be implemented by same application figure
Mark carries out different operation, realizes with different identity information registration application.After logging in intended application with identity information A, while with
Identity information B logs in intended application, or after logging in intended application with identity information A, is switched to and logs in mesh with identity information B
Mark application.Operation complexity is reduced, the degree of intelligence of terminal is improved, good user experience can be provided to the user.
Embodiment three
Based on previous embodiment, the present embodiment provides a kind of information processing method, Fig. 3 is the letter in the embodiment of the present invention three
The flow diagram of processing method is ceased, shown in Figure 3, which includes:
S301:Obtain first operation of the user to the primary icon of intended application;
S302:During obtaining the first operation, the corresponding user biological characteristic information of the first operation of acquisition;
Specifically, the corresponding user biological characteristic information of the first operation can be the finger print information of user, more preferably, full frame
The terminal of fingerprint can be acquired, it can be during user operates the primary icon of intended application using finger, directly
The finger print information of user is acquired using touch screen;And for the non-full frame terminal for acquiring fingerprint, it can be in user
After being operated to the primary icon of intended application using finger, when user's finger is lifted, then special fingerprint collecting mould is used
Block acquires the finger print information of user.Certainly, the first corresponding user biological characteristic information of operation can also acoustic information etc. other
The biological characteristic of user, as long as biology can be passed through after obtaining user to the first operation of the primary icon of intended application
Collection apparatus module can acquire.Here, the embodiment of the present invention is not specifically limited.
In practical applications, the biological information of user can be acquired by the photoelectric conversion module in terminal,
The biological information that user can be acquired by the silicon crystal sensor in terminal, it is, of course, also possible to by other means
The biological information of user is acquired, here, the embodiment of the present invention is not specifically limited.
Here, biological information can be finger print information, or acoustic information, the embodiment of the present invention are not done specifically
It limits;In practical application, it can acquire user's by optical sensor/capacitance sensor/temperature sensor/excusing from death sensor
Finger print information carries out pretreatment to finger print information and the key step of feature extracting method includes:Patterns calculating, image filter
Wave, binaryzation, refinement, extraction feature and post-processing.
S303:Judge whether user biological characteristic information matches with pre-stored biological information, if it does, holding
Row S304 to S306;If it does not match, executing S307 to S310.
It specifically, can be similar between user biological characteristic information and pre-stored biological information by calculating
The mode of degree, to determine whether user biological characteristic information matches with pre-stored biological information.
In practical applications, it is similar that Histogram Matching, matrix decomposition mathematically, the image of feature based point may be used
The common method for calculating similarity such as degree calculating, here, the embodiment of the present invention is not specifically limited.
S304:The first operation of response searches first by the mapping relations between pre-stored operation and identity information
Operate corresponding first identity information;
S305:According to the first identity information, corresponding intended application data are obtained;
S306:Intended application is logged in based on intended application data run intended application, and with the first identity information;
S307:The first operation of response searches first by the mapping relations between pre-stored operation and identity information
Operate corresponding first identity information;
S308:According to the first identity information, corresponding intended application data are obtained;
S309:Set the access rights of the first identity information to limited access rights;
Wherein, limited access rights are used to indicate forbids access target to answer after the first identity information logs in intended application
At least part user data.That is, limited access rights are used to forbid the user of current operation to access former use
The private data of family setting, to realize protection privacy of user.
In practical applications, the mapping relations between access rights and the first identity information can be established, when user runs
When intended application data corresponding to the first identity information, so that it may to call corresponding permission, determine which data can be shown,
Which data cannot be shown.
Here, those skilled in the art can access priority assignation to intended application data according to the prior art,
The embodiment of the present invention is not just done and is excessively repeated.
S310:Intended application is logged in based on intended application data run intended application, and with the first identity information.
As shown in the above, the technical solution provided through this embodiment may be implemented more identity information logins and answer
With or switching identity information log in when safety management, protect privacy of user data.
Example IV
Based on previous embodiment, a kind of information processing method is present embodiments provided, is applied in following scene, it is assumed that is used
Family is touch operation to the operation of the primary icon of intended application, it is possible to according to the touch duration for primary icon, is come
Which determine with identity information operational objective application.The primary icon of user's setting short-press intended application corresponds to be believed with identity
The primary icon for ceasing A and logging in intended application, and set long-press intended application corresponds to logs in intended application with identity information B.
So, Fig. 4 is the flow diagram of the information processing method in the embodiment of the present invention four, shown in Figure 4, the letter
Ceasing processing method includes:
S401:Obtain touch operation of the user to the primary icon of intended application;
S402:Judge whether the touch duration of touch operation is less than preset duration threshold value;
If it is less than preset duration threshold value, then show the primary icon of user's short-press intended application, at this point, executing
S403;Otherwise, then show the primary icon of user's long-press intended application, at this point, executing S410 to S411.
S403:The first operation is generated, and acquires the current biological information of user;
S404:Determine the current biological information of user whether with pre-stored biometric information matches;
If it does, executing S405;Otherwise, S406 is executed.
S405:The first operation of response, intended application is logged in identity information A;
S406:Calculate unmatched number;
S407:Judge whether unmatched number is more than preset matching threshold value;
If unmatched number is more than the second preset matching threshold value, S408 is executed;Otherwise, S409 is executed;
S408:The display screen of terminal is locked in preset time;
In practical applications, those skilled in the art can realize the locking terminal in preset time according to the prior art
Display screen, here, the embodiment of the present invention, which is not done, excessively to be repeated.
S409:Acquire the current biological information of user;
After executing S409, S404 is continued to execute, until performing S408 or S405.
S410:Generate the second operation;
S411:The second operation of response, intended application is logged in identity information B.
So far, information processing is just completed.
Embodiment five
Based on same inventive concept, the present embodiment provides a kind of information processing units.Fig. 5 is in the embodiment of the present invention five
The structural schematic diagram of information processing unit, shown in Figure 5, which includes:First obtains unit 501,
One response unit 502 and first logs in unit 503, wherein first obtains unit 501, for obtaining user to intended application
Primary icon first operation;First response unit 502 passes through pre-stored operation and body for responding the first operation
Mapping relations between part information search corresponding first identity information of the first operation;First logs in unit 503, with the first body
Part information registration intended application.
Further, first unit is logged in, is additionally operable to, according to the first identity information, obtain corresponding intended application data;
Intended application is logged in based on intended application data run intended application, and with the first identity information.
Further, first obtains unit is additionally operable to during obtaining the first operation, and the first operation of acquisition is corresponding
User biological characteristic information;User biological characteristic information is matched with pre-stored biological information;First response
Unit, be additionally operable to if it does, then if it does, then response first operation, by it is pre-stored operation with identity information it
Between mapping relations, search the first corresponding first identity information of operation.
Further, which further includes:Rights management unit is additionally operable to first identity information
Access rights are set as limited access rights, wherein the limited access rights are used for first identity information
Forbid accessing at least part user data in the data of the intended application after login intended application.
Further, which further includes:Second obtaining unit, determination unit, the second response unit and
Second logs in unit, wherein the second obtaining unit, for obtaining second operation of the user to primary icon, wherein the second operation
Different from the first operation;Determination unit, for determining whether intended application supports more identity information login functions;Second response is single
Member, if for supporting, the second operation of response operates corresponding second identity information by mapping relationship searching second;The
Two log in unit, for logging in intended application with the second identity information.
In practical applications, above-mentioned first obtains unit, the first response unit, first log in unit, rights management unit,
Second obtaining unit, determination unit, the second response unit and second log in unit can by central processing unit (CPU,
Central Processing Unit), microprocessor (MPU, Micro Processor Unit), digital signal processor
(DSP, Digital Signal Processor) or field programmable gate array (FPGA, Field Programmable
Gate Array) etc. realizations.
It need to be noted that be:The description of apparatus above embodiment, be with the description of above method embodiment it is similar,
With the similar advantageous effect of same embodiment of the method, therefore do not repeat.For undisclosed skill in apparatus of the present invention embodiment
Art details please refers to the description of the method for the present invention embodiment and understands, to save length, therefore repeats no more.
Embodiment six
Based on same inventive concept, the present embodiment provides a kind of terminals.Fig. 6 is the knot of the terminal in the embodiment of the present invention six
Structure schematic diagram, shown in Figure 6, which includes:Tangible display screen 601 and processor 602, wherein tangible aobvious
Display screen 601, for obtaining first operation of the user to the primary icon of intended application;Processor 602, for responding the first behaviour
Make, by the mapping relations between pre-stored operation and identity information, searches corresponding first identity information of the first operation;
Intended application is logged in the first identity information.
Further, processor is additionally operable to, according to the first identity information, obtain corresponding intended application data;Based on mesh
Mark applies data run intended application, and logs in intended application with the first identity information.
Further, tangible display screen is additionally operable to during obtaining the first operation, and the first operation of acquisition is corresponding
User biological characteristic information;Processor is additionally operable to carry out user biological characteristic information and pre-stored biological information
Matching;If it does, then the first operation of response, passes through the mapping relationship searching the between pre-stored operation and identity information
Corresponding first identity information of one operation.
Further, processor is additionally operable to set the access rights of the first identity information to limited access rights,
In, limited access rights are used to indicate forbid access target to apply after the first identity information logs in intended application at least one
Portion of user data.
Further, tangible display screen is additionally operable to the second operation for obtaining user to primary icon, wherein the second behaviour
Make to be different from the first operation;Processor is additionally operable to determine whether intended application supports more identity information login functions;If branch
It holds, then responds the second operation, corresponding second identity information is operated by mapping relationship searching second;It is stepped on the second identity information
Record intended application.
It need to be noted that be:The description of the above terminal embodiment, be with the description of above method embodiment it is similar,
With the similar advantageous effect of same embodiment of the method, therefore do not repeat.For undisclosed skill in terminal embodiment of the present invention
Art details please refers to the description of the method for the present invention embodiment and understands, to save length, therefore repeats no more.
It should be understood by those skilled in the art that, the embodiment of the present invention can be provided as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention
Formula.Moreover, the present invention can be used can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be with reference to according to the method for the embodiment of the present invention, the flow of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be realized by computer program instructions every first-class in flowchart and/or the block diagram
The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided
Instruct the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine so that the instruction executed by computer or the processor of other programmable data processing devices is generated for real
The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to
Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device so that count
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or
The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (10)
1. a kind of information processing method, which is characterized in that the method includes:
Obtain first operation of the user to the primary icon of intended application;
It responds first operation and searches described first by the mapping relations between pre-stored operation and identity information
Operate corresponding first identity information;
The intended application is logged in first identity information.
2. according to the method described in claim 1, it is characterized in that, described answered with first identity information login target
With, including:
According to first identity information, corresponding intended application data are obtained;
Based on intended application described in the intended application data run, and the target is logged in first identity information and is answered
With.
3. according to the method described in claim 1, it is characterized in that, described obtain user to the of the primary icon of intended application
One operation, including:
During obtaining first operation, the corresponding user biological characteristic information of acquisition first operation;
The user biological characteristic information is matched with pre-stored biological information;
Correspondingly, the response first operation, is looked by the mapping relations between pre-stored operation and identity information
Corresponding first identity information of first operation is looked for, including:
If it does, then response first operation, is looked by the mapping relations between pre-stored operation and identity information
Look for corresponding first identity information of first operation.
4. according to the method described in claim 3, it is characterized in that, logging in the target described with first identity information
Using before, the method further includes:
Set the access rights of first identity information to limited access rights, wherein the limited access rights
It is used to indicate at least part user for forbidding accessing the intended application after first identity information logs in intended application
Data.
5. according to the method described in claim 1, it is characterized in that, in the acquisition user to the primary icon of intended application
Before first operation, the method further includes:
Obtain second operation of the user to the primary icon, wherein second operation is different from described first and operates;
Determine whether the intended application supports more identity information login functions;
If supported, second operation is responded, passes through corresponding second body of the second operation described in the mapping relationship searching
Part information;
The intended application is logged in second identity information.
6. a kind of information processing unit, which is characterized in that described device includes:First obtains unit, the first response unit and
First logs in unit;Wherein,
The first obtains unit, for obtaining first operation of the user to the primary icon of intended application;
First response unit, for responding first operation, by between pre-stored operation and identity information
Mapping relations search corresponding first identity information of first operation;
Described first logs in unit, and the intended application is logged in first identity information.
7. device according to claim 6, which is characterized in that described first logs in unit, is additionally operable to according to described first
Identity information obtains corresponding intended application data;Based on intended application described in the intended application data run, and with described
First identity information logs in the intended application.
8. device according to claim 6, which is characterized in that the first obtains unit is additionally operable to obtaining described the
During one operation, the corresponding user biological characteristic information of acquisition first operation;By the user biological characteristic information
It is matched with pre-stored biological information;First response unit is additionally operable to if it does, then responding described
One operation passes through pre-stored operation the first body corresponding with the first operation described in the mapping relationship searching between identity information
Part information.
9. device according to claim 6, which is characterized in that described device further includes:Second obtaining unit determines list
Member, the second response unit and second log in unit;Wherein,
Second obtaining unit, for obtaining second operation of the user to the primary icon, wherein second operation is not
It is same as first operation;
The determination unit, for determining whether the intended application supports more identity information login functions;
If second response unit responds second operation, described in the mapping relationship searching for supporting
Corresponding second identity information of second operation;
Described second logs in unit, for logging in the intended application with second identity information.
10. a kind of terminal, which is characterized in that the terminal includes:Tangible display screen and processor;Wherein,
The tangible display screen, for obtaining first operation of the user to the primary icon of intended application;
The processor is closed for responding first operation by the mapping between pre-stored operation and identity information
Corresponding first identity information of first operation is searched by system;The intended application is logged in first identity information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611159088.7A CN108460259B (en) | 2016-12-13 | 2016-12-13 | Information processing method and device and terminal |
PCT/CN2017/091712 WO2018107727A1 (en) | 2016-12-13 | 2017-07-04 | Method and device for information processing, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611159088.7A CN108460259B (en) | 2016-12-13 | 2016-12-13 | Information processing method and device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108460259A true CN108460259A (en) | 2018-08-28 |
CN108460259B CN108460259B (en) | 2022-12-02 |
Family
ID=62558183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611159088.7A Active CN108460259B (en) | 2016-12-13 | 2016-12-13 | Information processing method and device and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108460259B (en) |
WO (1) | WO2018107727A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111427709A (en) * | 2020-03-30 | 2020-07-17 | 努比亚技术有限公司 | Application program body-separating control method and device and computer readable storage medium |
CN111459358A (en) * | 2020-03-31 | 2020-07-28 | 维沃移动通信有限公司 | Application program control method and electronic equipment |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924258B (en) * | 2018-08-14 | 2022-07-08 | 深圳壹账通智能科技有限公司 | Background information pushing method and device, computer equipment and storage medium |
CN112165493B (en) * | 2020-09-30 | 2023-02-21 | 惠州市善居电子商务有限公司 | Identity login switching method and device, computer equipment and storage medium |
CN112783579A (en) * | 2021-01-05 | 2021-05-11 | 北京小米松果电子有限公司 | Application program control method, device and storage medium |
CN113240500A (en) * | 2021-06-11 | 2021-08-10 | 维沃移动通信有限公司 | Information display method and device |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050269402A1 (en) * | 2004-06-03 | 2005-12-08 | Tyfone, Inc. | System and method for securing financial transactions |
CN102368750A (en) * | 2011-09-30 | 2012-03-07 | 上海量明科技发展有限公司 | Display method and system of multi-account login interface |
US20130312073A1 (en) * | 2012-05-16 | 2013-11-21 | Rajdeep Srivastav | Methods and systems for authentication of multiple sign-in accounts |
CN103425914A (en) * | 2012-05-17 | 2013-12-04 | 宇龙计算机通信科技(深圳)有限公司 | Login method of application program and communication terminal |
CN103576847A (en) * | 2012-08-09 | 2014-02-12 | 腾讯科技(深圳)有限公司 | Method and device for obtaining account information |
CN104125063A (en) * | 2013-04-28 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Authentication method, equipment and system |
CN104363205A (en) * | 2014-10-17 | 2015-02-18 | 小米科技有限责任公司 | Application login method and device |
CN104394133A (en) * | 2014-11-14 | 2015-03-04 | 百度在线网络技术(北京)有限公司 | Login method and login system |
CN104866752A (en) * | 2015-05-12 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application protection method and user terminal |
CN105094898A (en) * | 2015-07-08 | 2015-11-25 | 广东欧珀移动通信有限公司 | Method for switching account of application program and terminal |
CN105117209A (en) * | 2015-07-27 | 2015-12-02 | 小米科技有限责任公司 | Application interaction method and device |
CN105760045A (en) * | 2016-01-29 | 2016-07-13 | 宇龙计算机通信科技(深圳)有限公司 | Application program login method, application program login device and terminal |
CN105871841A (en) * | 2016-03-31 | 2016-08-17 | 乐视控股(北京)有限公司 | Method and device for logging in target equipment and generating login information |
CN106034134A (en) * | 2015-03-19 | 2016-10-19 | 腾讯科技(深圳)有限公司 | Method and device and auxiliary method and device for implementing identity authentication request in webpage application |
WO2016165536A1 (en) * | 2015-04-17 | 2016-10-20 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN106201748A (en) * | 2016-07-21 | 2016-12-07 | 北京奇虎科技有限公司 | Method, device and the mobile terminal of a kind of Message Processing based on mobile terminal |
CN106203143A (en) * | 2016-07-21 | 2016-12-07 | 北京奇虎科技有限公司 | Method, device and the mobile terminal of a kind of application program locking |
-
2016
- 2016-12-13 CN CN201611159088.7A patent/CN108460259B/en active Active
-
2017
- 2017-07-04 WO PCT/CN2017/091712 patent/WO2018107727A1/en active Application Filing
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050269402A1 (en) * | 2004-06-03 | 2005-12-08 | Tyfone, Inc. | System and method for securing financial transactions |
CN102368750A (en) * | 2011-09-30 | 2012-03-07 | 上海量明科技发展有限公司 | Display method and system of multi-account login interface |
US20130312073A1 (en) * | 2012-05-16 | 2013-11-21 | Rajdeep Srivastav | Methods and systems for authentication of multiple sign-in accounts |
CN103425914A (en) * | 2012-05-17 | 2013-12-04 | 宇龙计算机通信科技(深圳)有限公司 | Login method of application program and communication terminal |
CN103576847A (en) * | 2012-08-09 | 2014-02-12 | 腾讯科技(深圳)有限公司 | Method and device for obtaining account information |
CN104125063A (en) * | 2013-04-28 | 2014-10-29 | 腾讯科技(深圳)有限公司 | Authentication method, equipment and system |
CN104363205A (en) * | 2014-10-17 | 2015-02-18 | 小米科技有限责任公司 | Application login method and device |
CN104394133A (en) * | 2014-11-14 | 2015-03-04 | 百度在线网络技术(北京)有限公司 | Login method and login system |
CN106034134A (en) * | 2015-03-19 | 2016-10-19 | 腾讯科技(深圳)有限公司 | Method and device and auxiliary method and device for implementing identity authentication request in webpage application |
WO2016165536A1 (en) * | 2015-04-17 | 2016-10-20 | 腾讯科技(深圳)有限公司 | Identity verification method and device |
CN104866752A (en) * | 2015-05-12 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application protection method and user terminal |
CN105094898A (en) * | 2015-07-08 | 2015-11-25 | 广东欧珀移动通信有限公司 | Method for switching account of application program and terminal |
CN105117209A (en) * | 2015-07-27 | 2015-12-02 | 小米科技有限责任公司 | Application interaction method and device |
CN105760045A (en) * | 2016-01-29 | 2016-07-13 | 宇龙计算机通信科技(深圳)有限公司 | Application program login method, application program login device and terminal |
CN105871841A (en) * | 2016-03-31 | 2016-08-17 | 乐视控股(北京)有限公司 | Method and device for logging in target equipment and generating login information |
CN106201748A (en) * | 2016-07-21 | 2016-12-07 | 北京奇虎科技有限公司 | Method, device and the mobile terminal of a kind of Message Processing based on mobile terminal |
CN106203143A (en) * | 2016-07-21 | 2016-12-07 | 北京奇虎科技有限公司 | Method, device and the mobile terminal of a kind of application program locking |
Non-Patent Citations (5)
Title |
---|
JEREMIAH ONAOLAPO: "What Happens After You Are Pwnd:Understanding The Use Of Leaked Account Credentials In The Wild", 《网页公开:HTTPS://DISCOVERY.UCL.AC.UK/ID/EPRINT/1505967/1/PAPER.PDF》 * |
张杰: "身份管理渐行其道", 《世界电信》 * |
林丽华: "利用QQ多账号功能提高登录效率", 《电脑迷》 * |
闫艳力等: "我的QQ你快回来!", 《电脑爱好者》 * |
骆慧勇等: "基于协同平台用户信息的身份认证构架研究", 《金融科技时代》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111427709A (en) * | 2020-03-30 | 2020-07-17 | 努比亚技术有限公司 | Application program body-separating control method and device and computer readable storage medium |
CN111427709B (en) * | 2020-03-30 | 2023-07-21 | 努比亚技术有限公司 | Application program splitting control method, device and computer readable storage medium |
CN111459358A (en) * | 2020-03-31 | 2020-07-28 | 维沃移动通信有限公司 | Application program control method and electronic equipment |
CN111459358B (en) * | 2020-03-31 | 2021-08-17 | 维沃移动通信有限公司 | Application program control method and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2018107727A1 (en) | 2018-06-21 |
CN108460259B (en) | 2022-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106055996B (en) | Multimedia information sharing method and mobile terminal | |
CN108460259A (en) | A kind of information processing method, device and terminal | |
WO2016127426A1 (en) | Method and apparatus for displaying application and picture, and electronic device | |
CN104660688B (en) | A kind of method and apparatus obtaining log-on message | |
KR20190085543A (en) | Method and apparatus for generating security questions and verifying identities | |
CN103605459A (en) | Fast application launching method and fast application launching terminal | |
TWI705348B (en) | Service calling method and device | |
CN104679900B (en) | Application program searching method and device | |
CN106843660B (en) | Data processing method and equipment thereof | |
CN105677222B (en) | Application message methods of exhibiting, application message show device and terminal | |
CN105447378A (en) | Password generation method and device | |
US20180278600A1 (en) | Multi-factor masked access control system | |
CN106354399A (en) | Method, device, and electronic device for assignment of application permission | |
CN108235767A (en) | A kind of partition method, device and terminal for paying application | |
CN109063504A (en) | Access method, mobile terminal and the storage medium of secret file | |
CN109359582A (en) | Information search method, information search device and mobile terminal | |
CN104808899A (en) | Terminal | |
CN112912844A (en) | File collection method, file collection device and terminal equipment | |
CN106203176A (en) | A kind of application encryption method and device | |
WO2016119341A1 (en) | Method and device for implementing multi-user login mode, and computer storage medium | |
CN105353874A (en) | Multimedia content sharing method and terminal | |
CN106385507A (en) | Prompting method of social application, prompting device and terminal | |
US20180088766A1 (en) | Folder creating and cancelling method and system applied on touch screen | |
CN106778344B (en) | A kind of data permission control method and terminal | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |