CN113986075B - Information display method and device, verification method and device and electronic equipment - Google Patents
Information display method and device, verification method and device and electronic equipment Download PDFInfo
- Publication number
- CN113986075B CN113986075B CN202111234037.7A CN202111234037A CN113986075B CN 113986075 B CN113986075 B CN 113986075B CN 202111234037 A CN202111234037 A CN 202111234037A CN 113986075 B CN113986075 B CN 113986075B
- Authority
- CN
- China
- Prior art keywords
- information
- target
- input
- verification
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 244
- 238000000034 method Methods 0.000 title claims abstract description 104
- 230000004044 response Effects 0.000 claims abstract description 37
- 238000012545 processing Methods 0.000 claims description 13
- 238000004891 communication Methods 0.000 abstract description 9
- 230000008569 process Effects 0.000 description 26
- 230000003993 interaction Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 238000012546 transfer Methods 0.000 description 10
- 230000003238 somatosensory effect Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000004888 barrier function Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The application discloses an information display method and device, an information verification method and device and electronic equipment, and belongs to the technical field of communication. The information display method is applied to first electronic equipment and comprises the following steps: receiving a first input of a user to a target application icon; responding to the first input, displaying a target mask layer, wherein the target mask layer is used for shielding an application interface corresponding to the target application icon; receiving a second input of a user to the target mask; and in response to the second input, displaying the application interface in the case of verification passing.
Description
Technical Field
The application belongs to the technical field of communication, and particularly relates to an information display method and device, an information verification method and device and electronic equipment.
Background
After the user changes the phone, the old mobile phone still stores the user data. In the related art, under the condition that a user changes a phone and does not perform formatting processing on an old mobile phone, anyone can easily start the old mobile phone to browse user data stored in the old mobile phone, so that privacy of the user is revealed.
Disclosure of Invention
The embodiment of the application aims to provide an information display method and device, an information verification method and device and electronic equipment, which can solve the problem of privacy disclosure of users.
In a first aspect, an embodiment of the present application provides an information display method, which is applied to a first electronic device, where the method includes:
receiving a first input of a user to a target application icon;
responding to the first input, displaying a target mask layer, wherein the target mask layer is used for shielding an application interface corresponding to the target application icon;
receiving a second input of a user to the target mask;
and in response to the second input, displaying the application interface in the case of verification passing.
In a second aspect, an embodiment of the present application provides an authentication method, applied to a second electronic device, where the method includes:
receiving first information sent by first electronic equipment;
generating second information in case of passing the verification;
and sending the second information to the first electronic equipment.
In a third aspect, an embodiment of the present application provides an information display apparatus, applied to a first electronic device, including:
The first receiving module is used for receiving a first input of a target application icon from a user;
The first display module is used for responding to the first input and displaying a target mask layer, and the target mask layer is used for shielding an application interface corresponding to the target application icon;
The second receiving module is used for receiving a second input of a user to the target mask layer;
and the second display module is used for responding to the second input and displaying the application interface under the condition that verification is passed.
In a fourth aspect, an embodiment of the present application provides an authentication apparatus applied to a second electronic device, where the apparatus includes:
the third receiving module is used for receiving the first information sent by the first electronic equipment;
The first processing module is used for generating second information under the condition that verification is passed;
and the first sending module is used for sending the second information to the first electronic equipment.
In a fifth aspect, an embodiment of the present application provides an electronic device comprising a processor, a memory and a program or instruction stored on the memory and executable on the processor, the program or instruction implementing the steps of the method according to the first or second aspect when executed by the processor.
In a sixth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor implement the steps of the method according to the first or second aspect.
In a seventh aspect, an embodiment of the present application provides a chip, where the chip includes a processor and a communication interface, where the communication interface is coupled to the processor, and where the processor is configured to execute a program or instructions to implement a method according to the first aspect or the second aspect.
In the embodiment of the application, the target mask layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being revealed, and the privacy of a user can be better protected; in addition, through verification operation, the target mask layer is eliminated under the condition that verification is passed, the application interface is displayed, the reliability and the flexibility of verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
Drawings
Fig. 1 is a schematic flow chart of an information display method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of a verification method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of an interface of an information display method or a verification method according to an embodiment of the present application;
FIG. 4 is a second diagram of an interface of an information display method or a verification method according to an embodiment of the present application;
FIG. 5 is a third interface diagram of an information display method or verification method according to an embodiment of the present application;
FIG. 6 is a diagram illustrating an interface of an information display method or a verification method according to an embodiment of the present application;
FIG. 7 is a diagram showing an interface of an information display method or a verification method according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an information display device according to an embodiment of the present application;
Fig. 9 is a schematic structural diagram of a verification apparatus according to an embodiment of the present application;
Fig. 10 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 11 is a schematic hardware diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are obtained by a person skilled in the art based on the embodiments of the present application, fall within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The information display method, the verification method, the information display device, the verification device, the electronic device and the readable storage medium provided by the embodiment of the application are described in detail below through specific embodiments and application scenes thereof with reference to the accompanying drawings.
The information display method and the verification method can be applied to the terminal, and can be specifically executed by hardware or software in the terminal. The execution subject of the information display method and the verification method may be a terminal, a control device of the terminal, or the like.
The terminal includes, but is not limited to, a mobile phone or other portable communication device such as a tablet computer having a touch sensitive surface (e.g., a touch screen display and/or a touch pad). It should also be appreciated that in some embodiments, the terminal may not be a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or a touch pad).
In the following various embodiments, a terminal including a display and a touch sensitive surface is described. However, it should be understood that the terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and joystick.
It should be noted that, when a user changes a phone, information transfer between at least two terminals is often involved, for example, information on a terminal a (such as an old mobile phone) is transferred to a terminal B (such as a new mobile phone), and when the data on the terminal a is not manually deleted, after the terminal a is opened, the user may refer to history information corresponding to each application stored on the terminal a at will.
The embodiment of the application provides an information display method, and an execution subject of the information display method can be a terminal, including but not limited to a mobile terminal, such as a mobile phone, a notebook computer, a camera, a vehicle-mounted electronic device, a watch and the like, a non-mobile terminal, such as a desktop computer and the like, or a control device of the terminal and the like.
The information display method is applied to the first electronic device, namely the terminal a (such as an old mobile phone) as described above.
As shown in fig. 1, the information display method includes: step 110, step 120, step 130 and step 140.
Step 110, a terminal A receives a first input of a target application icon from a user;
in this step, the application icon is an icon of an application installed on the terminal a and migrating history information to the terminal B.
The application program can be a social application, a music application, a video application, a news application and the like.
The target application icon is an icon corresponding to an application program to be referred to by a user in the plurality of application programs.
The first input is used to determine a target application icon.
The first input may be represented as at least one of:
first, the first input may be presented as a touch input, including but not limited to a click input, a slide input, a press input, and the like.
In this embodiment, receiving the first input of the user may be performed by receiving a touch operation of the user in the display area of the terminal display screen.
In order to reduce the misoperation rate of a user, an action area of the first input can be limited in a specific area, for example, an application icon is displayed on a current interface in a state of displaying a desktop, and the first input can be realized by touching a target application icon; or the first input is set to a continuous multi-tap operation of a target application icon to the display area within a target time interval.
Second, the first input may appear as a physical key input.
In this embodiment, the body of the terminal is provided with an entity key, such as a mouse or a keyboard, to receive a first input of a user, which may be expressed as receiving a first input that the user presses a corresponding entity key; the first input may also be a combined operation of simultaneously pressing a plurality of physical keys.
Third, the first input may appear as a voice input.
In this embodiment, the terminal may trigger the start of application a upon receiving a voice such as "start application a".
Of course, in other embodiments, the first input may also take other forms, including but not limited to a somatosensory gesture input, etc., which may be specifically determined according to actual needs, which is not limited by the embodiment of the present application.
Step 120, the terminal a responds to the first input to display a target mask layer, wherein the target mask layer is used for shielding an application interface corresponding to a target application icon;
In this step, the target mask may be represented as a translucent layer, or as an application lock state, or may be represented in other forms to mask the application interface corresponding to the target application icon.
It can be understood that, in the related art, after the user clicks the target application icon, the terminal will automatically display the application interface corresponding to the target application icon, which in some cases easily causes privacy disclosure of the user.
In the application, the target mask layer is arranged to shield the application interface corresponding to the target application icon, and after clicking the target application icon, the user cannot directly refer to the application interface corresponding to the target application icon, so that the privacy of the user can be effectively protected.
In some embodiments, step 120 includes displaying the application interface in response to the first input, and overlaying a target mask over a layer of the application interface, the target mask being a semi-transparent barrier mask.
In this embodiment, the target mask layer is a semitransparent mask layer that is superimposed over the layer where the application interface is located and covers the layer of the application interface, as shown in fig. 3, where the mask layer may mask the content of the application interface, and in the case that the target mask layer is displayed, the user cannot clearly refer to the content of the application interface.
For example, the user clicks an application icon a corresponding to a social application a among a plurality of applications installed on the terminal a to implement a first input, and the terminal responds to the first input to display a target mask layer as shown in fig. 3, and below the target mask layer, a layer corresponding to an application interface of the application a is displayed.
According to the information display method provided by the embodiment of the application, the semitransparent shielding cover layer is overlapped and displayed above the image layer of the application interface corresponding to the target application icon, so that the content of the application interface can be effectively hidden, and the information leakage of a user can be prevented.
Of course, in other embodiments, the user clicks the application icon a on the terminal a, and the terminal may also display an application lock interface, where the application lock interface is used to mask the application interface of the application program a, that is, in the application lock interface, the user cannot refer to the application interface of the application program a.
130, Receiving a second input of a user to a target mask layer by the terminal A;
in this step, the second input is used to trigger a verification operation.
The second input may be represented by the same touch input, physical key input, voice input, somatosensory gesture input, and the like as the first input, which are not described in detail herein.
In this embodiment, the verification operation is used for the terminal a to confirm whether to eliminate the target mask layer and clearly display the application interface corresponding to the target application icon.
For example, the user may implement the second input by clicking on any location on the target mask; or the user may implement the second input by inputting the target graphic on the target mask layer; or the user may also implement the second input by executing the target sliding rule on the target mask. The specific implementation process will be described in the following embodiments, and will not be described herein.
It should be noted that, for the second input with a different expression, the corresponding verification operation in step 140 is also different.
Step 140, in response to the second input, displaying an application interface in case the verification is passed.
In this step, the application interface is an application interface of an application program corresponding to the target application icon, and on the application interface, the user may refer to the history information and may perform other man-machine interaction operations, such as sending information to the opposite terminal.
It can be understood that different application programs correspond to different application interfaces, but any application program corresponds to an application interface including history information of a user.
For example, the application interface corresponding to the social application program may be a chat interface and an address book interface, where the application interface includes historical chat information and friend information of the user; the application interfaces corresponding to the video application programs can be video playing interfaces and attention interfaces, and the application interfaces comprise historical browsing information, consumption information and the like of users; the application interface corresponding to the shopping application program can be a home page recommendation interface, a history browsing interface and the like, and the application interface comprises history purchase information, consumption information and the like of a user.
An application interface for a social class application a is shown in fig. 7, and includes historical chat information of a user, such as chat objects of the user and chat records between the user and each chat object.
In the actual execution process, after the user transfers the information of the application program a stored in the terminal a to the terminal B, the user clicks the application icon a on the terminal a again, and the terminal a superimposes and displays a target mask layer on the application interface layer shown in fig. 7 to form a display interface shown in fig. 3, under which the user cannot clearly refer to the chat object and the chat record on the application program a.
The user performs the second input on the target mask layer shown in fig. 3, the terminal a responds to the second input, and performs the verification operation by adopting different verification modes based on the second input in different forms, and in the case that the verification is passed, the target mask layer is eliminated, and the application interface shown in fig. 7 is redisplayed.
According to the information display method provided by the embodiment of the application, the target mask layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being revealed, and the privacy of a user can be better protected; in addition, through verification operation, the target mask layer is eliminated under the condition that verification is passed, the application interface is displayed, the reliability and the flexibility of verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
The verification operation of the present application will be specifically described from three implementation points of view.
1. And verifying by scanning the two-dimensional code.
In some embodiments, step 140 comprises:
The terminal A responds to the second input and controls the camera to acquire information of a target image displayed on the second electronic equipment;
and displaying an application interface when the information of the target image is consistent with the target verification information.
The second electronic device is the terminal B described above.
The target image is an image generated by and displayed on the terminal B, corresponding to the target application icon.
It can be understood that different application icons correspond to different images, and the images carry information of application programs corresponding to the application icons.
The target image is an image corresponding to a target application icon to be referred by a user, and the target image contains information for verification operation.
For example, the target image may be a two-dimensional code or a bar code.
The target authentication information is used for performing an authentication operation.
It should be noted that the target verification information is different for different verification modes. For example, in the case of passing the two-dimensional code verification, the target verification information may include the device numbers of the terminal a and the terminal B, the identification of the application program corresponding to the target application icon, and the like.
For example, the target authentication information may be "xxx_yyy_com.xxx.xxx", where xxx denotes a device number of the terminal a, yyy denotes a device number of the terminal B, and com.xxx.xxx identifies a target packet name indicating that information in the application a in the terminal B with the device number yyy is transmitted from the terminal a with the device number xxx.
The target verification information is stored in the terminal A in advance and is sent to the terminal B through the terminal A. The generation manner of the target verification information will be described in the following embodiments, and will not be described herein.
In the actual execution process, the terminal A starts and scans the target image displayed on the terminal B by controlling a camera arranged on the terminal A so as to generate information corresponding to the target image.
After generating the information corresponding to the target image, the terminal A compares the information with target verification information stored in the terminal A, and determines that verification is passed under the condition that the information in the target image is consistent with the target verification information, eliminates a target mask layer and displays an application interface.
For example, after the user completes the machine-changing operation and transfers the chat record on the application program a of the terminal a to the terminal B, the user clicks the application icon a on the terminal a to implement the first input, and the terminal a responds to the first input to display a semitransparent target mask layer in a superimposed manner on the layer displaying the application interface of the application program a.
At this time, the user cannot directly operate the application interface of the application program a, and cannot clearly see the content on the application interface.
In the case that the user needs to remove the target mask, a verification operation is required first.
For example, the user may open the exchange software on the terminal B, generate a two-dimensional code corresponding to the application program a based on the target authentication information stored in the terminal B using the exchange software, and display the two-dimensional code on the terminal B. The two-dimensional code carries the device number of the terminal a, the device number of the terminal B, and identification information corresponding to the application program a, such as "xxx_yy_com.
The user clicks any position of the target mask layer on the terminal a to realize the second input, and the terminal a starts a rectangular frame as shown in fig. 4 in the target mask layer and starts the camera in response to the second input.
The user scans the rectangular frame aiming at the two-dimensional code displayed on the terminal B so as to acquire the information carried by the two-dimensional code.
If the scanned information is "xxx_yy_com_xxx, and the terminal a compares the scanned information with the target verification information to determine that the scanned information and the target verification information are the same, the target mask layer is removed after verification is passed, and an application interface shown in fig. 7 is displayed.
Of course, in other embodiments, the terminal a may also directly jump to the shooting interface to collect the image information in response to the second input, which is not limited by the present application.
According to the information display method provided by the embodiment of the application, the verification operation is performed by scanning the two-dimensional code, so that the verification step is effectively simplified, the verification operation is simple and quick, and the use experience of a user is improved.
2. By performing a specific sliding rule verification.
In some embodiments, step 140 comprises:
The terminal A responds to the second input, and generates first information under the condition that the second input is a target input;
Transmitting the first information to the second electronic device;
receiving second information sent by second electronic equipment, wherein the second information is generated by the second electronic equipment under the condition that the first information is matched with target verification information;
in response to the second information, an application interface is displayed.
In this embodiment, the second electronic device is terminal B as described above.
The target input is a preset sliding rule, and the target input can be customized based on a user.
For example, the target input may appear to slide up and down multiple times within a target period, or may appear to slide on a target mask in accordance with a target pattern, such as in a "zig-zag" manner; or may also be expressed as other sliding rules, the application is not limited.
In case the second input of the user is consistent with the preset sliding rule, the terminal a generates the first information.
In this embodiment, the first information is target authentication information generated by terminal a after encryption.
The target verification information is sent to the terminal B by the terminal A and is stored in the terminal A and the terminal B in advance respectively.
Also, the target authentication information is different for different authentication modes. For example, in the case of verification by performing a specific sliding rule, the target verification information may include the device numbers of the terminal a and the terminal B, the identification of the application program corresponding to the target application icon, and the like.
For example, the target authentication information may be "xxx_yyy_com.xxx.xxx", where xxx denotes a device number of the terminal a, yyy denotes a device number of the terminal B, and com.xxx.xxx identifies a target packet name indicating that information in the application a in the terminal B with the device number yyy is transmitted from the terminal a with the device number xxx.
After generating the first information, the terminal a broadcasts the first information to four sides.
For example, the broadcast may be over a wireless network, such as bluetooth or WIFI, or the like.
After the terminal B receives the first information, decrypting the first information, comparing the decrypted first information with the target verification information stored in the terminal B, determining that verification is successful when the decrypted first information is consistent with the target verification information, generating second information, and transmitting the second information to the terminal a.
The second information is generated by the terminal B and is used for representing information of successful verification.
And the terminal A receives the second information, removes the target mask layer in response to the second information, and displays the application interface.
For example, in the actual execution process, the user slides up and down 5 times on the target mask layer on the application interface of the application program a of the terminal a shown in fig. 3, so as to implement the second input.
And comparing the second input with a sliding rule preset by a user, and encrypting target verification information 'xxx_yy_com.xxx.xxx' corresponding to the application program A stored in the terminal A under the condition that the second input is consistent with the sliding rule preset by the user by the terminal A so as to generate first information, and broadcasting the first information through WIFI.
At least one terminal such as terminal B, terminal C, terminal D and the like under the same WIFI receives the first information, decrypts the first information, and compares the decrypted first information with target verification information stored in the local terminal.
And after comparing, the terminal C and the terminal D confirm that the first information is not matched with the target verification information stored in the local terminal, and confirm that the verification is not passed, and end the verification.
And after comparing, the terminal B confirms that the first information is matched with the target verification information stored in the local terminal, and if the verification is confirmed to pass, the terminal B generates second information and returns the second information to the terminal A.
After receiving the second information for confirming the passing of verification, the terminal A determines that the verification is successful, and removes the target mask layer to display a clear application interface of the application program A shown in FIG. 7.
According to the information display method provided by the embodiment of the application, the operation steps of a user can be further reduced by executing the specific sliding rule for verification, and the rapidness and the sensitivity of verification operation are improved; the problem that verification operation cannot be performed because the terminal B is not at the hand of a user is solved, and the method has higher universality and convenience.
3. By entering graphical verification.
In some embodiments, the second input is for inputting first information, the target authentication information includes first sub-authentication information and second sub-authentication information, and in response to the second input, step 140 includes:
the terminal A responds to the second input, and sends the first information to the second electronic equipment under the condition that the first information is consistent with the first sub-verification information;
Receiving second information sent by second electronic equipment, wherein the second information is generated under the condition that the second electronic equipment passes verification;
In the case where the second information includes the first sub-authentication information and the second sub-authentication information, the application interface is displayed.
In this embodiment, the second electronic device is terminal B as described above.
The first information is information input by a user.
The first information may be represented as any one of a pair of keys and a key, or may be represented as any one of a pair of preset graphic combinations, or may be represented in other forms, which are not limited herein.
The second information is information of target authentication stored in the terminal B.
Wherein, the second information and the expression form of the first information should have a corresponding relation. For example: in the case where the first information is a key, the second information may be information including the key and the key; in the case where the first information is one of a pair of preset graphic combinations, the second information may be the preset graphic combination.
Likewise, the target authentication information is transmitted from the terminal a to the terminal B and is stored in the terminal a and the terminal B, respectively, in advance.
The target authentication information is different for different authentication modes. For example, in the case of passing the input graphic authentication, the target authentication information may be represented as a pair of keys and keys, or may be represented as a pair of preset graphic combinations.
In this embodiment, the target verification information may be user-defined based on the user.
It should be noted that, before the second electronic device generates the second information, the received first information needs to be verified.
In the actual execution process, after receiving the first information, the terminal B compares the first information with the target verification information stored in the terminal B, and if the first information matches with the target verification information stored in the terminal B, the verification interface is displayed to receive the fifth input of the user.
Wherein the fifth input is for inputting third information.
The fifth input may be represented by the same touch input, physical key input, voice input, somatosensory gesture input, etc. as the first input, which is not described in detail herein.
The expression form of the third information is the same as that of the first information, and in the case that the first information is a key, the third information can be the key; or in the case where the first information is one of a pair of preset graphic combinations, the third information may be the other of the pair of preset graphic combinations.
After receiving the fifth input of the user, the terminal B compares the third information with the target authentication information stored in the terminal B in response to the fifth input.
The terminal B generates the second information in case it is determined that the third information matches the target authentication information stored in the terminal B.
The second information is the target verification information stored in the terminal B.
It can be understood that the stored target verification information is the same between terminals with pairing relation; the stored target verification information is different between terminals without pairing relation.
After receiving the second information sent by the terminal B, the terminal a compares the second information with the target verification information stored in the terminal a, and if the second information and the target verification information are the same, the terminal a confirms that the verification is passed.
Or if the verification is confirmed to be not passed, the target mask layer is kept to be displayed.
According to the information display method provided by the embodiment, the interest and the playability of the verification operation can be improved by inputting the graph for verification, so that the use experience of a user can be improved.
The implementation process of the above embodiment will be described below by taking the target verification information as an example of a pair of preset graphic combinations.
In some embodiments, the target verification information is a pair of preset graphic combinations, where it is to be noted that the target verification information in the terminals with the matching relationship is the same, for example, the first sub-verification information and the second sub-verification information stored in the terminal a and the terminal B are the same, respectively.
The target authentication information in each terminal having no matching relationship is different from each other, for example, in the case where the terminal a and the terminal C have no matching relationship, at least one of the first sub-authentication information and the second sub-authentication information stored in the terminal a and the terminal C is different.
In the actual execution, the user inputs the first information through the second input.
The terminal a compares the first information with the target authentication information stored in the terminal a, and if the first information matches the first sub-authentication information, confirms that the authentication is passed, and broadcasts the first information to the terminal B.
After receiving the first information, the terminal B compares the first information with the target authentication information stored in the terminal B, confirms the authentication to pass in the case where the first information is identical to the first sub-authentication information in the target authentication information stored in the terminal B, displays an authentication interface to receive a fifth input of the user,
Wherein the fifth input is for inputting third information.
The fifth input may be represented by the same touch input, physical key input, voice input, somatosensory gesture input, etc. as the first input, which is not described in detail herein.
After receiving the fifth input of the user, the terminal B compares the third information with the second sub-authentication information in the target authentication information stored in the terminal B in response to the fifth input.
In the case that the third information is determined to be identical to the second sub-authentication information, the second information is generated.
The second information is the same as the target verification information stored in the terminal B, and includes first sub-verification information and second sub-verification information stored in the terminal B.
After the terminal B generates the second information, the second information is transmitted to the terminal a.
And the terminal A receives the second information, compares the first sub-verification information and the second sub-verification information in the second information with the first sub-verification information and the second sub-verification information stored in the terminal A respectively, and if the first sub-verification information and the second sub-verification information are the same, the terminal A determines that the verification is passed, removes the target mask layer and displays the application interface.
For example, the user sets target authentication information in advance in the terminal a, such as a pair of combined figures in which the target authentication information is set to "circle+triangle", before making a change, and the terminal a stores the target authentication information in the terminal a.
In the process of changing the machine, the terminal sends the target verification information and the information to be transferred to the terminal B, and the terminal B stores the information.
When a user needs to consult the history information corresponding to the application program A on the terminal A, the user clicks the application icon A on the terminal A to realize the first input, and the terminal A responds to the first input and displays a semitransparent target mask layer in a superposition manner on the layer of the application interface displaying the application program A.
At this time, the user cannot directly operate the application interface of the application program a, and cannot clearly see the content on the application interface.
The user draws a triangle graphic as shown in fig. 5 on the target mask layer to implement the second input.
Terminal a compares the triangle pattern with the first sub-authentication information stored in terminal a in response to the second input, and if it is recognized that both are triangles, it determines that the authentication is passed, and broadcasts the triangle pattern to terminal B.
The broadcasting manner is the same as that of the foregoing embodiment, and may be broadcast through bluetooth or a wireless network, which is not described herein.
And the terminal B receives the broadcast, compares the triangle graph carried in the broadcast with the first sub-verification information stored in the terminal B, and displays a verification interface if the triangle graph and the first sub-verification information are confirmed to pass verification under the condition that the triangle graph and the first sub-verification information are recognized to be both triangles.
At this time, the user draws a circle as shown in fig. 6 at the authentication interface of the terminal B to realize a fifth input.
The terminal B determines a circle as third information in response to the fifth input, and compares the third information with second sub-authentication information stored in the terminal B. If both are circular, the terminal B confirms that the verification is passed, and transmits the pair of combined patterns of the target verification information "circular+triangle" stored in the terminal B as second information to the terminal a.
The users corresponding to the terminal B and the terminal a may be the same user, or may be different users.
After receiving the second information, the terminal A compares the second information with target verification information stored in the terminal A, and when a group of graphs with both being 'round+triangle' are identified, the terminal A determines that verification is passed, removes the target mask layer and displays a clear application interface of the application program A.
At this time, the user can refer to the history information on the application a on the terminal a and perform other operations such as information transmission and the like.
According to the information display method provided by the embodiment, by setting the target verification information as a group of graphs, verification passing is confirmed only under the condition that both the terminal A and the terminal B pass the graph verification, so that the reliability of verification operation is improved, and the privacy of the information is ensured; the interestingness and playability of the user in the human-computer interaction process are enhanced, and the use experience of the user is improved.
It should be noted that, in the process of changing the machine of the user, the information in the terminal a needs to be transferred to the terminal B first, and then, according to some embodiments of the present application, before step 110, the method further includes:
receiving a third input from the user;
responding to the third input, generating a target information packet corresponding to the target application icon, and sending the target information packet to the second electronic equipment, wherein the target information packet comprises: information to be transferred and target verification information.
It will be appreciated that the user may open the exchange software during normal operation of terminal a.
In some embodiments, the swap software may be a specific application program installed on terminal a for performing a swap operation; in other embodiments, the change software may be a target application that has data transfer functionality on its own.
In the above embodiment, the third input is used to initiate the information transfer operation.
The third input may be represented by the same touch input, physical key input, voice input, somatosensory gesture input, etc. as the first input, which is not described in detail herein.
The second electronic device is the terminal B as described above.
The information to be transferred is the history information of the application program corresponding to the target application icon, such as chat record or application data, stored on the terminal A.
The target verification information may be automatically generated for the terminal or may be user-defined.
As described above, the target authentication information differs for different authentication modes. For example, in the case of passing two-dimensional code authentication, the target authentication information may be the device numbers of terminal a and terminal B; or in the case of passing the input graphic verification, the target verification information may be a pair of preset graphics; or in the case of verification by performing a specific sliding rule, the target verification information may be text information or the like.
In the actual execution process, when the user needs to transfer the information (including the chat object, the chat record, and the like) on the social application program a in the terminal a to the terminal B, the user can implement the third input by clicking the machine changing software in the terminal a, so as to transfer the history information in the application program a in the terminal a to the terminal B.
In the case of two-dimensional code authentication, terminal a responds to the third input to generate a target packet including target authentication information and information to be transferred.
The information to be transferred includes history information in the application program a, and the target verification information includes a device number of the terminal a, a device number of the terminal B, and an identifier corresponding to the target application program, for example: xxx_yyy_com.xxx, wherein xxx represents the device number of terminal a, yyy represents the device number of terminal B, and com.xxx.xxx identifies the destination packet name for indicating that the data in application a in terminal B with device number yyy is transmitted from terminal a with device number xxx.
In other embodiments, in the case of verification by the input graphic, the third input further includes a first sub-input for initiating an information transfer operation and a second sub-input for inputting the target graphic.
For example, the user clicks on the exchange software in the terminal a to implement a first sub-input for migrating the history information in the application a in the terminal a to the terminal B.
The user realizes the second sub-input by entering a target graphic, such as "triangle + circle", on the screen.
Terminal a determines the target graphic as target authentication information in response to the second sub-input.
The terminal A responds to the first sub-input, generates a target information packet comprising target verification information and information to be transferred, and sends the target information packet to the terminal B.
The information to be transferred comprises history information in the application program A, and the target verification information comprises a pair of target graphs of triangle and circle.
In still other embodiments, the third input further includes a third sub-input for initiating an information transfer operation and a fourth sub-input for determining a target input in the event that a particular sliding rule validation is performed.
The target input is a sliding rule preset by a user. The sliding is performed for 5 times up and down, or a five-pointed star is drawn, or other sliding rules can be adopted, and the application is not limited.
For example, the user determines the target input to be slid up and down a plurality of times by making a plurality of slides on the screen to realize the fourth sub-input.
The user clicks the machine changing software in the terminal a to realize a third sub-input, and the third sub-input is used for migrating the history information in the application program a in the terminal a to the terminal B.
The terminal A responds to the third sub-input to generate a target information packet comprising target verification information and information to be transferred, wherein the information to be transferred comprises history information in the application program A, and the target verification information comprises the equipment number of the terminal A, the equipment number of the terminal B and an identifier corresponding to the target application program, such as: xxx_yyy_com.xxx, wherein xxx represents the device number of terminal a, yyy represents the device number of terminal B, and com.xxx.xxx identifies the destination packet name for indicating that the data in application a in terminal B with device number yyy is transmitted from terminal a with device number xxx.
According to the information display method provided by the embodiment of the application, in the process of information transfer, the target verification information is set so that the subsequent verification operation can be smoothly carried out, thereby being beneficial to preventing information leakage and improving the privacy of the information.
It should be noted that, in the information display method provided in the embodiment of the present application, the execution body may be an information display device, or a control module for executing the information display method in the information display device. In the embodiment of the present application, a method for executing information display by an information display device is taken as an example, and the information display device provided by the embodiment of the present application is described.
The embodiment of the application also provides an information display device which is applied to the first electronic equipment, namely the terminal A.
As shown in fig. 8, the information display device includes: the first receiving module 810, the first display module 820, the second receiving module 830, and the second display module 840.
A first receiving module 810, configured to receive a first input of a target application icon from a user;
a first display module 820, configured to display, in response to a first input, a target mask, where the target mask is configured to mask an application interface corresponding to a target application icon;
a second receiving module 830, configured to receive a second input of a target mask by a user;
a second display module 840 for displaying an application interface in response to the second input in case the verification is passed.
According to the information display device provided by the embodiment of the application, the target mask layer is displayed on the application interface corresponding to the target application icon, so that the application interface corresponding to the target application icon can be effectively shielded, information in the application interface is prevented from being revealed, and the privacy of a user can be better protected; in addition, through verification operation, the target mask layer is eliminated under the condition that verification is passed, the application interface is displayed, the reliability and the flexibility of verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
In some embodiments, the first display module 820 is further configured to: in response to the first input, displaying an application interface, and overlaying a target skin over a layer of the application interface, the target skin being a semi-transparent barrier skin.
In some embodiments, the apparatus further comprises a fourth receiving module,
The fourth receiving module is used for responding to the second input and controlling the camera to acquire information of a target image displayed on the second electronic equipment;
The second display module 840 is further configured to: and displaying an application interface when the information of the target image is consistent with the target verification information.
In some embodiments, the apparatus further comprises: the device comprises a second processing module, a second sending module and a fifth receiving module;
the second processing module is used for responding to the second input and generating first information under the condition that the second input is a target input;
the second sending module is used for sending the first information to the second electronic equipment;
The fifth receiving module is used for receiving second information sent by the second electronic equipment, wherein the second information is generated by the second electronic equipment under the condition that the first information is matched with the target verification information;
the second display module 840 is further configured to: in response to the second information, an application interface is displayed.
In some embodiments, the second input is for inputting first information, the target authentication information includes first sub-authentication information and second sub-authentication information, the apparatus further comprising: a third transmitting module and a sixth receiving module;
The third sending module is used for responding to the second input and sending the first information to the second electronic equipment under the condition that the first information is consistent with the first sub-verification information;
the sixth receiving module is used for receiving second information sent by the second electronic equipment, wherein the second information is generated under the condition that the second electronic equipment passes verification;
The second display module 840 is further configured to: in the case where the second information includes the first sub-authentication information and the second sub-authentication information, the application interface is displayed.
In some embodiments, the apparatus further comprises:
a seventh receiving module, configured to receive a third input of the user before receiving the first input of the target application icon by the user;
The third processing module is configured to generate a target information packet corresponding to the target application icon in response to the third input, and send the target information packet to the second electronic device, where the target information packet includes: information to be transferred and target verification information.
The information display device in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in a terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), etc., and the non-mobile electronic device may be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a Television (TV), a teller machine, a self-service machine, etc., and the embodiments of the present application are not limited in particular.
The information display device in the embodiment of the application may be a device having an operating system. The operating system may be an Android operating system, an IOS operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The information display device provided by the embodiment of the present application can implement each process implemented by the embodiments of the methods of fig. 1 and fig. 3 to fig. 7, and in order to avoid repetition, a detailed description is omitted here.
The embodiment of the application also provides a verification method.
The execution subject of the verification method can be a terminal, including but not limited to a mobile terminal such as a mobile phone, a notebook computer, a camera, a vehicle-mounted electronic device, a watch and the like, a non-mobile terminal such as a desktop computer and the like, or a control device of the terminal and the like.
The authentication method is applied to the second electronic device, i.e. terminal B as described above.
As shown in fig. 2, the verification method includes: step 210, step 220 and step 230.
Step 210, a terminal B receives first information sent by first electronic equipment;
In this step, the first electronic device is terminal a.
The first information is information sent to the terminal B by the terminal A, and the first information can be target verification information generated by the terminal A after encryption; or the first information may also be information input by the user to the terminal a.
It will be appreciated that the first information may be presented differently in different ways of verification. In the following embodiments, the representation will be described from different angles, and will not be described in detail herein.
Step 220, the terminal B generates second information under the condition that the verification is passed;
In this step, the terminal B receives the first information and compares the first information with the target authentication information stored in the terminal B, and generates second information in the case of passing the authentication.
The second information may be represented as information for characterizing the success of authentication, or may be represented as target authentication information stored in the terminal B.
Also, the second information is presented differently in different verification modes.
The target authentication information is information that is transmitted from the terminal a to the terminal B and is stored in the terminal B in advance for performing an authentication operation.
The target authentication information is different for different authentication modes.
For example, in the case of verification by performing a specific sliding rule, the target verification information may include the device numbers of the terminal a and the terminal B, the identification of the application program corresponding to the target application icon, and the like.
Or in the case of verification by inputting a graphic, the target verification information may be a pair of graphics, such as "triangle+circle", preset in advance by the user.
Step 230, the terminal B sends the second information to the first electronic device.
In this step, in the case where the terminal B determines that the authentication is successful, the second information is transmitted to the terminal a.
According to the different manifestations of the second information, terminal a performs different operations to execute step 140. And will not be described in detail herein.
According to the verification method provided by the embodiment of the application, the verification operation is realized through the information interaction between the terminal A and the terminal B, so that the problem that the verification operation cannot be performed because the terminal B is not at the hand of a user is solved, and the universality and the convenience are higher.
The verification method of this embodiment will be described below from two implementation points of view, respectively.
1. By performing a specific sliding rule verification.
In some embodiments, step 220 comprises: the terminal B generates second information in the case where the first information coincides with the target authentication information.
In this embodiment, the second information is information for characterizing the success of the verification.
In the actual execution process, after the terminal B receives the first information, the first information is decrypted, the decrypted first information is compared with target verification information stored in the terminal B, verification success is determined under the condition that the decrypted first information is consistent with the target verification information, second information is generated, and the second information is sent to the terminal A.
According to the verification method provided by the embodiment of the application, the operation steps of a user can be further reduced by executing the specific sliding rule for verification, and the rapidness and the sensitivity of verification operation are improved; the problem that verification operation cannot be performed because the terminal B is not at the hand of a user is solved, and the method has higher universality and convenience.
2. By entering graphical verification.
In some embodiments, the target authentication information includes first sub-authentication information and second sub-authentication information, step 220 comprising:
the terminal B displays a verification interface under the condition that the first information is first sub-verification information;
Receiving a fifth input of a user to the verification interface, wherein the fifth input is used for inputting third information;
In response to the fifth input, in case the third information is the second sub-authentication information, the second information is generated.
In this embodiment, the second information is target authentication information stored in the terminal B.
In the actual execution process, the terminal a compares the first information with the target authentication information stored in the terminal a, and if the first information matches the first sub-authentication information, confirms that the authentication is passed, and broadcasts the first information to the terminal B.
After receiving the first information, the terminal B compares the first information with the target authentication information stored in the terminal B, confirms the authentication to pass in the case where the first information is identical to the first sub-authentication information in the target authentication information stored in the terminal B, displays an authentication interface to receive a fifth input of the user,
Wherein the fifth input is for inputting third information.
The fifth input may be represented by the same touch input, physical key input, voice input, somatosensory gesture input, etc. as the first input, which is not described in detail herein.
After receiving the fifth input of the user, the terminal B compares the third information with the second sub-authentication information in the target authentication information stored in the terminal B in response to the fifth input.
In the case that the third information is determined to be identical to the second sub-authentication information, the second information is generated.
The second information is the same as the target verification information stored in the terminal B, and includes first sub-verification information and second sub-verification information stored in the terminal B.
After the terminal B generates the second information, the second information is transmitted to the terminal a.
According to the verification method provided by the embodiment of the application, the interest and the playability of verification operation can be improved by inputting the graph for verification, so that the use experience of a user can be improved.
The embodiment of the application also provides a verification device which is applied to the second electronic equipment, namely the terminal B.
As shown in fig. 9, the authentication apparatus includes: a third receiving module 910, a first processing module 920, and a first transmitting module 930.
A third receiving module 910, configured to receive the first information sent by the first electronic device;
A first processing module 920, configured to generate second information if the verification passes;
the first sending module 930 is configured to send the second information to the first electronic device.
According to the verification device provided by the embodiment of the application, the verification operation is realized through the information interaction between the terminal A and the terminal B, so that the problem that the verification operation cannot be performed because the terminal B is not at the hand of a user is solved, and the device has higher universality and convenience.
In some embodiments, the first processing module 920 is further configured to: in the case where the first information is identical to the target authentication information, second information is generated.
In some embodiments, the target authentication information includes first sub-authentication information and second sub-authentication information, the apparatus further comprising: a third display module and an eighth receiving module;
the third display module is used for displaying a verification interface when the first information is the first sub-verification information;
the eighth receiving module is used for receiving a fifth input of the user to the verification interface, wherein the fifth input is used for inputting third information;
The first processing module 920 is further configured to: in response to the fifth input, in case the third information is the second sub-authentication information, the second information is generated.
The verification device in the embodiment of the application can be a device, and can also be a component, an integrated circuit or a chip in the terminal. The device may be a mobile electronic device or a non-mobile electronic device. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), etc., and the non-mobile electronic device may be a server, a network attached storage (Network Attached Storage, NAS), a personal computer (personal computer, PC), a Television (TV), a teller machine, a self-service machine, etc., and the embodiments of the present application are not limited in particular.
The verification device in the embodiment of the application can be a device with an operating system. The operating system may be an Android operating system, an IOS operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The verification device provided by the embodiment of the present application can implement each process implemented by the embodiments of the methods of fig. 2 to 7, and in order to avoid repetition, a description is omitted here.
Optionally, as shown in fig. 10, an embodiment of the present application further provides an electronic device 1000, including a processor 1001, a memory 1002, and a program or an instruction stored in the memory 1002 and capable of running on the processor 1001, where the program or the instruction implements each process of the above embodiment of the information display method or the verification method when executed by the processor 1001, and the same technical effects can be achieved, and for avoiding repetition, a detailed description is omitted herein.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device.
Fig. 11 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 1100 includes, but is not limited to: radio frequency unit 1101, network module 1102, audio output unit 1103, input unit 1104, sensor 1105, display unit 1106, user input unit 1107, interface unit 1108, memory 1109, and processor 1110.
Those skilled in the art will appreciate that the electronic device 1100 may further include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 1110 by a power management system, such as to perform functions such as managing charging, discharging, and power consumption by the power management system. The electronic device structure shown in fig. 11 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than illustrated, or may combine some components, or may be arranged in different components, which are not described in detail herein.
Wherein, the user input unit 1107 is configured to receive a first input of a target application icon from a user;
a display unit 1106, configured to respond to the first input, and display a target mask, where the target mask is used to mask an application interface corresponding to the target application icon;
A user input unit 1107 for receiving a second input of a target mask by a user;
the display unit 1106 is further configured to display an application interface in response to the second input in case the verification is passed.
According to the electronic equipment provided by the embodiment of the application, the application interface corresponding to the target application icon can be effectively shielded by displaying the target mask layer on the application interface corresponding to the target application icon, so that information in the application interface is prevented from being revealed, and the privacy of a user can be better protected; in addition, through verification operation, the target mask layer is eliminated under the condition that verification is passed, the application interface is displayed, the reliability and the flexibility of verification are improved, the man-machine interaction is enhanced, and the use experience of a user is improved.
Optionally, the display unit 1106 is further configured to: in response to the first input, displaying an application interface, and overlaying a target skin over a layer of the application interface, the target skin being a semi-transparent barrier skin.
Alternatively, the process may be carried out in a single-stage,
An input unit 1104 for controlling the camera to acquire information of a target image displayed on the second electronic device in response to the second input;
the display unit 1106 is further configured to: and displaying an application interface when the information of the target image is consistent with the target verification information.
Alternatively, the process may be carried out in a single-stage,
A processor 1110 for generating first information in response to the second input, if the second input is a target input;
a network module 1102, configured to send first information to a second electronic device;
the input unit 1104 is further configured to receive second information sent by the second electronic device, where the second information is generated by the second electronic device when the first information matches the target verification information;
The display unit 1106 is further configured to: in response to the second information, an application interface is displayed.
Optionally, the second input is for inputting first information, the target authentication information comprises first sub-authentication information and second sub-authentication information,
The network module 1102 is further configured to send, in response to the second input, the first information to the second electronic device if the first information is consistent with the first sub-verification information;
an input unit 1104, configured to receive second information sent by a second electronic device, where the second information is generated when the second electronic device passes the verification;
The display unit 1106 is further configured to: in the case where the second information includes the first sub-authentication information and the second sub-authentication information, the application interface is displayed.
Alternatively, the process may be carried out in a single-stage,
The user input unit 1107 is further configured to receive a third input of the user before receiving the first input of the target application icon by the user;
the processor 1110 is further configured to generate, in response to the third input, a target packet corresponding to the target application icon, and send the target packet to the second electronic device, where the target packet includes: information to be transferred and target verification information.
According to the electronic equipment provided by the embodiment of the application, the verification operation is realized by providing different verification modes, so that the flexibility and the interestingness of man-machine interaction are obviously improved, the operation steps of a user are simplified, and the use experience of the user is improved.
Or alternatively
An input unit 1104 for receiving first information transmitted by the first electronic device;
A processor 1110 for generating second information in case of verification passing;
The network module 1102 is configured to send the second information to the first electronic device.
According to the electronic equipment provided by the embodiment of the application, the verification operation is realized through the information interaction between the terminal A and the terminal B, so that the problem that the verification operation cannot be performed because the terminal B is not at the hand of a user is solved, and the electronic equipment has higher universality and convenience.
Optionally, the processor 1110 is further configured to: in the case where the first information is identical to the target authentication information, second information is generated.
Optionally, the target authentication information includes first sub-authentication information and second sub-authentication information,
A display unit 1106, configured to display a verification interface when the first information is first sub-verification information;
The user input unit 1107 is further configured to receive a fifth input of the authentication interface from the user, where the fifth input is used to input third information;
Processor 1110 is further configured to: in response to the fifth input, in case the third information is the second sub-authentication information, the second information is generated.
According to the electronic equipment provided by the embodiment of the application, the verification operation is realized by providing different verification modes, so that the flexibility and the interestingness of man-machine interaction are obviously improved, the operation steps of a user are simplified, and the use experience of the user is improved.
It should be appreciated that in embodiments of the present application, the input unit 1104 may include a graphics processor (Graphics Processing Unit, GPU) 11041 and a microphone 11042, the graphics processor 11041 processing image data of still pictures or video obtained by an image capture device (e.g., a camera) in a video capture mode or an image capture mode. The display unit 1106 may include a display panel 11061, and the display panel 11061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 1107 includes a touch panel 11071 and other input devices 11072. The touch panel 11071 is also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 11072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein. Memory 1109 may be used to store software programs as well as various data including, but not limited to, application programs and an operating system. The processor 1110 may integrate an application processor that primarily processes operating systems, user interfaces, applications, etc., with a modem processor that primarily processes wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 1110.
The embodiment of the application also provides a readable storage medium, on which a program or an instruction is stored, which when executed by a processor, implements each process of the above information display method or the verification method embodiment, and can achieve the same technical effect, so that repetition is avoided, and no further description is provided herein.
Wherein the processor is a processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium such as a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk or an optical disk, and the like.
The embodiment of the application further provides a chip, the chip comprises a processor and a communication interface, the communication interface is coupled with the processor, the processor is used for running a program or instructions, the processes of the information display method or the verification method embodiment can be realized, the same technical effect can be achieved, and the repetition is avoided, and the description is omitted here.
It should be understood that the chips referred to in the embodiments of the present application may also be referred to as system-on-chip chips, chip systems, or system-on-chip chips, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.
Claims (4)
1. An information display method applied to a first electronic device is characterized by comprising the following steps:
receiving a third input from the user;
Responding to the third input, generating a target information packet corresponding to the target application icon, and sending the target information packet to the second electronic equipment, wherein the target information packet comprises: information to be transferred and target verification information; the target verification information comprises first sub-verification information and second sub-verification information;
receiving a first input of a user to the target application icon;
responding to the first input, displaying a target mask layer, wherein the target mask layer is used for shielding an application interface corresponding to the target application icon;
receiving a second input of a user to the target mask; the second input is used for inputting first information;
In response to the second input, sending the first information to a second electronic device if the first information is consistent with the first sub-authentication information;
Receiving second information sent by the second electronic equipment, wherein the second information is generated when the second electronic equipment responds to a fifth input of a user to a verification interface and third information input by the fifth input is the second sub-verification information;
And displaying the application interface under the condition that the second information comprises the first sub-verification information and the second sub-verification information.
2. An authentication method applied to a second electronic device, comprising:
Receiving a target information packet corresponding to a target application icon generated by the first electronic device in response to third input of a user, wherein the target information packet comprises: the information to be transferred and target verification information, wherein the target verification information comprises first sub-verification information and second sub-verification information;
Receiving first information sent by first electronic equipment, wherein the first information is information input by a second input of a user to the target mask layer, which is received by the first electronic equipment under the condition that the target mask layer is displayed in response to the first input of the user to the target application icon; the target mask layer is used for shielding an application interface corresponding to the target application icon;
displaying a verification interface under the condition that the first information is the first sub-verification information;
receiving a fifth input of a user to the verification interface, wherein the fifth input is used for inputting third information;
Generating second information in response to the fifth input in the case where the third information is the second sub-authentication information;
Transmitting the second information to the first electronic device; the second information is used for the first electronic device to display the application interface when the second information comprises the first sub-verification information and the second sub-verification information.
3. An information display apparatus applied to a first electronic device, characterized by comprising:
A seventh receiving module for receiving a third input of the user;
The third processing module is configured to generate a target information packet corresponding to the target application icon in response to a third input, and send the target information packet to the second electronic device, where the target information packet includes: the information to be transferred and target verification information, wherein the target verification information comprises first sub-verification information and second sub-verification information;
the first receiving module is used for receiving a first input of a user to the target application icon;
The first display module is used for responding to the first input and displaying a target mask layer, and the target mask layer is used for shielding an application interface corresponding to the target application icon;
The second receiving module is used for receiving a second input of a user to the target mask layer; the second input is used for inputting first information;
a third sending module, configured to send the first information to the second electronic device in response to the second input, where the first information is consistent with the first sub-verification information;
a sixth receiving module, configured to receive second information sent by the second electronic device, where the second information is generated when the second electronic device responds to a fifth input of a user to the verification interface and third information input by the fifth input is the second sub-verification information;
And the second display module is used for displaying the application interface when the second information comprises the first sub-verification information and the second sub-verification information.
4. An authentication apparatus applied to a second electronic device, comprising:
The receiving module is used for receiving a target information packet corresponding to a target application icon generated by the first electronic device in response to third input of a user, and the target information packet comprises: the information to be transferred and target verification information, wherein the target verification information comprises first sub-verification information and second sub-verification information;
The third receiving module is used for receiving the first information sent by the first electronic equipment; the first information is information input by the second input of the target covering layer received by the user under the condition that the first electronic device responds to the first input of the user to the target application icon to display the target covering layer; the target mask layer is used for shielding an application interface corresponding to the target application icon;
the third display module is used for displaying a verification interface when the first information is the first sub-verification information;
the eighth receiving module is used for receiving a fifth input of the user to the verification interface, wherein the fifth input is used for inputting third information;
The first processing module is used for responding to the fifth input and generating second information when the third information is the second sub-verification information;
The first sending module is configured to send the second information to the first electronic device, where the second information is used for the first electronic device to display the application interface when the second information includes the first sub-verification information and the second sub-verification information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111234037.7A CN113986075B (en) | 2021-10-22 | 2021-10-22 | Information display method and device, verification method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111234037.7A CN113986075B (en) | 2021-10-22 | 2021-10-22 | Information display method and device, verification method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113986075A CN113986075A (en) | 2022-01-28 |
CN113986075B true CN113986075B (en) | 2024-09-20 |
Family
ID=79740414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111234037.7A Active CN113986075B (en) | 2021-10-22 | 2021-10-22 | Information display method and device, verification method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113986075B (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110290526A (en) * | 2019-06-26 | 2019-09-27 | 北京小米移动软件有限公司 | A kind of data access method, device and medium |
CN110780785A (en) * | 2019-10-24 | 2020-02-11 | 上海二三四五网络科技有限公司 | Control method and device for login by using Mongolian layer in game system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8797461B2 (en) * | 2012-12-28 | 2014-08-05 | Behavioral Technologies LLC | Screen time control device and method |
CN104050422B (en) * | 2014-06-10 | 2018-01-05 | 腾讯科技(深圳)有限公司 | Show the method and device of the information content |
CN105959936B (en) * | 2016-06-24 | 2023-10-27 | 郑州信大捷安信息技术股份有限公司 | System for recovering cloud data of mobile terminal and data recovery method |
CN106507268B (en) * | 2016-09-14 | 2020-01-31 | Oppo广东移动通信有限公司 | Method and device for dynamic verification in mobile phone carriers |
CN106331370B (en) * | 2016-09-14 | 2019-02-05 | Oppo广东移动通信有限公司 | A kind of data transmission method and terminal device |
CN107248071A (en) * | 2017-06-06 | 2017-10-13 | 深圳正品创想科技有限公司 | A kind of method and device for the security for improving Quick Response Code consumption certificate |
CN107948395A (en) * | 2017-10-19 | 2018-04-20 | 深圳天珑无线科技有限公司 | Mobile terminal data backup method, system and storage medium |
-
2021
- 2021-10-22 CN CN202111234037.7A patent/CN113986075B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110290526A (en) * | 2019-06-26 | 2019-09-27 | 北京小米移动软件有限公司 | A kind of data access method, device and medium |
CN110780785A (en) * | 2019-10-24 | 2020-02-11 | 上海二三四五网络科技有限公司 | Control method and device for login by using Mongolian layer in game system |
Also Published As
Publication number | Publication date |
---|---|
CN113986075A (en) | 2022-01-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106203061B (en) | Encryption method of application program and mobile terminal | |
CN113141293B (en) | Message display method and device and electronic equipment | |
CN109313535A (en) | Remote keyboard service is provided | |
CN112416200A (en) | Display method, display device, electronic equipment and readable storage medium | |
CN112769856A (en) | Application account sharing method and device and electronic equipment | |
CN111857504A (en) | Information display method and device, electronic equipment and storage medium | |
US20230385426A1 (en) | Encryption Method and Apparatus, Electronic Device, and Medium | |
CN113141295B (en) | Message display method and device and electronic equipment | |
CN112099714B (en) | Screenshot method and device, electronic equipment and readable storage medium | |
WO2023051508A1 (en) | Graphic code display method and apparatus | |
CN112764614B (en) | Data isolation method and electronic equipment | |
CN113986075B (en) | Information display method and device, verification method and device and electronic equipment | |
WO2023103901A1 (en) | Application management method and apparatus, and electronic device | |
WO2023186011A1 (en) | Image display method and apparatus, and electronic device | |
CN113238691B (en) | Application icon management method and device and electronic equipment | |
CN115795429A (en) | Application interface management method and device, electronic equipment and readable storage medium | |
CN113360879B (en) | Display control method, display control device, electronic equipment and medium | |
CN114780192A (en) | Remote assistance method, remote assistance device and electronic equipment | |
CN108763905B (en) | Object processing method and terminal equipment | |
CN106874751A (en) | Input method, device and mobile terminal under system protection pattern | |
CN113300944A (en) | Friend adding method and device and electronic equipment | |
CN112162810A (en) | Message display method and device and electronic equipment | |
CN112699388B (en) | Encryption method and device | |
CN112733213B (en) | Content display method and device | |
CN112765582B (en) | Authority management method and device for application program and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |