Application authentication method and device, electronic equipment and storage medium
An authentication method and target application technology, applied in the field of mobile terminals, can solve problems such as privacy leakage, unstable functions, and complicated operations, and achieve the effect of simplifying authentication steps and improving authentication efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] figure 1 It is a flow chart of an application authentication method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of authenticating multiple applications that require authentication. The method can be executed by the application authentication device provided in the embodiment of the present invention, and the device can be implemented in the form of software and / or hardware, and can be integrated on the electronic device.
[0027] Specifically, such as figure 1 As shown, the application authentication method provided by the embodiment of the present invention may include the following steps:
[0028] S110. In response to the start instruction for the target application, determine the working status information of other applications in the security domain to which the target application belongs.
[0029] Among them, the target application is an application to be launched that the user needs to keep confidential, such...
Embodiment 2
[0043] figure 2It is a flow chart of an application authentication method provided by Embodiment 2 of the present invention. The method is further optimized on the basis of the above embodiments, and a specific introduction of how to determine whether to generate a target application authentication event is given.
[0044] Specifically, such as figure 2 As shown, the method includes:
[0045] S210. In response to an instruction to start the target application, determine work status information of other applications in the security domain to which the target application belongs.
[0046] S220. Determine whether identity authentication of at least one other application in the security domain has been successfully authenticated by using the identity authentication configuration information of the security domain according to the working state information of other applications.
[0047] Wherein, the identity authentication information of the security domain includes at least o...
Embodiment 3
[0061] image 3 It is a flow chart of an application authentication method provided by Embodiment 3 of the present invention. The method is further optimized on the basis of the above embodiments, and the specific situation of detecting the login status of the security domain management and control application is given.
[0062] Specifically, such as image 3 As shown, the method includes:
[0063] S310. Detect the login status of the security domain management and control application in response to the start instruction for the target application.
[0064] Wherein, the security domain management and control application is an application for configuring identity authentication configuration information of the security domain and monitoring the working status of each application in the security domain.
[0065] The identity authentication for the security domain needs to be established on the premise that the security domain management and control application is logged in. On...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


