Unlock instant, AI-driven research and patent intelligence for your innovation.

Application authentication method and device, electronic equipment and storage medium

An authentication method and target application technology, applied in the field of mobile terminals, can solve problems such as privacy leakage, unstable functions, and complicated operations, and achieve the effect of simplifying authentication steps and improving authentication efficiency

Pending Publication Date: 2022-02-08
北京指掌易科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The application lock provided by the mobile phone manufacturer, the application lock function of each application is independent of each other, each application needs to be configured separately, and each application needs to be unlocked, and the operation is complicated
The application lock provided by mobile phone software vendors is affected by various mobile phone manufacturers and systems, and its functions are very unstable. With the tightening of application permissions in the mobile phone system, it is easy to be cracked. It can bypass the application lock and directly enter the application, resulting in privacy. leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application authentication method and device, electronic equipment and storage medium
  • Application authentication method and device, electronic equipment and storage medium
  • Application authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 1 It is a flow chart of an application authentication method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of authenticating multiple applications that require authentication. The method can be executed by the application authentication device provided in the embodiment of the present invention, and the device can be implemented in the form of software and / or hardware, and can be integrated on the electronic device.

[0027] Specifically, such as figure 1 As shown, the application authentication method provided by the embodiment of the present invention may include the following steps:

[0028] S110. In response to the start instruction for the target application, determine the working status information of other applications in the security domain to which the target application belongs.

[0029] Among them, the target application is an application to be launched that the user needs to keep confidential, such...

Embodiment 2

[0043] figure 2It is a flow chart of an application authentication method provided by Embodiment 2 of the present invention. The method is further optimized on the basis of the above embodiments, and a specific introduction of how to determine whether to generate a target application authentication event is given.

[0044] Specifically, such as figure 2 As shown, the method includes:

[0045] S210. In response to an instruction to start the target application, determine work status information of other applications in the security domain to which the target application belongs.

[0046] S220. Determine whether identity authentication of at least one other application in the security domain has been successfully authenticated by using the identity authentication configuration information of the security domain according to the working state information of other applications.

[0047] Wherein, the identity authentication information of the security domain includes at least o...

Embodiment 3

[0061] image 3 It is a flow chart of an application authentication method provided by Embodiment 3 of the present invention. The method is further optimized on the basis of the above embodiments, and the specific situation of detecting the login status of the security domain management and control application is given.

[0062] Specifically, such as image 3 As shown, the method includes:

[0063] S310. Detect the login status of the security domain management and control application in response to the start instruction for the target application.

[0064] Wherein, the security domain management and control application is an application for configuring identity authentication configuration information of the security domain and monitoring the working status of each application in the security domain.

[0065] The identity authentication for the security domain needs to be established on the premise that the security domain management and control application is logged in. On...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an application authentication method and device, electronic equipment and a storage medium, and the method comprises the steps: responding to a starting instruction for a target application, and determining the working state information of other applications in a security domain to which the target application belongs; determining whether a target application authentication event is generated or not according to the working state information of the other applications; if the target application authentication event is detected, acquiring user identity information, authenticating the user identity information according to the identity authentication configuration information of the security domain, and starting the target application under the condition of successful authentication. According to the embodiment of the invention, the applications needing identity authentication are containerized, so that a plurality of applications share the identity authentication configuration information of the security domain, the tedious condition of independent authentication of each application is avoided, the authentication steps of the applications are simplified under the condition of ensuring the operation security of the applications, and the authentication efficiency of the applications is improved.

Description

technical field [0001] Embodiments of the present invention relate to the technology in the field of mobile terminals, and in particular to an application authentication method, device, electronic equipment, and storage medium. Background technique [0002] With the development of smart phones, it has become an indispensable tool or necessity in human life, a product that fully meets the individual needs of users and brings a new application experience. At the same time, people are increasingly concerned about mobile phone security and privacy. [0003] At present, on the mobile phone, there are two ways to protect the application, one is the application lock function provided by the mobile phone manufacturer, and the other is the application lock software provided by the mobile phone software manufacturer. The application lock provided by the mobile phone manufacturer, the application lock function of each application is independent of each other, each application needs to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/31
CPCG06F21/44G06F21/31
Inventor 司余王伟
Owner 北京指掌易科技有限公司