CN103745148A - Information protection method based on fingerprint recognition and mobile terminal - Google Patents

Information protection method based on fingerprint recognition and mobile terminal Download PDF

Info

Publication number
CN103745148A
CN103745148A CN201410038887.3A CN201410038887A CN103745148A CN 103745148 A CN103745148 A CN 103745148A CN 201410038887 A CN201410038887 A CN 201410038887A CN 103745148 A CN103745148 A CN 103745148A
Authority
CN
China
Prior art keywords
fingerprint
information
finger print
application program
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410038887.3A
Other languages
Chinese (zh)
Other versions
CN103745148B (en
Inventor
刘哲哲
董彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201410038887.3A priority Critical patent/CN103745148B/en
Publication of CN103745148A publication Critical patent/CN103745148A/en
Application granted granted Critical
Publication of CN103745148B publication Critical patent/CN103745148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an information protection method based on fingerprint recognition and a mobile terminal. The method comprises the following steps: S1: collecting fingerprint information to be verified of a fingerprint induction zone through a fingerprint sensor; S2, comparing the collected fingerprint information to be verified with the original fingerprint information; when the collected fingerprint information is not matched with the original fingerprint information, executing a step S3; or else, returning to the step S1; S3, aiming at an application program set as a monitored object, respectively executing corresponding information protection operation. The method has the beneficial effects that the method judges whether a user is the lawful user of the mobile terminal or not through a fingerprint recognition technology, so that when the mobile terminal is lost or stolen, the personal information security of the user can be ensured.

Description

A kind of information protecting method and mobile terminal based on fingerprint recognition
Technical field
The present invention relates to communication of mobile terminal field, more particularly, relate to a kind of information protecting method and mobile terminal based on fingerprint recognition.
Background technology
Near field communication (NFC) (Near Field Communication, NFC) is a kind of contactless identification and interconnection technique, can carry out wireless near field communication at mobile device, consumer electronics product, PC and smart control Tool Room.Existing mobile terminal, by embedded NFC chip, is realized NFC function, and by NFC chips incorporate, on mobile terminal, this mobile terminal just has the function of short-distance wireless communication.Therefore, it is that the daily life of mobile phone users brings convenience that NFC technology is applied to mobile terminal, simultaneously also for mobile phone users has brought consumer's risk.Such as, stolen or lose in the situation that, anyone can use this NFC mobile terminal to carry out bankcard consumption at NFC mobile terminal.Although can prevent that other people from usurping this NFC mobile terminal and carrying out bankcard consumption by the mode such as reporting the loss, due to a variety of causes, may not handle in time and report the loss formality, like this, cause damage still can to the legal user of NFC mobile terminal.Visible, the technology of existing NFC mobile terminal bankcard consumption realizes and has larger potential safety hazard.
And when user uses some that the third party application that account number could access need to be provided, while paying the application such as logical, e-bank such as frequent use mobile terminal login Email, QQ, Alipay, wealth, great majority all can arrange and remember password, but when losses such as mobile phone or panel computer of mobile terminal or while being usurped by other people, appropriator can directly enter the application program that password is remembered in these settings, personal security's information will be revealed, and probably brings larger economic loss.
Summary of the invention
The technical problem to be solved in the present invention is, for the above-mentioned defect of prior art, provides a kind of information protecting method based on fingerprint recognition.Described method comprises:
S1: the finger print information to be verified that gathers fingerprint induction zone by fingerprint sensor;
S2: the finger print information to be verified collecting and original fingerprint information are compared, and perform step S3 when the finger print information to be verified collecting does not mate with original fingerprint information, otherwise return to step S1;
S3: carry out respectively corresponding information protection operation for the application program that is set to monitored object.
In the above-mentioned information protecting method based on fingerprint recognition, described in be set to monitored object application program be the application program based on NFC function, the information protection in described step S3 is operating as shielding NFC function; Or described in be set to monitored object application program be the application program of preserving security information, the information protection in described step S3 is operating as removes the security information corresponding with this application program.
In the above-mentioned information protecting method based on fingerprint recognition, before described step S1, also comprise:
S0: gather original fingerprint information and original fingerprint information that this is collected is saved in the first fingerprint database by fingerprint sensor; Described step S2 obtains original fingerprint information by reading described the first fingerprint database.
In the above-mentioned information protecting method based on fingerprint recognition, described step S0 also comprises: according to application program corresponding to user's input, be set to monitored object, and add described monitored object the list of to fingerprint watchdog routine; Described step S3 obtains the application program that is set to monitored object by the list of fetching finger mark watchdog routine.
In the above-mentioned information protecting method based on fingerprint recognition, described step S1 comprises: while finger print information typing having been detected in fingerprint induction zone, the finger print information collecting by fingerprint sensor is saved in to the second fingerprint database as finger print information to be verified; Described step S2 obtains finger print information to be verified by reading the second fingerprint database, the original fingerprint information of preserving in each finger print information in finger print information to be verified and the first fingerprint database is compared one by one, if have at least a finger print information to be included in original fingerprint information, confirm finger print information to be verified and original fingerprint information matches.
In the above-mentioned information protecting method based on fingerprint recognition; also comprise according to user's input fingerprint comparison cycle T is set; the fingerprint comparison cycle T of take in described step S2 is carried out comparing of finger print information to be verified and original fingerprint information as the cycle, and automatically removes the finger print information to be verified of preserving in described the second fingerprint database after comparison completes in current fingerprint comparison cycle T.
A kind of mobile terminal is also provided, comprises:
Fingerprint sensor, for gathering the finger print information to be verified of fingerprint induction zone;
Fingerprint identification module, for the finger print information to be verified collecting and original fingerprint information are compared, judges whether both mate;
Functional processing module, does not carry out respectively corresponding information protection operation for the application program that is set to monitored object while not mating with original fingerprint information for the finger print information to be verified collecting.
In above-mentioned mobile terminal, described in be set to monitored object application program be the application program based on NFC function, the information protection that described functional processing module is carried out is operating as shielding NFC function;
Or described in be set to monitored object application program be the application program of preserving security information, the information protection that described functional processing module is carried out is operating as removes the security information corresponding with this application program.
In above-mentioned mobile terminal, described mobile terminal also comprises finger print information storage unit, and described finger print information storage unit further comprises the first fingerprint database and the second fingerprint database; Described the first fingerprint database is for preserving the original fingerprint information collecting by described fingerprint sensor; Described the second fingerprint database is for preserving the finger print information to be verified collecting by described fingerprint sensor.
In above-mentioned mobile terminal, described mobile terminal also comprises module is set; The described module that arranges is for arranging fingerprint comparison cycle T according to user's input; Described fingerprint identification module be take described fingerprint comparison cycle T and is carried out comparing of finger print information to be verified and original fingerprint information as the cycle.
Implement a kind of information protecting method and mobile terminal based on fingerprint recognition of the present invention; there is following beneficial effect: the finger print information to be verified collecting and original fingerprint information are compared, and for the application program that is set to monitored object, carry out respectively corresponding information protection operation when not mating.Therefore by fingerprint identification technology, carry out authenticating user identification; when not being the legal user of mobile terminal, carry out corresponding information protection operation; very first time shielding NFC function is also removed the security information corresponding with the application program of preserving security information simultaneously, has guaranteed userspersonal information's safety.
Accompanying drawing explanation
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the process flow diagram of the information protecting method based on fingerprint recognition that provides of the embodiment of the present invention;
Fig. 2 is the functional block diagram of the mobile terminal that provides of the embodiment of the present invention.
Embodiment
The problem existing for prior art; the embodiment of the present invention provides a kind of information protecting method based on fingerprint recognition; guarantee userspersonal information's safety; make the lawful owner of mobile phone users or legal user enjoy the application program that download on mobile terminal and to utilize NFC to swipe the card the conveniently while that the correlation functions such as payments bring; also can improve consumption safety, guarantee mobile terminal subscriber information safety.
For technical characterictic of the present invention, object and effect being had more clearly, understand, now contrast accompanying drawing and describe the specific embodiment of the present invention in detail.
Consider comparative maturity of fingerprint identification technology; the embodiment of the present invention will be by increasing fingerprint sensor in mobile terminal; and mobile terminal screen specific region is processed; make it to accept and conduct finger print information; it is fingerprint induction zone; by the uniqueness of fingerprint, differentiate whether be the legal user of mobile terminal; operate judging by fingerprint while not being the legal user of mobile terminal that the very first time is carried out the information protection corresponding with application program, thereby guarantee mobile terminal subscriber information safety.
The process flow diagram of the information protecting method based on fingerprint recognition that Fig. 1 provides for the embodiment of the present invention, is mainly used in having in the mobile terminal of NFC function, such as mobile phone, panel computer etc., and the method comprises:
S0: open fingerprint monitoring function, 10 fingers that are placed on successively the mobile phone users of mobile terminal screen fingerprint induction zone are carried out respectively to finger print information collection, and the finger print information that this is collected is saved in mobile terminal the first fingerprint database as original fingerprint information.Also can gather user and specify for example household or friend's finger print information of user, be convenient to household or friend and also can directly use the application program that is subject to fingerprint monitoring.When specific implementation, can be by middle interpolation fingerprint monitoring menu being set at mobile terminal and starting this menu when carrying out this step, to carry out original fingerprint Data Enter and unlatching or to close fingerprint monitoring (can open or close fingerprint by password authentification mode etc. and monitor, open first and do not need checking).
Especially, when opening fingerprint monitoring, can comprise: according to application program corresponding to user's input, be set to monitored object, and add in the list of fingerprint watchdog routine.Wherein, the application program that need carry out fingerprint monitoring mainly comprises the application program based on NFC function and the application program of preserving security information, Email for example, QQ, micro-letter, Alipay, the third party application that wealth Fu Tong etc. need to provide account number to access, these are all the important object that need to carry out fingerprint monitoring, wherein, the application program of preserving security information both can set in advance whether need to carry out fingerprint monitoring by user itself, also can detect this application program by mobile terminal system and whether have networking input user account number, judge whether to carry out fingerprint monitoring.
S1: finger print information typing detected in fingerprint induction zone, using the finger print information collecting by fingerprint sensor as finger print information to be verified, and the finger print information for the treatment of collecting has been kept to mobile terminal the second fingerprint database.If there is no finger print information typing in fingerprint induction zone, be that fingerprint sensor does not collect finger print information to be verified, for example, when mobile terminal is shelved on one side, can think that now personal security's information of mobile phone users can't be damaged, other people do not use this mobile terminal yet, without doing any processing.
S2: the finger print information to be verified collecting and original fingerprint information are compared, and perform step S3 when the finger print information to be verified collecting does not mate with original fingerprint information, otherwise return to step S1.In this step, fingerprint comparison cycle T is set, every fingerprint comparison cycle T, detect the finger print information to be verified once collecting, and compare with original fingerprint information, this comparison cycle can be set voluntarily, as: 10 seconds, 30 seconds, 1 minute etc., by being set, can load by mitigation system in the fingerprint comparison cycle.
Particularly, according to this fingerprint comparison cycle T, the fingerprint comparison cycle T of take is carried out comparing of finger print information to be verified and original fingerprint information as the cycle, and automatically removes in current fingerprint comparison cycle T and be kept at the finger print information to be verified in the second fingerprint database after comparison completes.Step S2 specifically also comprises: the original fingerprint information of preserving in the finger print information to be verified of preserving in the second fingerprint database and the first fingerprint database is compared one by one, for example, in comparison cycle T, mobile terminal system is randomly drawed 5 finger print informations in the finger print information to be verified collecting by fingerprint sensor of preserving in the second fingerprint database, the original fingerprint information of preserving in each finger print information and the first fingerprint database is compared one by one, if be included in original fingerprint information, and as long as have one to be included in original fingerprint information in these 5 finger print informations, think finger print information to be verified and original fingerprint information matches, otherwise do not mate, the finger print information neither one finger print information extracting in the finger print information to be verified collecting in comparison cycle T is included in original fingerprint information.
S3: carry out corresponding information protection operation for the application program that is set to monitored object.This step is not carry out when the finger print information to be verified when collecting does not mate with original fingerprint information; as long as finger print information being detected does not mate; when mobile terminal being detected and not using in person, the very first time carries out the information protection corresponding with application program and operates, and guarantees user information safety.
This step specifically comprises: the application program that is set to monitored object is the application program based on NFC function, and this information protection is operating as shielding NFC function, such as swiping the card the correlation functions such as payment, treats to compare cycle T next time and then proceeds comparison; Or the application program that is set to monitored object is the application program of preserving security information, the third party application that need to provide account number to access as Email, QQ, micro-letter, Alipay, wealth Fu Tong etc., remove the security information corresponding with this application program, secure account data for example, COOKIES, the security related information such as SESSION, wait for the next comparison cycle then proceed comparison, but account data is irrecoverable, can only reset, even if the success of fingerprint matching next time, also can only arrange again again.
Wherein, remove the security information corresponding with this application program and comprise two kinds of modes, a kind of is automatically to detect and delete and this application program security related information by mobile terminal system; Another kind is the file being generated by this application program and the file of specify to need being deleted by mobile phone users, when finger print information being detected and do not mate, automatically deletes file and the file of appointment, has deleted its security related information of preserving.
In said process, step S2 also comprises: when the finger print information to be verified collecting mates with the finger print information prestoring, close fingerprint monitoring or by password authentification mode etc., close fingerprint and monitor.In mobile terminal arranges, provide and close fingerprint monitoring function, but can only, at finger print information when the match is successful, could in arranging, close fingerprint monitoring, or by password authentification mode, close fingerprint and monitor.
The present invention makes full use of the unique trait identification mobile phone users identity of fingerprint, only when mating, finger print information could directly use the application program that is set to monitored object in mobile terminal, can normally use the NFC correlation functions such as payment of swiping the card, and the password of application program remember account number and to(for) setting is as QQ, micro-letters etc. just can directly be logined without inputting account number and password again, and when browsing the website that some remember logging status, because its some information of filling in when logining for the first time can be left in by the mode with file on the hard disk of mobile terminal client terminal or in the hard drive space of server, if the finger print information to be verified therefore collecting just can directly enter login interface while mating with the finger print information prestoring, without again inputting account number.But the very first time is carried out the information protection operation corresponding with application program when finger print information does not mate; make the relevant payment function of NFC lose efficacy and remove the security related information such as Account Security data, COOKIES, SESSION simultaneously, therefore can fully guarantee mobile phone users personal information security.
Fig. 2 is the functional block diagram of the mobile terminal that provides of the embodiment of the present invention, except comprising this conventional module of NFC chip, also comprises: finger print information storage unit 101, fingerprint sensor 102, fingerprint identification module 103, functional processing module 104.Wherein, finger print information storage unit 101, fingerprint sensor 102 and fingerprint identification module 103 have formed the fingerprint identification system in mobile terminal, and certain processing is carried out in mobile terminal screen specific region, enable to accept and conduct finger print information.
Fingerprint sensor 102 is for gathering the finger print information to be verified of fingerprint induction zone, and fingerprint identification module 103, for the finger print information to be verified collecting and original fingerprint information are compared, judges whether both mate.When not mating with the finger print information prestoring for the finger print information collecting, functional processing module 104 do not carry out respectively corresponding information protection operation for the application program that is set to fingerprint monitored object.Wherein, according to application program corresponding to user's input, be set to monitored object, and add in the list of fingerprint watchdog routine.Wherein, the application program that need carry out fingerprint monitoring mainly comprises the application program based on NFC function and the application program of preserving security information.
Functional processing module 104 specifically for: as the application program that is set to monitored object is the application program based on NFC function, and the information protection that functional processing module 104 is carried out is operating as shielding NFC function; Only when mating next time, could normally use.
This functional processing module 104 also for as the application program that is set to monitored object be the application program of preserving security information; the information protection that functional processing module 104 is carried out is operating as removes the security information corresponding with this application program; Account Security data for example; COOKIES, the security related information such as SESSION.The third party application of these application programs of preserving security information for providing account number to access as Email, QQ, micro-letter, Alipay, wealth Fu Tong etc.
Finger print information storage unit 101 further comprises for preserving the first fingerprint database of the original fingerprint information collecting by fingerprint sensor and for preserving the second fingerprint database of the finger print information to be verified collecting by fingerprint sensor.This mobile terminal also comprises module (not shown) is set, and module is set for fingerprint comparison cycle T being set according to user's input.Wherein, in fingerprint comparison cycle T then, the original fingerprint information of preserving in the finger print information to be verified of preserving in the second fingerprint database and the first fingerprint database is compared, and obtains fingerprint comparison result.In addition, after comparison completes, mobile terminal system can be removed the finger print information to be verified collecting in the current comparison cycle T of preserving in the second fingerprint database automatically, and comparison result is very accurate.
Implementing a kind of information protecting method based on fingerprint recognition of the present invention is mainly used in as in the mobile terminals such as mobile phone, panel computer; now take and be applied in mobile phone that to introduce in detail specific works principle of the present invention as follows as example: by increase hardware sensor in mobile phone: fingerprint sensor; and mobile phone screen specific region is processed; form screen fingerprint induction zone; while making owner's finger touch to this fingerprint induction zone, can accept and conduct finger print information.
In mobile phone arranges, need first add fingerprint monitoring menu, start this menu to carry out original fingerprint Data Enter and unlatching or to close fingerprint monitoring.First enter to arrange and open fingerprint monitoring, 10 fingers that are placed on successively the owner of mobile phone screen fingerprint induction zone are carried out respectively to finger print information collection, as original fingerprint information, and be saved to mobile phone the first fingerprint database.In this process, original fingerprint information is not limited to only gather the finger print information of 10 fingers of owner, also can comprise owner household or friend's finger print information, so that the application program on mobile phone can directly be used for household or friend.
In mobile phone, need the application program of carrying out fingerprint monitoring mainly to comprise the application program based on NFC function and the application program of preserving security information, Email for example, QQ, micro-letter, Alipay, wealth is paid logical, each big bank's cell-phone customer terminal, network game etc., and these are all the important object that need carry out fingerprint monitoring, these application program great majority all can arrange and remember password, cell phone system can be by detecting these application programs input user account number of whether networking, thereby judge whether this application program needs to carry out fingerprint monitoring, also can according to application program corresponding to user's input, be set to monitored object in advance, and add monitored object the list of to fingerprint watchdog routine.Start fingerprint monitoring function, by fingerprint sensor, be captured in single finger print information that fingerprint induction zone stays as finger print information to be verified, and be saved in mobile phone the second fingerprint database.A fingerprint comparison cycle T is set, the fingerprint comparison cycle T of take was compared the finger print information to be verified collecting in current comparison cycle T and the original fingerprint information of in the second fingerprint database, preserving as the cycle, and after comparison completes, automatically dispose the finger print information to be verified of preserving in the second fingerprint database in current comparison cycle T.
The original fingerprint information of preserving in the finger print information to be verified of preserving in the second fingerprint database and the first fingerprint database is compared, and for the application program that is set to monitored object, carry out respectively corresponding information protection operation when not mating.Particularly, if being set to the application program of monitored object is the application program based on NFC function, corresponding information protection is operating as shielding NFC function, pays etc. such as swiping the card, treat to compare next time and then proceed comparison interval time, only have this NFC function after the match is successful normally to use, or the application program that is set to monitored object is the application program of preserving individual subscriber security information, the Email of for example often logining, QQ, micro-letter, Alipay, these third party applications that need to provide account number to access such as wealth Fu Tong, corresponding information protection is operating as removes the security information corresponding with this application program, secure account data for example, COOKIES, the security related information such as SESSION, and account data is irrecoverable, can only reset, even when next fingerprint matching success, login these application programs and also need to re-enter again account number and password, the historical record mark of Internet-browser also can be eliminated.And in said process, can only when finger print information to be verified mates with the finger print information prestoring, could in mobile phone arranges, close fingerprint monitoring, or by password authentification mode, close fingerprint and monitor.
In sum, the embodiment of the present invention has increased fingerprint sensor on the mobile terminal with NFC chip, has introduced fingerprint identification technology, by fingerprint, determines whether the legal user of mobile terminal, can realize when mobile terminal is lost or be stolen, guarantee userspersonal information's safety.For example, when mobile terminal is usurped by other people, if want, use the application program in mobile terminal, fingerprint sensor is certain to collect stolen person's finger print information to be verified, the finger print information to be verified now collecting does not mate with original fingerprint information, thereby carry out respectively corresponding information protection operation for the application program that is set to monitored object, the important application program that makes the NFC disabler in mobile terminal and be subject to fingerprint monitoring is QQ for example, micro-letter, Email, the Account Security data that wealth Fu Tong etc. are corresponding, COOKIES, the security related information such as SESSION all can be removed automatically in the very first time, cause appropriator cannot use NFC function to carry out bankcard consumption, and must re-enter account and password when entering the operation interface of the application program of preserving security information, therefore guaranteed userspersonal information's safety, can not cause economic loss.
By reference to the accompanying drawings embodiments of the invention are described above; but the present invention is not limited to above-mentioned embodiment; above-mentioned embodiment is only schematic; rather than restrictive; those of ordinary skill in the art is under enlightenment of the present invention; not departing from the scope situation that aim of the present invention and claim protect, also can make a lot of forms, within these all belong to protection of the present invention.

Claims (10)

1. the information protecting method based on fingerprint recognition, is characterized in that, described method comprises:
S1: the finger print information to be verified that gathers fingerprint induction zone by fingerprint sensor;
S2: the finger print information to be verified collecting and original fingerprint information are compared, and perform step S3 when the finger print information to be verified collecting does not mate with original fingerprint information, otherwise return to step S1;
S3: carry out respectively corresponding information protection operation for the application program that is set to monitored object.
2. the information protecting method based on fingerprint recognition according to claim 1, is characterized in that, described in be set to monitored object application program be the application program based on NFC function, the information protection in described step S3 is operating as shielding NFC function; Or described in be set to monitored object application program be the application program of preserving security information, the information protection in described step S3 is operating as removes the security information corresponding with this application program.
3. the information protecting method based on fingerprint recognition according to claim 1, is characterized in that, before described step S1, also comprises:
S0: gather original fingerprint information and original fingerprint information that this is collected is saved in the first fingerprint database by fingerprint sensor; Described step S2 obtains original fingerprint information by reading described the first fingerprint database.
4. the information protecting method based on fingerprint recognition according to claim 3, it is characterized in that, described step S0 also comprises: according to application program corresponding to user's input, be set to monitored object, and add described monitored object the list of to fingerprint watchdog routine; Described step S3 obtains the application program that is set to monitored object by the list of fetching finger mark watchdog routine.
5. the information protecting method based on fingerprint recognition according to claim 3, it is characterized in that, described step S1 comprises: while finger print information typing having been detected in fingerprint induction zone, the finger print information collecting by fingerprint sensor is saved in to the second fingerprint database as finger print information to be verified; Described step S2 obtains finger print information to be verified by reading the second fingerprint database, the original fingerprint information of preserving in each finger print information in finger print information to be verified and the first fingerprint database is compared one by one, if have at least a finger print information to be included in original fingerprint information, confirm finger print information to be verified and original fingerprint information matches.
6. the information protecting method based on fingerprint recognition according to claim 5; it is characterized in that; also comprise according to user's input fingerprint comparison cycle T is set; the fingerprint comparison cycle T of take in described step S2 is carried out comparing of finger print information to be verified and original fingerprint information as the cycle, and automatically removes the finger print information to be verified of preserving in described the second fingerprint database after comparison completes in current fingerprint comparison cycle T.
7. a mobile terminal, is characterized in that, comprising:
Fingerprint sensor, for gathering the finger print information to be verified of fingerprint induction zone;
Fingerprint identification module, for the finger print information to be verified collecting and original fingerprint information are compared, judges whether both mate;
Functional processing module, does not carry out respectively corresponding information protection operation for the application program that is set to monitored object while not mating with original fingerprint information for the finger print information to be verified collecting.
8. mobile terminal according to claim 7, is characterized in that, described in be set to monitored object application program be the application program based on NFC function, the information protection that described functional processing module is carried out is operating as shielding NFC function;
Or described in be set to monitored object application program be the application program of preserving security information, the information protection that described functional processing module is carried out is operating as removes the security information corresponding with this application program.
9. mobile terminal according to claim 7, is characterized in that, described mobile terminal also comprises finger print information storage unit, and described finger print information storage unit further comprises the first fingerprint database and the second fingerprint database; Described the first fingerprint database is for preserving the original fingerprint information collecting by described fingerprint sensor; Described the second fingerprint database is for preserving the finger print information to be verified collecting by described fingerprint sensor.
10. mobile terminal according to claim 9, is characterized in that, described mobile terminal also comprises module is set; The described module that arranges is for arranging fingerprint comparison cycle T according to user's input; Described fingerprint identification module be take described fingerprint comparison cycle T and is carried out comparing of finger print information to be verified and original fingerprint information as the cycle.
CN201410038887.3A 2014-01-26 2014-01-26 A kind of information protecting method and mobile terminal based on fingerprint recognition Active CN103745148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410038887.3A CN103745148B (en) 2014-01-26 2014-01-26 A kind of information protecting method and mobile terminal based on fingerprint recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410038887.3A CN103745148B (en) 2014-01-26 2014-01-26 A kind of information protecting method and mobile terminal based on fingerprint recognition

Publications (2)

Publication Number Publication Date
CN103745148A true CN103745148A (en) 2014-04-23
CN103745148B CN103745148B (en) 2017-06-27

Family

ID=50502165

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410038887.3A Active CN103745148B (en) 2014-01-26 2014-01-26 A kind of information protecting method and mobile terminal based on fingerprint recognition

Country Status (1)

Country Link
CN (1) CN103745148B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104850800A (en) * 2015-05-29 2015-08-19 努比亚技术有限公司 Mobile terminal and method for protecting data in mobile terminal
WO2015180281A1 (en) * 2014-05-28 2015-12-03 惠州Tcl移动通信有限公司 Determination method and system of mobile terminal for identifying user privilege based on fingerprint
CN105373737A (en) * 2015-10-10 2016-03-02 广东欧珀移动通信有限公司 Application encryption method and mobile terminal
CN105530101A (en) * 2016-02-29 2016-04-27 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method and device
CN105550552A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Protection method and apparatus for mobile terminal
CN105656630A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Identity verification method and device
CN106211158A (en) * 2016-07-12 2016-12-07 广东欧珀移动通信有限公司 A kind of method of access network and mobile terminal
CN106469260A (en) * 2015-08-20 2017-03-01 中兴通讯股份有限公司 A kind of method and device accessing mobile terminal
CN106506492A (en) * 2016-10-28 2017-03-15 郑建钦 A kind of safe movable data storage system
CN107506627A (en) * 2017-07-11 2017-12-22 国网浙江桐庐县供电公司 A kind of information network security of power system operating control device
CN108781234A (en) * 2017-06-09 2018-11-09 华为技术有限公司 Function control method and terminal
CN109844764A (en) * 2017-08-31 2019-06-04 华为技术有限公司 The verification method and terminal of fingerprint sensor function
CN109963036A (en) * 2019-03-29 2019-07-02 广东小天才科技有限公司 Message recognition methods, device, equipment and storage medium
CN110276185A (en) * 2019-06-19 2019-09-24 郑雨鑫 Image mosaic tamper resistant method based on computer depth learning technology
CN112598828A (en) * 2020-12-28 2021-04-02 江苏金迪木业股份有限公司 Household door anti-theft system based on artificial intelligence
CN114445946A (en) * 2021-11-19 2022-05-06 陕西科技大学 System and method for preventing health code from being abused
CN115982684A (en) * 2022-12-01 2023-04-18 深圳市智百威科技发展有限公司 Rapid POS cash registering and settling system and method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102502099A (en) * 2011-10-25 2012-06-20 蔡寒涛 Medicine bottle for discharging tablets one by one

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102502099A (en) * 2011-10-25 2012-06-20 蔡寒涛 Medicine bottle for discharging tablets one by one

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015180281A1 (en) * 2014-05-28 2015-12-03 惠州Tcl移动通信有限公司 Determination method and system of mobile terminal for identifying user privilege based on fingerprint
CN104850800A (en) * 2015-05-29 2015-08-19 努比亚技术有限公司 Mobile terminal and method for protecting data in mobile terminal
CN105656630A (en) * 2015-06-29 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Identity verification method and device
WO2017000351A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Identity verification method and apparatus
CN105550552B (en) * 2015-06-30 2019-01-15 宇龙计算机通信科技(深圳)有限公司 A kind of guard method of mobile terminal and device
CN105550552A (en) * 2015-06-30 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Protection method and apparatus for mobile terminal
WO2017000347A1 (en) * 2015-06-30 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for protecting mobile terminal
CN106469260A (en) * 2015-08-20 2017-03-01 中兴通讯股份有限公司 A kind of method and device accessing mobile terminal
CN105373737A (en) * 2015-10-10 2016-03-02 广东欧珀移动通信有限公司 Application encryption method and mobile terminal
CN105530101A (en) * 2016-02-29 2016-04-27 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method and device
CN105530101B (en) * 2016-02-29 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of fingerprint method for authenticating and device
CN106211158A (en) * 2016-07-12 2016-12-07 广东欧珀移动通信有限公司 A kind of method of access network and mobile terminal
CN106506492A (en) * 2016-10-28 2017-03-15 郑建钦 A kind of safe movable data storage system
CN108781234A (en) * 2017-06-09 2018-11-09 华为技术有限公司 Function control method and terminal
CN108781234B (en) * 2017-06-09 2021-07-20 华为技术有限公司 Function control method and terminal
CN107506627A (en) * 2017-07-11 2017-12-22 国网浙江桐庐县供电公司 A kind of information network security of power system operating control device
CN109844764A (en) * 2017-08-31 2019-06-04 华为技术有限公司 The verification method and terminal of fingerprint sensor function
CN109963036A (en) * 2019-03-29 2019-07-02 广东小天才科技有限公司 Message recognition methods, device, equipment and storage medium
CN110276185A (en) * 2019-06-19 2019-09-24 郑雨鑫 Image mosaic tamper resistant method based on computer depth learning technology
CN112598828A (en) * 2020-12-28 2021-04-02 江苏金迪木业股份有限公司 Household door anti-theft system based on artificial intelligence
CN112598828B (en) * 2020-12-28 2021-09-21 江苏金迪木业股份有限公司 Household door anti-theft system based on artificial intelligence
CN114445946A (en) * 2021-11-19 2022-05-06 陕西科技大学 System and method for preventing health code from being abused
CN115982684A (en) * 2022-12-01 2023-04-18 深圳市智百威科技发展有限公司 Rapid POS cash registering and settling system and method
CN115982684B (en) * 2022-12-01 2023-10-13 深圳市智百威科技发展有限公司 Quick POS cashing settlement system and method

Also Published As

Publication number Publication date
CN103745148B (en) 2017-06-27

Similar Documents

Publication Publication Date Title
CN103745148A (en) Information protection method based on fingerprint recognition and mobile terminal
US10068076B1 (en) Behavioral authentication system using a behavior server for authentication of multiple users based on their behavior
CN105678125B (en) A kind of user authen method, device
CN107689936B (en) Security verification system, method and device for login account
CN100500091C (en) Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
WO2017113380A1 (en) Fingerprint recognition method and apparatus, and touch-screen terminal
CN105117698A (en) Fingerprint identification method and device based on multiple fingerprint sensors and terminal
CN104392160A (en) Identity authentication method and identity authentication device
CN104102925A (en) Computer operating system login verification method based on fingerprint identification technology
CN102156857A (en) Method for authenticating account by using fingerprint identification
CN105678147B (en) Touch operation method and device
CN104573456A (en) Terminal interface control method
CN106056386A (en) Payment method, payment terminal, server and payment system
CN104091109A (en) System and method for verifying identity of computer administrator through fingerprint and vein double modes
CN105159475B (en) A kind of characters input method and device
CN104778587A (en) Safety payment method and device
CN104598792A (en) Terminal
TWI668586B (en) Data communication method and system, client and server
CN105389497A (en) Security verification method and system for operation interface of fingerprint recognition
Agidi Biometrics: the future of banking and financial service industry in Nigeria
CN107241328A (en) Electronic equipment method for opening and closing and system
CN105095714A (en) User system recognition system and method based on fingerprint recognition
CN106529232A (en) Startup method and device
CN111882425B (en) Service data processing method, device and server
CN105678143A (en) Methods and devices for setting and acquiring electronic business card

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: Guangdong Opel Mobile Communications Co., Ltd.