CN106022056B - A kind of processing method and user terminal of finger print information - Google Patents

A kind of processing method and user terminal of finger print information Download PDF

Info

Publication number
CN106022056B
CN106022056B CN201610368326.9A CN201610368326A CN106022056B CN 106022056 B CN106022056 B CN 106022056B CN 201610368326 A CN201610368326 A CN 201610368326A CN 106022056 B CN106022056 B CN 106022056B
Authority
CN
China
Prior art keywords
terminal
information
finger print
print information
identification information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610368326.9A
Other languages
Chinese (zh)
Other versions
CN106022056A (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610368326.9A priority Critical patent/CN106022056B/en
Publication of CN106022056A publication Critical patent/CN106022056A/en
Application granted granted Critical
Publication of CN106022056B publication Critical patent/CN106022056B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the invention discloses a kind of processing method of finger print information and user terminals, wherein method includes: whether the default application of first terminal detection receives new information;If first terminal detects that default application receives new information, then first terminal sends the decoding request for carrying identification information to second terminal, the identification information is the mark of first terminal or the mark of user, the decoding request is for requesting second terminal that the finger print information corresponding with identification information of storage is decrypted, the finger print information decrypted, the finger print information that the finger print information of the decryption is used to send first terminal verify.As it can be seen that by implementing the embodiment of the present invention, when detecting that default application receives information, second terminal is decrypted to the finger print information of encryption, to save the time of finger print information decryption, and then the time of finger-mark check is shortened, improves the efficiency of finger-mark check.

Description

A kind of processing method and user terminal of finger print information
Technical field
The present invention relates to the processing methods and user terminal of field of communication technology more particularly to a kind of finger print information.
Background technique
It is at present the safety and convenience that improve user terminal (such as mobile phone, tablet computer), finger-mark check function quilt It is widely used.
In practical applications, user terminal carries out finger-mark check frequently by other terminals, and verification is whole by then user End executes corresponding operation (for example, solve lock screen or carry out the operation such as paying).For example, user terminal comes frequently by server Finger-mark check is carried out, server is stored with registering fingerprint information, and the finger print information that user inputs is sent to service by user terminal Device is verified;Server informs user terminal check results;If check results are that verification passes through, user terminal executes corresponding Operation.In general, to improve the safety of registering fingerprint information, the registering fingerprint information for being stored in server can be encrypted.? When server receives the finger print information of user terminal transmission, server needs for registering fingerprint information to be decrypted, then will solution Close registering fingerprint information is compared with the finger print information that user terminal is sent, to user terminal send finger print information into Row verification.
In practice, it has been found that such finger-mark check efficiency is lower, generally requires to take a long time and verified.
Summary of the invention
The embodiment of the invention discloses a kind of processing method of finger print information and user terminal, be conducive to improve finger print information The efficiency of verification.
First aspect of the embodiment of the present invention discloses a kind of processing method of finger print information, which comprises
Whether the default application of first terminal detection receives new information;
If the first terminal detects the default application and receives new information, the first terminal is to second terminal Send carry identification information decoding request, the identification information be the first terminal mark or user mark, it is described Decoding request is obtained for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted The finger print information of decryption, the finger print information that the finger print information of the decryption is used to send the first terminal verify.
In a kind of possible design, the first terminal to second terminal send carry identification information decoding request it Afterwards, the method also includes:
The first terminal receives user and passes through the first finger print information that the fingerprint input area inputs;
The first terminal sends the verification including first finger print information to the second terminal and requests;
The first terminal receives the first response message that the second terminal is sent, and first response message is described What second terminal was sent when the finger print information for verifying first finger print information and the decryption matches, first response Information is used to indicate the first finger print information verification and passes through;
First terminal performance objective operation, the object run include unlocking screen operation, log in described default answer The combination of any one or more in the operation of operation and the unlock default application.
In a kind of possible design, when the object run includes unlocking screen operation, the first terminal detection is pre- If using whether receiving new information and including:
Whether the default application of first terminal detection receives new information in the state of the lock screen;
The object run includes when logging in the operation of the default application, and the first terminal detects the default application Whether receiving new information includes:
In the case where being not logged in the default application, it is new whether the first terminal detection default application receives Message;
The object run includes when unlocking the operation of the default application, and whether the default application of first terminal detection Receiving new information includes:
In the case where not unlocking the default application, it is new whether the first terminal detection default application receives Message.
In a kind of possible design, the first terminal receive the first response message that the second terminal is sent it Afterwards, the method also includes:
The first terminal is sent to the second terminal deletes instruction, and the deletion instruction is used to indicate described second eventually Delete the finger print information of the decryption in end.
In a kind of possible design, the first terminal to second terminal send carry identification information decoding request it Afterwards, the method also includes:
If not receiving user within a preset period of time passes through the finger print information that the fingerprint input area inputs, to institute It states second terminal and sends deletion instruction, the deletion instruction is used to indicate the fingerprint letter that the second terminal deletes the decryption Breath.
In a kind of possible design, after the first terminal detects that the default application receives new information, Before the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
Whether the sender for detecting the new information is default sender;
If the sender of the new information is default sender, the first terminal is executed to second terminal and sends carrying The step of decoding request of identification information.
In a kind of possible design, after the first terminal detects that the default application receives new information, Before the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
It whether detects in the new information comprising preset content;
If in the new information including preset content, executes the first terminal and send to carry to identify to second terminal and believe The step of decoding request of breath.
Second aspect of the embodiment of the present invention discloses a kind of user terminal, and the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for when the detection module detects that the default application receives new information, eventually to second End sends the decoding request for carrying identification information, and the identification information is the mark of the user terminal or the mark of user, institute Decoding request is stated for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted, is obtained To the finger print information of decryption, the finger print information that the finger print information of the decryption is used to send the user terminal is verified.
In a kind of possible design, the user terminal further include:
Receiving module passes through the first finger print information that the fingerprint input area inputs for receiving user;
The sending module is also used to send the verification including first finger print information to the second terminal and request;
The receiving module is also used to receive the first response message that the second terminal is sent, the first response letter Breath is that the second terminal is sent when the finger print information for verifying first finger print information and the decryption matches, described First response message is used to indicate the first finger print information verification and passes through;
Execution module is operated for performance objective, and the object run includes unlocking screen operation, logs in described default answer The combination of any one or more in the operation of operation and the unlock default application.
In a kind of possible design, when the object run includes unlocking screen operation, the detection module is specifically used In:
Whether the default application of detection in the state of the lock screen receives new information;
The object run includes when logging in the operation of the default application, and the detection module is specifically used for:
In the case where being not logged in the default application, detect whether the default application receives new information;
The object run includes when unlocking the operation of the default application, and the detection module is specifically used for:
In the case where not unlocking the default application, detect whether the default application receives new information.
In a kind of possible design, the sending module is also used to receive the second terminal in the receiving module After the first response message sent, Xiang Suoshu second terminal, which is sent, deletes instruction, and deletions, which instructs, is used to indicate described the The finger print information of decryption described in two terminal deletions.
In a kind of possible design, the sending module is also used to send out in the sending module to the second terminal After sending the decoding request for carrying identification information, if not receiving user within a preset period of time passes through the fingerprint input area The finger print information of input then sends to the second terminal and deletes instruction, and the deletion instruction is used to indicate the second terminal Delete the finger print information of the decryption.
In a kind of possible design, the detection module is also used to detect that described preset is answered in the detection module After receiving new information, before the sending module sends the decoding request for carrying identification information to second terminal, inspection Whether the sender for surveying new information is default sender;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that the sender of the new information is default sender, the sending module is to the Two terminals send the decoding request for carrying identification information.
In a kind of possible design, the detection module is also used to detect that described preset is answered in the detection module After receiving new information, before the sending module sends the decoding request for carrying identification information to second terminal, inspection It whether surveys in the new information comprising preset content;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects in the new information comprising preset content, the sending module is to second terminal Send the decoding request for carrying identification information.
The third aspect of the embodiment of the present invention discloses a kind of user terminal, and the user terminal includes: processor and storage Device, wherein the processor is for executing method described in the possible design of first aspect or first aspect.
In embodiments of the present invention, whether the default application of first terminal detection receives new information;If first terminal detects New information is received to default application, then first terminal sends the decoding request for carrying identification information, the mark to second terminal Information be first terminal mark or user mark, the decoding request be used for request second terminal by storage and identification information Corresponding finger print information is decrypted, the finger print information decrypted, and the finger print information of the decryption is used to send first terminal Finger print information verified.As it can be seen that, when detecting that default application receives information, being mentioned by implementing the embodiment of the present invention Before second terminal is decrypted to the finger print information of encryption, to save the time of finger print information decryption, and then shorten The time of finger-mark check improves the efficiency of finger-mark check.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the processing method of finger print information disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of the processing method of another finger print information disclosed by the embodiments of the present invention;
Fig. 3 is a kind of structural schematic diagram of user terminal disclosed by the embodiments of the present invention;
Fig. 4 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention;
Fig. 5 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of processing method of finger print information and user terminal, be conducive to improve finger print information The efficiency of verification.It is described in detail separately below.
Referring to Figure 1, Fig. 1 is a kind of flow diagram of the processing method of finger print information disclosed by the embodiments of the present invention. As shown in Figure 1, the processing method of the finger print information may include 101 and 102 parts.
101, whether the default application of first terminal detection receives new information.
In the embodiment of the present invention, the first terminal may include but be not limited to smart phone, tablet computer, laptop and Desktop computer etc. has the user terminal of fingerprint input area.The operating system of the user terminal may include but be not limited to Android operation system, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system, Windows operating system etc., the embodiment of the present invention is without limitation.
In the embodiment of the present invention, which is to be installed on the application of first terminal.User can be in advance in first terminal Which application is set for default application.For example, user can set default application for the application liked.
In the embodiment of the present invention, if first terminal detects that default application receives new information, 102 parts are executed.If First terminal is not detected default application and receives new information, then continues to execute 101 parts.
102, first terminal sends the decoding request for carrying identification information to second terminal.
In the embodiment of the present invention, which is the mark of first terminal or the mark of user.The mark of first terminal Mark for the identity information of first terminal, user can be for using account.For example, if first terminal and second terminal pass through certain One application interacts, then the mark of user can be the account information of the application.
In the embodiment of the present invention, the decoding request is for requesting corresponding with identification information fingerprint of the second terminal by storage Information is decrypted, the finger print information decrypted.
In embodiments of the present invention, first terminal is the fingerprint that user's input is verified by second terminal.Second terminal It is stored with the finger print information of encryption.After first terminal receives the finger print information of user's input, finger print information is sent to the Two terminals.The finger print information for the decryption that second terminal obtains before will use carries out school to the finger print information that first terminal is sent Test, i.e., second terminal compares the finger print information of finger print information and decryption that first terminal is sent, both judge whether Match, to be verified to the finger print information that first terminal is sent.
In practical applications, presetting application is the application that user compares attention, when default application receives new information, this When user very likely solved by finger-mark check function lock screen check new information or log in default application check new information or New information is checked in unlock application.Therefore, the embodiment of the present invention by when detecting that default application receives information, making the in advance The finger print information of encryption is decrypted in two terminals.After the finger print information that second terminal receives first terminal transmission, just The finger print information that the finger print information that can directly decrypt before use sends first terminal verifies, without receiving To first terminal send finger print information when just carry out finger print information decryption, thus save finger print information decrypt time, And then the time of finger-mark check is shortened, improve the efficiency of finger-mark check.
As an alternative embodiment, after first terminal detects that default application receives new information, the Before one terminal sends the decoding request for carrying identification information to second terminal, first terminal can also carry out following operation:
11) whether the sender for detecting new information is default sender;
If 12) sender of new information is default sender, first terminal is executed to second terminal and sends carrying mark The step of decoding request of information.
In this embodiment, for example, default sender can be user's pre-set terminal or pre-set It is people etc., the embodiment of the present invention is without limitation.
In practical applications, presetting every message user that application receives might not all want to check.For example, user The information that certain contact persons send may be only focused on.Therefore, if the new information that default application receives is that default sender sends , then user very likely checks.If the new information that default application receives is not that default sender sends, user pole has It may not check.
Therefore, by implementing the embodiment, it can more accurately predict whether user needs to solve lock screen or log in pre- If using or the default application of unlock check new information, without just making when default application receives new information every time the The finger print information of encryption is decrypted in two terminals, saves the cpu resource of second terminal.
As an alternative embodiment, after first terminal detects that default application receives new information, the Before one terminal sends the decoding request for carrying identification information to second terminal, first terminal can also carry out following operation:
21) whether detect in new information includes preset content;
If 22) in new information include preset content, first terminal is executed to second terminal and sends carrying identification information The step of decoding request.
In this embodiment, preset content can be some keywords etc..
In practical applications, presetting every message user that application receives might not want to check.For example, user can The information comprising certain contents, such as information of discount can be only focused on.Therefore, it is preset if the new packets that default application receives contain When content, then user very likely checks.If the new information that default application receives does not include preset content, user pole has It may not check.
Therefore, by implementing the embodiment, more accurately pre-set user whether can need to solve lock screen or log in pre- If using or the default application of unlock check new information, without just making when default application receives new information every time the The finger print information of encryption is decrypted in two terminals, saves the cpu resource of second terminal.
Fig. 2 is referred to, Fig. 2 is the process signal of the processing method of another finger print information disclosed by the embodiments of the present invention Figure.As shown in Fig. 2, the processing method of the finger print information may include 201~208 parts.
201, whether the default application of first terminal detection receives new information.
In the embodiment of the present invention, the specific implementation of 201 parts can be found in 101 part shown in FIG. 1, and this will not be repeated here.
202, first terminal sends the decoding request for carrying identification information to second terminal.
In the embodiment of the present invention, which is that the mark of first terminal or the mark of user, the decoding request are used for The finger print information corresponding with identification information of storage is decrypted request second terminal, the finger print information decrypted, the solution The finger print information that close finger print information is used to send first terminal verifies.
If 203, not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, to Two terminals, which are sent, deletes instruction.
In the embodiment of the present invention, deletion instruction is used to indicate the finger print information that second terminal deletes the decryption.
It, will be with after first terminal sends the decoding request for carrying identification information to second terminal in the embodiment of the present invention First terminal complete to second terminal send decoding request time be initial time, detection within a preset period of time user whether The finger print information inputted by fingerprint input area.If it is defeated by fingerprint input area that user is not detected within a preset period of time The finger print information that enters, then first terminal sends to be used to indicate second terminal and delete the finger print information of the decryption to second terminal and delete Except instruction.
Second terminal saves the finger print information of encryption, is the safety in order to improve finger print information.It will refer in second terminal After the decryption of line information, if saving the finger print information of decryption for a long time, it is easy to cause the finger print information of decryption dangerous.Therefore, if User does not need to carry out finger-mark check by second terminal in longer period, then second terminal can believe the fingerprint of decryption Breath is deleted, to ensure the safety of finger print information.
204, first terminal receives the first finger print information that user is inputted by fingerprint input area.
In the embodiment of the present invention, which can be fingerprint image or fingerprint feature information etc., and the present invention is real Apply example without limitation.
205, first terminal sends the verification including the first finger print information to second terminal and requests.
In the embodiment of the present invention, after second terminal receives verification request, the first finger print information can be verified and obtained before To the finger print information of decryption whether match.If matching, the first response message is sent to first terminal.It, can if mismatching Choosing, second terminal is used to indicate the first finger print information to first terminal transmission and verifies unsanctioned second response message.
206, first terminal receives the first response message that second terminal is sent.
In the embodiment of the present invention, the first response message is used to indicate the verification of the first finger print information and passes through.
207, first terminal performance objective operates.
In the embodiment of the present invention, object run includes that unlocking screen operation, the operation for logging in default application and unlock are pre- If the combination of any one or more in the operation of application.
By executing 204~207 parts, first terminal can make second terminal whole using the finger print information verification first of decryption The finger print information sent is held, to improve the efficiency of finger-mark check.And corresponding operation is just executed after finger-mark check success, it mentions The high safety of first terminal.
208, first terminal sends to second terminal and deletes instruction.
In the embodiment of the present invention, deletes instruction and be used to indicate the finger print information that second terminal deletes decryption.
In the embodiment of the present invention, after first terminal receives the first response message, the is used to indicate to second terminal transmission The deletion instruction of the finger print information of two terminal deletions decryption.So that second terminal can in time delete the finger print information of decryption, To ensure the safety of finger print information.
As an alternative embodiment, first terminal detection is default to answer when object run includes unlocking screen operation With whether receiving new information and include:
Whether the default application of first terminal detection in the state of the lock screen receives new information.
By implementing the embodiment, whenever whether first terminal, which need not all detect default application and receive, newly disappears Breath, saves the cpu resource of first terminal.
As an alternative embodiment, object run includes first terminal detection when logging in the operation of default application Whether default application, which receives new information, includes:
In the case where being not logged in default application, whether the default application of first terminal detection receives new information.
By implementing the embodiment, whenever whether first terminal, which need not all detect default application and receive, newly disappears Breath, saves the cpu resource of first terminal.
As an alternative embodiment, object run includes first terminal detection when unlocking the operation of default application Whether default application, which receives new information, includes:
In the case where not unlocking default application, whether the default application of first terminal detection receives new information.
By implementing the embodiment, whenever whether first terminal, which need not all detect default application and receive, newly disappears Breath, saves the cpu resource of first terminal.
The embodiment of the present invention can carry out the division of functional unit according to above method example to name node, for example, can With each functional module of each function division of correspondence, two or more functions can also be integrated in a module. Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs Illustrate, is schematical, only a kind of logical function partition to the division of module in the embodiment of the present invention, it is practical to realize When there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of user terminal disclosed by the embodiments of the present invention.As shown in figure 3, The user terminal may include detection module 301 and sending module 302.Wherein:
Detection module 301, for detecting whether default application receives new information.
Sending module 302, for when detection module 301 detects that default application receives new information, to second terminal The decoding request for carrying identification information is sent, which is the mark of user terminal or the mark of user, the decoding request For requesting second terminal that the finger print information corresponding with identification information of storage is decrypted, the finger print information decrypted, The finger print information that the finger print information of the decryption is used to send user terminal verifies.
As an alternative embodiment, detection module 301, is also used to detect default application in detection module 301 After receiving new information, before sending module 302 sends the decoding request for carrying identification information to second terminal, detection is new Whether the sender of message is default sender.
Sending module 302 sends the mode for carrying the decoding request of identification information to second terminal specifically:
If detection module 301 detects that the sender of new information is default sender, sending module 302 is to second terminal Send the decoding request for carrying identification information.
As an alternative embodiment, detection module 301, is also used to detect default application in detection module 301 After receiving new information, before sending module 302 sends the decoding request for carrying identification information to second terminal, detection is new It whether include preset content in message.
Sending module 302 sends the mode for carrying the decoding request of identification information to second terminal specifically:
If detection module 301 detects that, comprising preset content in new information, sending module 302 is taken to second terminal transmission The decoding request of tape identification information.
As an alternative embodiment, sending module 302, is also used to send in sending module 302 to second terminal After the decoding request for carrying identification information, if not receiving what user was inputted by fingerprint input area within a preset period of time Finger print information then sends to second terminal and deletes instruction, and deletion instruction is used to indicate the fingerprint letter that second terminal deletes decryption Breath.
Referring to Figure 4 together, Fig. 4 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.Wherein, User terminal shown in Fig. 4 is that user terminal as shown in Figure 3 optimizes.Compared with user terminal shown in Fig. 3 Compared with user terminal shown in Fig. 4 can also include receiving module in addition to all modules for including user terminal shown in Fig. 3 303 and execution module 304.Wherein:
Receiving module 303, the first finger print information inputted for receiving user by fingerprint input area.
Sending module 302 is also used to send the verification including the first finger print information to second terminal and request.
Receiving module 303 is also used to receive the first response message of second terminal transmission, which is second What terminal was sent when the finger print information for verifying the first finger print information and decryption matches, the first response message is used to indicate first Finger print information verification passes through.
Execution module 304 is operated for performance objective, and object run includes unlocking screen operation, logs in default application The combination of any one or more in the operation of operation and the default application of unlock.
Sending module 302 is also used to after the first response message that receiving module 303 receives that second terminal is sent, to Second terminal, which is sent, deletes instruction, and deletion instruction is used to indicate the finger print information that second terminal deletes decryption.
As an alternative embodiment, detection module 301 is specifically used when object run includes unlocking screen operation In:
Whether the default application of detection in the state of the lock screen receives new information.
Object run includes when logging in the operation of default application, and detection module 301 is specifically used for:
In the case where being not logged in default application, detect whether default application receives new information.
Object run includes when unlocking the operation of default application, and detection module 301 is specifically used for:
In the case where not unlocking default application, detect whether default application receives new information.
Fig. 5 is referred to, Fig. 5 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.Such as Fig. 5 institute Show, for ease of description, only parts related to embodiments of the present invention are shown, and it is disclosed by specific technical details, it please refers to Present invention method part.The user terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, By taking user terminal is mobile phone as an example:
Fig. 5 shows the block diagram of the part-structure of mobile phone relevant to user terminal provided in an embodiment of the present invention.Ginseng Fig. 5 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 510, memory 520, input unit 530, display unit 540, sensor 550, voicefrequency circuit 560, Wireless Fidelity (wireless fidelity, WiFi) module 570, processor 580, And the equal components of power supply 590.It will be understood by those skilled in the art that handset structure shown in Fig. 5 is not constituted to mobile phone It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 5 to mobile phone:
RF circuit 510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 580;In addition, the data for designing uplink are sent to base station.In general, RF circuit 510 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 510 can also be communicated with network and other equipment by wireless communication. Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 520 can be used for storing software program and module, and processor 580 is stored in memory 520 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 520 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 520 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 530 may include that touch panel 531 and other inputs are set Standby 532.Touch panel 531, also referred to as touch screen, collect user on it or nearby touch operation (such as user use The operation of any suitable object or attachment such as finger, stylus on touch panel 531 or near touch panel 531), and root Corresponding attachment device is driven according to preset formula.Optionally, touch panel 531 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinate, then gives processor 580, and can receive order that processor 580 is sent and be executed.Furthermore, it is possible to using electricity The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input Unit 530 can also include other input equipments 532.Specifically, other input equipments 532 can include but is not limited to secondary or physical bond One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 540 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 540 may include display panel 541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 541.Further, touch panel 531 can cover display panel 541, when touch panel 531 detect it is on it or attached After close touch operation, processor 580 is sent to determine the type of touch event, is followed by subsequent processing device 580 according to touch event Type corresponding visual output is provided on display panel 541.Although in Fig. 5, touch panel 531 and display panel 541 It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control Panel 531 and display panel 541 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 550, such as fingerprint sensor and other sensors.Also as mobile phone The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 560, loudspeaker 561, microphone 562 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 561, be converted to sound by loudspeaker 561 by road 560 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 562, is turned after being received by voicefrequency circuit 560 It is changed to audio data, then by after the processing of audio data output processor 580, such as another mobile phone is sent to through RF circuit 510, Or audio data is exported to memory 520 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 570 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 5 is shown WiFi module 570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 520, and call and be stored in memory 520 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 580 can wrap Include one or more processing units;Preferably, processor 580 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 580.
Mobile phone further includes the power supply 590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 580 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In previous embodiment, each step method process can be realized based on the structure of the terminal device.Wherein pass through sensing Device 550 or touch panel 531 can acquire the fingerprint of user's input, to obtain finger print information.
It should be noted that in the above-described embodiments, all emphasizing particularly on different fields to the description of each embodiment, in some embodiment The part being not described in, reference can be made to the related descriptions of other embodiments.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Module in the user terminal of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing the relevant hardware of terminal device by program, which can store in a computer readable storage medium In, storage medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
Detailed Jie has been carried out to the processing method and user terminal of a kind of finger print information disclosed by the embodiments of the present invention above It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (20)

1. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal Finger print information;
Wherein, after the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
The first terminal receives the first finger print information that user is inputted by fingerprint input area;
The first terminal sends the verification including first finger print information to the second terminal and requests;
The first terminal receives the first response message that the second terminal is sent, and first response message is described second What terminal was sent when the finger print information for verifying first finger print information and the decryption matches, first response message The first finger print information verification is used to indicate to pass through;
The first terminal performance objective operation, the object run include unlocking screen operation, log in the default application Operate and unlock the combination of any one or more in the operation of the default application.
2. the method according to claim 1, wherein the object run include unlocking screen operation when, it is described Whether the default application of first terminal detection, which receives new information, includes:
Whether the default application of first terminal detection receives new information in the state of the lock screen;
The object run includes when logging in the operation of the default application, and whether the first terminal detection default application Receiving new information includes:
In the case where being not logged in the default application, whether the first terminal detection default application, which receives, newly disappears Breath;
The object run includes when unlocking the operation of the default application, and whether the default application of first terminal detection receives Include: to new information
In the case where not unlocking the default application, whether the first terminal detection default application, which receives, newly disappears Breath.
3. the method according to claim 1, wherein the first terminal receive that the second terminal sends the After one response message, the method also includes:
The first terminal is sent to the second terminal deletes instruction, and the deletion instruction is used to indicate the second terminal and deletes Except the finger print information of the decryption.
4. method according to any one of claims 1 to 3, which is characterized in that the first terminal is sent out to second terminal After sending the decoding request for carrying identification information, the method also includes:
If not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, eventually to described second End, which is sent, deletes instruction, and the deletion instruction is used to indicate the finger print information that the second terminal deletes the decryption.
5. method according to any one of claims 1 to 3, which is characterized in that detected in the first terminal described After default application receives new information, the first terminal to second terminal send carry identification information decoding request it Before, the method also includes:
Whether the sender for detecting the new information is default sender;
If the sender of the new information is default sender, the first terminal is executed to second terminal and sends carrying mark The step of decoding request of information.
6. method according to any one of claims 1 to 3, which is characterized in that detected in the first terminal described After default application receives new information, the first terminal to second terminal send carry identification information decoding request it Before, the method also includes:
It whether detects in the new information comprising preset content;
If in the new information including preset content, the first terminal is executed to second terminal and sends carrying identification information The step of decoding request.
7. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal Finger print information;
Wherein, after the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
If not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, eventually to described second End, which is sent, deletes instruction, and the deletion instruction is used to indicate the finger print information that the second terminal deletes the decryption.
8. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal Finger print information;
Wherein, after the first terminal detects that the default application receives new information, in the first terminal to Before two terminals send the decoding request for carrying identification information, the method also includes:
Whether the sender for detecting the new information is default sender;
If the sender of the new information is default sender, the first terminal is executed to second terminal and sends carrying mark The step of decoding request of information.
9. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal Finger print information;
Wherein, after the first terminal detects that the default application receives new information, in the first terminal to Before two terminals send the decoding request for carrying identification information, the method also includes:
It whether detects in the new information comprising preset content;
If in the new information including preset content, the first terminal is executed to second terminal and sends carrying identification information The step of decoding request.
10. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal Send finger print information;
Wherein, the user terminal further include:
Receiving module, for receiving after the sending module sends the decoding request for carrying identification information to second terminal The first finger print information that user is inputted by fingerprint input area;
The sending module is also used to send the verification including first finger print information to the second terminal and request;
The receiving module, is also used to receive the first response message that the second terminal is sent, and first response message is What the second terminal was sent when the finger print information for verifying first finger print information and the decryption matches, described first Response message is used to indicate the first finger print information verification and passes through;
Execution module is operated for performance objective, and the object run includes unlocking screen operation, logs in the default application Operate and unlock the combination of any one or more in the operation of the default application.
11. user terminal according to claim 10, which is characterized in that the object run includes unlocking screen operation When, the detection module is specifically used for:
Whether the default application of detection in the state of the lock screen receives new information;
The object run includes when logging in the operation of the default application, and the detection module is specifically used for:
In the case where being not logged in the default application, detect whether the default application receives new information;
The object run includes when unlocking the operation of the default application, and the detection module is specifically used for:
In the case where not unlocking the default application, detect whether the default application receives new information.
12. user terminal according to claim 10, which is characterized in that
The sending module is also used to after the first response message that the receiving module receives that the second terminal is sent, It is sent to the second terminal and deletes instruction, the deletion instruction is used to indicate the fingerprint that the second terminal deletes the decryption Information.
13. user terminal described in 0~12 any one according to claim 1, which is characterized in that
The sending module is also used to send the decoding request of carrying identification information to the second terminal in the sending module Later, if not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, to described second Terminal, which is sent, deletes instruction, and the deletion instruction is used to indicate the finger print information that the second terminal deletes the decryption.
14. user terminal described in 0~12 any one according to claim 1, which is characterized in that
The detection module is also used to after the detection module detects that the default application receives new information, in institute Before stating the decoding request that sending module sends carrying identification information to second terminal, whether the sender for detecting new information is pre- If sender;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that the sender of the new information is default sender, the sending module is whole to second End sends the decoding request for carrying identification information.
15. user terminal described in 0~12 any one according to claim 1, which is characterized in that
The detection module is also used to after the detection module detects that the default application receives new information, in institute Before stating the decoding request that sending module sends carrying identification information to second terminal, whether detect in the new information comprising pre- If content;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that, comprising preset content in the new information, the sending module is sent to second terminal Carry the decoding request of identification information.
16. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal Send finger print information;
Wherein, the sending module is also used to send the solution of carrying identification information to the second terminal in the sending module After close request, if not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, to institute It states second terminal and sends deletion instruction, the deletion instruction is used to indicate the fingerprint letter that the second terminal deletes the decryption Breath.
17. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal Send finger print information;
The detection module is also used to after the detection module detects that the default application receives new information, in institute Before stating the decoding request that sending module sends carrying identification information to second terminal, whether the sender for detecting new information is pre- If sender;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that the sender of the new information is default sender, the sending module is whole to second End sends the decoding request for carrying identification information.
18. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal Send finger print information;
The detection module is also used to after the detection module detects that the default application receives new information, in institute Before stating the decoding request that sending module sends carrying identification information to second terminal, whether detect in the new information comprising pre- If content;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that, comprising preset content in the new information, the sending module is sent to second terminal Carry the decoding request of identification information.
19. a kind of user terminal, comprising: processor and memory, wherein the processor requires 1 to 9 for perform claim Method described in meaning one.
20. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, the computer instruction is for instructing user terminal related hardware, to complete side described in claim 1 to 9 any one Method.
CN201610368326.9A 2016-05-27 2016-05-27 A kind of processing method and user terminal of finger print information Active CN106022056B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610368326.9A CN106022056B (en) 2016-05-27 2016-05-27 A kind of processing method and user terminal of finger print information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610368326.9A CN106022056B (en) 2016-05-27 2016-05-27 A kind of processing method and user terminal of finger print information

Publications (2)

Publication Number Publication Date
CN106022056A CN106022056A (en) 2016-10-12
CN106022056B true CN106022056B (en) 2019-03-15

Family

ID=57091225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610368326.9A Active CN106022056B (en) 2016-05-27 2016-05-27 A kind of processing method and user terminal of finger print information

Country Status (1)

Country Link
CN (1) CN106022056B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN105549836A (en) * 2014-10-31 2016-05-04 腾讯科技(深圳)有限公司 Method for processing messages on screen-lock interface of mobile electronic terminal and mobile electronic terminal
CN105574389A (en) * 2015-06-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102013108714B3 (en) * 2013-08-12 2014-08-21 Deutsche Post Ag Support decryption of encrypted data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN105549836A (en) * 2014-10-31 2016-05-04 腾讯科技(深圳)有限公司 Method for processing messages on screen-lock interface of mobile electronic terminal and mobile electronic terminal
CN105574389A (en) * 2015-06-29 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Fingerprint identification method and terminal

Also Published As

Publication number Publication date
CN106022056A (en) 2016-10-12

Similar Documents

Publication Publication Date Title
WO2017118437A1 (en) Service processing method, device, and system
CN103634294B (en) Information verifying method and device
WO2017118412A1 (en) Method, apparatus and system for updating key
CN104796385B (en) Terminal binding method, apparatus and system
CN106912048B (en) Access point information sharing method and device
WO2015101273A1 (en) Security verification method, and related device and system
CN110417543B (en) Data encryption method, device and storage medium
CN104426963B (en) The method and terminal of associated terminal
CN107040609A (en) A kind of network request treating method and apparatus
CN103530562A (en) Method and device for identifying malicious websites
CN106341809B (en) A kind of data transmission method and equipment
CN105468952A (en) Authentication method and apparatus
CN108702357A (en) A kind of method, terminal device and service server authorizing authority migration
CN109102297A (en) A kind of voidable method of payment and device
WO2016192511A1 (en) Method and apparatus for remotely deleting information
CN104573437B (en) Information authentication method, device and terminal
CN104426848B (en) The method and system of log-on webpage application
CN104899488A (en) Numerical value transferring method and device
CN107102913B (en) Data back up method, device and computer equipment
CN104751333B (en) A kind of method, apparatus and system of information exchange
CN110418311A (en) A kind of interconnected method based on multiple terminals, device and terminal
CN107993300A (en) A kind of Work attendance method and device based on intelligent terminal
CN106067002B (en) A kind of finger print information processing method and user terminal
CN108234412A (en) Auth method and device
CN104104508B (en) Method of calibration, device and terminal device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: Guangdong OPPO Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant