CN106022056B - A kind of processing method and user terminal of finger print information - Google Patents
A kind of processing method and user terminal of finger print information Download PDFInfo
- Publication number
- CN106022056B CN106022056B CN201610368326.9A CN201610368326A CN106022056B CN 106022056 B CN106022056 B CN 106022056B CN 201610368326 A CN201610368326 A CN 201610368326A CN 106022056 B CN106022056 B CN 106022056B
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- finger print
- print information
- identification information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses a kind of processing method of finger print information and user terminals, wherein method includes: whether the default application of first terminal detection receives new information;If first terminal detects that default application receives new information, then first terminal sends the decoding request for carrying identification information to second terminal, the identification information is the mark of first terminal or the mark of user, the decoding request is for requesting second terminal that the finger print information corresponding with identification information of storage is decrypted, the finger print information decrypted, the finger print information that the finger print information of the decryption is used to send first terminal verify.As it can be seen that by implementing the embodiment of the present invention, when detecting that default application receives information, second terminal is decrypted to the finger print information of encryption, to save the time of finger print information decryption, and then the time of finger-mark check is shortened, improves the efficiency of finger-mark check.
Description
Technical field
The present invention relates to the processing methods and user terminal of field of communication technology more particularly to a kind of finger print information.
Background technique
It is at present the safety and convenience that improve user terminal (such as mobile phone, tablet computer), finger-mark check function quilt
It is widely used.
In practical applications, user terminal carries out finger-mark check frequently by other terminals, and verification is whole by then user
End executes corresponding operation (for example, solve lock screen or carry out the operation such as paying).For example, user terminal comes frequently by server
Finger-mark check is carried out, server is stored with registering fingerprint information, and the finger print information that user inputs is sent to service by user terminal
Device is verified;Server informs user terminal check results;If check results are that verification passes through, user terminal executes corresponding
Operation.In general, to improve the safety of registering fingerprint information, the registering fingerprint information for being stored in server can be encrypted.?
When server receives the finger print information of user terminal transmission, server needs for registering fingerprint information to be decrypted, then will solution
Close registering fingerprint information is compared with the finger print information that user terminal is sent, to user terminal send finger print information into
Row verification.
In practice, it has been found that such finger-mark check efficiency is lower, generally requires to take a long time and verified.
Summary of the invention
The embodiment of the invention discloses a kind of processing method of finger print information and user terminal, be conducive to improve finger print information
The efficiency of verification.
First aspect of the embodiment of the present invention discloses a kind of processing method of finger print information, which comprises
Whether the default application of first terminal detection receives new information;
If the first terminal detects the default application and receives new information, the first terminal is to second terminal
Send carry identification information decoding request, the identification information be the first terminal mark or user mark, it is described
Decoding request is obtained for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
The finger print information of decryption, the finger print information that the finger print information of the decryption is used to send the first terminal verify.
In a kind of possible design, the first terminal to second terminal send carry identification information decoding request it
Afterwards, the method also includes:
The first terminal receives user and passes through the first finger print information that the fingerprint input area inputs;
The first terminal sends the verification including first finger print information to the second terminal and requests;
The first terminal receives the first response message that the second terminal is sent, and first response message is described
What second terminal was sent when the finger print information for verifying first finger print information and the decryption matches, first response
Information is used to indicate the first finger print information verification and passes through;
First terminal performance objective operation, the object run include unlocking screen operation, log in described default answer
The combination of any one or more in the operation of operation and the unlock default application.
In a kind of possible design, when the object run includes unlocking screen operation, the first terminal detection is pre-
If using whether receiving new information and including:
Whether the default application of first terminal detection receives new information in the state of the lock screen;
The object run includes when logging in the operation of the default application, and the first terminal detects the default application
Whether receiving new information includes:
In the case where being not logged in the default application, it is new whether the first terminal detection default application receives
Message;
The object run includes when unlocking the operation of the default application, and whether the default application of first terminal detection
Receiving new information includes:
In the case where not unlocking the default application, it is new whether the first terminal detection default application receives
Message.
In a kind of possible design, the first terminal receive the first response message that the second terminal is sent it
Afterwards, the method also includes:
The first terminal is sent to the second terminal deletes instruction, and the deletion instruction is used to indicate described second eventually
Delete the finger print information of the decryption in end.
In a kind of possible design, the first terminal to second terminal send carry identification information decoding request it
Afterwards, the method also includes:
If not receiving user within a preset period of time passes through the finger print information that the fingerprint input area inputs, to institute
It states second terminal and sends deletion instruction, the deletion instruction is used to indicate the fingerprint letter that the second terminal deletes the decryption
Breath.
In a kind of possible design, after the first terminal detects that the default application receives new information,
Before the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
Whether the sender for detecting the new information is default sender;
If the sender of the new information is default sender, the first terminal is executed to second terminal and sends carrying
The step of decoding request of identification information.
In a kind of possible design, after the first terminal detects that the default application receives new information,
Before the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
It whether detects in the new information comprising preset content;
If in the new information including preset content, executes the first terminal and send to carry to identify to second terminal and believe
The step of decoding request of breath.
Second aspect of the embodiment of the present invention discloses a kind of user terminal, and the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for when the detection module detects that the default application receives new information, eventually to second
End sends the decoding request for carrying identification information, and the identification information is the mark of the user terminal or the mark of user, institute
Decoding request is stated for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted, is obtained
To the finger print information of decryption, the finger print information that the finger print information of the decryption is used to send the user terminal is verified.
In a kind of possible design, the user terminal further include:
Receiving module passes through the first finger print information that the fingerprint input area inputs for receiving user;
The sending module is also used to send the verification including first finger print information to the second terminal and request;
The receiving module is also used to receive the first response message that the second terminal is sent, the first response letter
Breath is that the second terminal is sent when the finger print information for verifying first finger print information and the decryption matches, described
First response message is used to indicate the first finger print information verification and passes through;
Execution module is operated for performance objective, and the object run includes unlocking screen operation, logs in described default answer
The combination of any one or more in the operation of operation and the unlock default application.
In a kind of possible design, when the object run includes unlocking screen operation, the detection module is specifically used
In:
Whether the default application of detection in the state of the lock screen receives new information;
The object run includes when logging in the operation of the default application, and the detection module is specifically used for:
In the case where being not logged in the default application, detect whether the default application receives new information;
The object run includes when unlocking the operation of the default application, and the detection module is specifically used for:
In the case where not unlocking the default application, detect whether the default application receives new information.
In a kind of possible design, the sending module is also used to receive the second terminal in the receiving module
After the first response message sent, Xiang Suoshu second terminal, which is sent, deletes instruction, and deletions, which instructs, is used to indicate described the
The finger print information of decryption described in two terminal deletions.
In a kind of possible design, the sending module is also used to send out in the sending module to the second terminal
After sending the decoding request for carrying identification information, if not receiving user within a preset period of time passes through the fingerprint input area
The finger print information of input then sends to the second terminal and deletes instruction, and the deletion instruction is used to indicate the second terminal
Delete the finger print information of the decryption.
In a kind of possible design, the detection module is also used to detect that described preset is answered in the detection module
After receiving new information, before the sending module sends the decoding request for carrying identification information to second terminal, inspection
Whether the sender for surveying new information is default sender;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that the sender of the new information is default sender, the sending module is to the
Two terminals send the decoding request for carrying identification information.
In a kind of possible design, the detection module is also used to detect that described preset is answered in the detection module
After receiving new information, before the sending module sends the decoding request for carrying identification information to second terminal, inspection
It whether surveys in the new information comprising preset content;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects in the new information comprising preset content, the sending module is to second terminal
Send the decoding request for carrying identification information.
The third aspect of the embodiment of the present invention discloses a kind of user terminal, and the user terminal includes: processor and storage
Device, wherein the processor is for executing method described in the possible design of first aspect or first aspect.
In embodiments of the present invention, whether the default application of first terminal detection receives new information;If first terminal detects
New information is received to default application, then first terminal sends the decoding request for carrying identification information, the mark to second terminal
Information be first terminal mark or user mark, the decoding request be used for request second terminal by storage and identification information
Corresponding finger print information is decrypted, the finger print information decrypted, and the finger print information of the decryption is used to send first terminal
Finger print information verified.As it can be seen that, when detecting that default application receives information, being mentioned by implementing the embodiment of the present invention
Before second terminal is decrypted to the finger print information of encryption, to save the time of finger print information decryption, and then shorten
The time of finger-mark check improves the efficiency of finger-mark check.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to needed in the embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, general for this field
For logical technical staff, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of the processing method of finger print information disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of the processing method of another finger print information disclosed by the embodiments of the present invention;
Fig. 3 is a kind of structural schematic diagram of user terminal disclosed by the embodiments of the present invention;
Fig. 4 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention;
Fig. 5 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a kind of processing method of finger print information and user terminal, be conducive to improve finger print information
The efficiency of verification.It is described in detail separately below.
Referring to Figure 1, Fig. 1 is a kind of flow diagram of the processing method of finger print information disclosed by the embodiments of the present invention.
As shown in Figure 1, the processing method of the finger print information may include 101 and 102 parts.
101, whether the default application of first terminal detection receives new information.
In the embodiment of the present invention, the first terminal may include but be not limited to smart phone, tablet computer, laptop and
Desktop computer etc. has the user terminal of fingerprint input area.The operating system of the user terminal may include but be not limited to
Android operation system, IOS operating system, Symbian (Saipan) operating system, Black Berry (blackberry, blueberry) operating system,
Windows operating system etc., the embodiment of the present invention is without limitation.
In the embodiment of the present invention, which is to be installed on the application of first terminal.User can be in advance in first terminal
Which application is set for default application.For example, user can set default application for the application liked.
In the embodiment of the present invention, if first terminal detects that default application receives new information, 102 parts are executed.If
First terminal is not detected default application and receives new information, then continues to execute 101 parts.
102, first terminal sends the decoding request for carrying identification information to second terminal.
In the embodiment of the present invention, which is the mark of first terminal or the mark of user.The mark of first terminal
Mark for the identity information of first terminal, user can be for using account.For example, if first terminal and second terminal pass through certain
One application interacts, then the mark of user can be the account information of the application.
In the embodiment of the present invention, the decoding request is for requesting corresponding with identification information fingerprint of the second terminal by storage
Information is decrypted, the finger print information decrypted.
In embodiments of the present invention, first terminal is the fingerprint that user's input is verified by second terminal.Second terminal
It is stored with the finger print information of encryption.After first terminal receives the finger print information of user's input, finger print information is sent to the
Two terminals.The finger print information for the decryption that second terminal obtains before will use carries out school to the finger print information that first terminal is sent
Test, i.e., second terminal compares the finger print information of finger print information and decryption that first terminal is sent, both judge whether
Match, to be verified to the finger print information that first terminal is sent.
In practical applications, presetting application is the application that user compares attention, when default application receives new information, this
When user very likely solved by finger-mark check function lock screen check new information or log in default application check new information or
New information is checked in unlock application.Therefore, the embodiment of the present invention by when detecting that default application receives information, making the in advance
The finger print information of encryption is decrypted in two terminals.After the finger print information that second terminal receives first terminal transmission, just
The finger print information that the finger print information that can directly decrypt before use sends first terminal verifies, without receiving
To first terminal send finger print information when just carry out finger print information decryption, thus save finger print information decrypt time,
And then the time of finger-mark check is shortened, improve the efficiency of finger-mark check.
As an alternative embodiment, after first terminal detects that default application receives new information, the
Before one terminal sends the decoding request for carrying identification information to second terminal, first terminal can also carry out following operation:
11) whether the sender for detecting new information is default sender;
If 12) sender of new information is default sender, first terminal is executed to second terminal and sends carrying mark
The step of decoding request of information.
In this embodiment, for example, default sender can be user's pre-set terminal or pre-set
It is people etc., the embodiment of the present invention is without limitation.
In practical applications, presetting every message user that application receives might not all want to check.For example, user
The information that certain contact persons send may be only focused on.Therefore, if the new information that default application receives is that default sender sends
, then user very likely checks.If the new information that default application receives is not that default sender sends, user pole has
It may not check.
Therefore, by implementing the embodiment, it can more accurately predict whether user needs to solve lock screen or log in pre-
If using or the default application of unlock check new information, without just making when default application receives new information every time the
The finger print information of encryption is decrypted in two terminals, saves the cpu resource of second terminal.
As an alternative embodiment, after first terminal detects that default application receives new information, the
Before one terminal sends the decoding request for carrying identification information to second terminal, first terminal can also carry out following operation:
21) whether detect in new information includes preset content;
If 22) in new information include preset content, first terminal is executed to second terminal and sends carrying identification information
The step of decoding request.
In this embodiment, preset content can be some keywords etc..
In practical applications, presetting every message user that application receives might not want to check.For example, user can
The information comprising certain contents, such as information of discount can be only focused on.Therefore, it is preset if the new packets that default application receives contain
When content, then user very likely checks.If the new information that default application receives does not include preset content, user pole has
It may not check.
Therefore, by implementing the embodiment, more accurately pre-set user whether can need to solve lock screen or log in pre-
If using or the default application of unlock check new information, without just making when default application receives new information every time the
The finger print information of encryption is decrypted in two terminals, saves the cpu resource of second terminal.
Fig. 2 is referred to, Fig. 2 is the process signal of the processing method of another finger print information disclosed by the embodiments of the present invention
Figure.As shown in Fig. 2, the processing method of the finger print information may include 201~208 parts.
201, whether the default application of first terminal detection receives new information.
In the embodiment of the present invention, the specific implementation of 201 parts can be found in 101 part shown in FIG. 1, and this will not be repeated here.
202, first terminal sends the decoding request for carrying identification information to second terminal.
In the embodiment of the present invention, which is that the mark of first terminal or the mark of user, the decoding request are used for
The finger print information corresponding with identification information of storage is decrypted request second terminal, the finger print information decrypted, the solution
The finger print information that close finger print information is used to send first terminal verifies.
If 203, not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, to
Two terminals, which are sent, deletes instruction.
In the embodiment of the present invention, deletion instruction is used to indicate the finger print information that second terminal deletes the decryption.
It, will be with after first terminal sends the decoding request for carrying identification information to second terminal in the embodiment of the present invention
First terminal complete to second terminal send decoding request time be initial time, detection within a preset period of time user whether
The finger print information inputted by fingerprint input area.If it is defeated by fingerprint input area that user is not detected within a preset period of time
The finger print information that enters, then first terminal sends to be used to indicate second terminal and delete the finger print information of the decryption to second terminal and delete
Except instruction.
Second terminal saves the finger print information of encryption, is the safety in order to improve finger print information.It will refer in second terminal
After the decryption of line information, if saving the finger print information of decryption for a long time, it is easy to cause the finger print information of decryption dangerous.Therefore, if
User does not need to carry out finger-mark check by second terminal in longer period, then second terminal can believe the fingerprint of decryption
Breath is deleted, to ensure the safety of finger print information.
204, first terminal receives the first finger print information that user is inputted by fingerprint input area.
In the embodiment of the present invention, which can be fingerprint image or fingerprint feature information etc., and the present invention is real
Apply example without limitation.
205, first terminal sends the verification including the first finger print information to second terminal and requests.
In the embodiment of the present invention, after second terminal receives verification request, the first finger print information can be verified and obtained before
To the finger print information of decryption whether match.If matching, the first response message is sent to first terminal.It, can if mismatching
Choosing, second terminal is used to indicate the first finger print information to first terminal transmission and verifies unsanctioned second response message.
206, first terminal receives the first response message that second terminal is sent.
In the embodiment of the present invention, the first response message is used to indicate the verification of the first finger print information and passes through.
207, first terminal performance objective operates.
In the embodiment of the present invention, object run includes that unlocking screen operation, the operation for logging in default application and unlock are pre-
If the combination of any one or more in the operation of application.
By executing 204~207 parts, first terminal can make second terminal whole using the finger print information verification first of decryption
The finger print information sent is held, to improve the efficiency of finger-mark check.And corresponding operation is just executed after finger-mark check success, it mentions
The high safety of first terminal.
208, first terminal sends to second terminal and deletes instruction.
In the embodiment of the present invention, deletes instruction and be used to indicate the finger print information that second terminal deletes decryption.
In the embodiment of the present invention, after first terminal receives the first response message, the is used to indicate to second terminal transmission
The deletion instruction of the finger print information of two terminal deletions decryption.So that second terminal can in time delete the finger print information of decryption,
To ensure the safety of finger print information.
As an alternative embodiment, first terminal detection is default to answer when object run includes unlocking screen operation
With whether receiving new information and include:
Whether the default application of first terminal detection in the state of the lock screen receives new information.
By implementing the embodiment, whenever whether first terminal, which need not all detect default application and receive, newly disappears
Breath, saves the cpu resource of first terminal.
As an alternative embodiment, object run includes first terminal detection when logging in the operation of default application
Whether default application, which receives new information, includes:
In the case where being not logged in default application, whether the default application of first terminal detection receives new information.
By implementing the embodiment, whenever whether first terminal, which need not all detect default application and receive, newly disappears
Breath, saves the cpu resource of first terminal.
As an alternative embodiment, object run includes first terminal detection when unlocking the operation of default application
Whether default application, which receives new information, includes:
In the case where not unlocking default application, whether the default application of first terminal detection receives new information.
By implementing the embodiment, whenever whether first terminal, which need not all detect default application and receive, newly disappears
Breath, saves the cpu resource of first terminal.
The embodiment of the present invention can carry out the division of functional unit according to above method example to name node, for example, can
With each functional module of each function division of correspondence, two or more functions can also be integrated in a module.
Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs
Illustrate, is schematical, only a kind of logical function partition to the division of module in the embodiment of the present invention, it is practical to realize
When there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of user terminal disclosed by the embodiments of the present invention.As shown in figure 3,
The user terminal may include detection module 301 and sending module 302.Wherein:
Detection module 301, for detecting whether default application receives new information.
Sending module 302, for when detection module 301 detects that default application receives new information, to second terminal
The decoding request for carrying identification information is sent, which is the mark of user terminal or the mark of user, the decoding request
For requesting second terminal that the finger print information corresponding with identification information of storage is decrypted, the finger print information decrypted,
The finger print information that the finger print information of the decryption is used to send user terminal verifies.
As an alternative embodiment, detection module 301, is also used to detect default application in detection module 301
After receiving new information, before sending module 302 sends the decoding request for carrying identification information to second terminal, detection is new
Whether the sender of message is default sender.
Sending module 302 sends the mode for carrying the decoding request of identification information to second terminal specifically:
If detection module 301 detects that the sender of new information is default sender, sending module 302 is to second terminal
Send the decoding request for carrying identification information.
As an alternative embodiment, detection module 301, is also used to detect default application in detection module 301
After receiving new information, before sending module 302 sends the decoding request for carrying identification information to second terminal, detection is new
It whether include preset content in message.
Sending module 302 sends the mode for carrying the decoding request of identification information to second terminal specifically:
If detection module 301 detects that, comprising preset content in new information, sending module 302 is taken to second terminal transmission
The decoding request of tape identification information.
As an alternative embodiment, sending module 302, is also used to send in sending module 302 to second terminal
After the decoding request for carrying identification information, if not receiving what user was inputted by fingerprint input area within a preset period of time
Finger print information then sends to second terminal and deletes instruction, and deletion instruction is used to indicate the fingerprint letter that second terminal deletes decryption
Breath.
Referring to Figure 4 together, Fig. 4 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.Wherein,
User terminal shown in Fig. 4 is that user terminal as shown in Figure 3 optimizes.Compared with user terminal shown in Fig. 3
Compared with user terminal shown in Fig. 4 can also include receiving module in addition to all modules for including user terminal shown in Fig. 3
303 and execution module 304.Wherein:
Receiving module 303, the first finger print information inputted for receiving user by fingerprint input area.
Sending module 302 is also used to send the verification including the first finger print information to second terminal and request.
Receiving module 303 is also used to receive the first response message of second terminal transmission, which is second
What terminal was sent when the finger print information for verifying the first finger print information and decryption matches, the first response message is used to indicate first
Finger print information verification passes through.
Execution module 304 is operated for performance objective, and object run includes unlocking screen operation, logs in default application
The combination of any one or more in the operation of operation and the default application of unlock.
Sending module 302 is also used to after the first response message that receiving module 303 receives that second terminal is sent, to
Second terminal, which is sent, deletes instruction, and deletion instruction is used to indicate the finger print information that second terminal deletes decryption.
As an alternative embodiment, detection module 301 is specifically used when object run includes unlocking screen operation
In:
Whether the default application of detection in the state of the lock screen receives new information.
Object run includes when logging in the operation of default application, and detection module 301 is specifically used for:
In the case where being not logged in default application, detect whether default application receives new information.
Object run includes when unlocking the operation of default application, and detection module 301 is specifically used for:
In the case where not unlocking default application, detect whether default application receives new information.
Fig. 5 is referred to, Fig. 5 is the structural schematic diagram of another user terminal disclosed by the embodiments of the present invention.Such as Fig. 5 institute
Show, for ease of description, only parts related to embodiments of the present invention are shown, and it is disclosed by specific technical details, it please refers to
Present invention method part.The user terminal can be include mobile phone, tablet computer, PDA (Personal Digital
Assistant, personal digital assistant), POS (Point of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer,
By taking user terminal is mobile phone as an example:
Fig. 5 shows the block diagram of the part-structure of mobile phone relevant to user terminal provided in an embodiment of the present invention.Ginseng
Fig. 5 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 510, memory 520, input unit 530, display unit
540, sensor 550, voicefrequency circuit 560, Wireless Fidelity (wireless fidelity, WiFi) module 570, processor 580,
And the equal components of power supply 590.It will be understood by those skilled in the art that handset structure shown in Fig. 5 is not constituted to mobile phone
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 5 to mobile phone:
RF circuit 510 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 580;In addition, the data for designing uplink are sent to base station.In general, RF circuit 510
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..In addition, RF circuit 510 can also be communicated with network and other equipment by wireless communication.
Any communication standard or agreement, including but not limited to global system for mobile communications (Global can be used in above-mentioned wireless communication
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access
(Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution,
LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 520 can be used for storing software program and module, and processor 580 is stored in memory 520 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 520 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 520 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
Input unit 530 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 530 may include that touch panel 531 and other inputs are set
Standby 532.Touch panel 531, also referred to as touch screen, collect user on it or nearby touch operation (such as user use
The operation of any suitable object or attachment such as finger, stylus on touch panel 531 or near touch panel 531), and root
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 531 may include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinate, then gives processor 580, and can receive order that processor 580 is sent and be executed.Furthermore, it is possible to using electricity
The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 531.In addition to touch panel 531, input
Unit 530 can also include other input equipments 532.Specifically, other input equipments 532 can include but is not limited to secondary or physical bond
One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 540 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 540 may include display panel 541, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 541.Further, touch panel 531 can cover display panel 541, when touch panel 531 detect it is on it or attached
After close touch operation, processor 580 is sent to determine the type of touch event, is followed by subsequent processing device 580 according to touch event
Type corresponding visual output is provided on display panel 541.Although in Fig. 5, touch panel 531 and display panel 541
It is that the input and input function of mobile phone are realized as two independent components, but in some embodiments it is possible to by touch-control
Panel 531 and display panel 541 are integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 550, such as fingerprint sensor and other sensors.Also as mobile phone
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 560, loudspeaker 561, microphone 562 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 561, be converted to sound by loudspeaker 561 by road 560
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 562, is turned after being received by voicefrequency circuit 560
It is changed to audio data, then by after the processing of audio data output processor 580, such as another mobile phone is sent to through RF circuit 510,
Or audio data is exported to memory 520 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 570
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 5 is shown
WiFi module 570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 520, and call and be stored in memory 520
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 580 can wrap
Include one or more processing units;Preferably, processor 580 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 580.
Mobile phone further includes the power supply 590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 580 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In previous embodiment, each step method process can be realized based on the structure of the terminal device.Wherein pass through sensing
Device 550 or touch panel 531 can acquire the fingerprint of user's input, to obtain finger print information.
It should be noted that in the above-described embodiments, all emphasizing particularly on different fields to the description of each embodiment, in some embodiment
The part being not described in, reference can be made to the related descriptions of other embodiments.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
The steps in the embodiment of the present invention can be sequentially adjusted, merged and deleted according to actual needs.
Module in the user terminal of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing the relevant hardware of terminal device by program, which can store in a computer readable storage medium
In, storage medium may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random
Access Memory, RAM), disk or CD etc..
Detailed Jie has been carried out to the processing method and user terminal of a kind of finger print information disclosed by the embodiments of the present invention above
It continues, used herein a specific example illustrates the principle and implementation of the invention, and the explanation of above embodiments is only
It is to be used to help understand method and its core concept of the invention;At the same time, for those skilled in the art, according to this hair
Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage
Solution is limitation of the present invention.
Claims (20)
1. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal
The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption
Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute
It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal
Finger print information;
Wherein, after the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
The first terminal receives the first finger print information that user is inputted by fingerprint input area;
The first terminal sends the verification including first finger print information to the second terminal and requests;
The first terminal receives the first response message that the second terminal is sent, and first response message is described second
What terminal was sent when the finger print information for verifying first finger print information and the decryption matches, first response message
The first finger print information verification is used to indicate to pass through;
The first terminal performance objective operation, the object run include unlocking screen operation, log in the default application
Operate and unlock the combination of any one or more in the operation of the default application.
2. the method according to claim 1, wherein the object run include unlocking screen operation when, it is described
Whether the default application of first terminal detection, which receives new information, includes:
Whether the default application of first terminal detection receives new information in the state of the lock screen;
The object run includes when logging in the operation of the default application, and whether the first terminal detection default application
Receiving new information includes:
In the case where being not logged in the default application, whether the first terminal detection default application, which receives, newly disappears
Breath;
The object run includes when unlocking the operation of the default application, and whether the default application of first terminal detection receives
Include: to new information
In the case where not unlocking the default application, whether the first terminal detection default application, which receives, newly disappears
Breath.
3. the method according to claim 1, wherein the first terminal receive that the second terminal sends the
After one response message, the method also includes:
The first terminal is sent to the second terminal deletes instruction, and the deletion instruction is used to indicate the second terminal and deletes
Except the finger print information of the decryption.
4. method according to any one of claims 1 to 3, which is characterized in that the first terminal is sent out to second terminal
After sending the decoding request for carrying identification information, the method also includes:
If not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, eventually to described second
End, which is sent, deletes instruction, and the deletion instruction is used to indicate the finger print information that the second terminal deletes the decryption.
5. method according to any one of claims 1 to 3, which is characterized in that detected in the first terminal described
After default application receives new information, the first terminal to second terminal send carry identification information decoding request it
Before, the method also includes:
Whether the sender for detecting the new information is default sender;
If the sender of the new information is default sender, the first terminal is executed to second terminal and sends carrying mark
The step of decoding request of information.
6. method according to any one of claims 1 to 3, which is characterized in that detected in the first terminal described
After default application receives new information, the first terminal to second terminal send carry identification information decoding request it
Before, the method also includes:
It whether detects in the new information comprising preset content;
If in the new information including preset content, the first terminal is executed to second terminal and sends carrying identification information
The step of decoding request.
7. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal
The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption
Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute
It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal
Finger print information;
Wherein, after the first terminal sends the decoding request for carrying identification information to second terminal, the method also includes:
If not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, eventually to described second
End, which is sent, deletes instruction, and the deletion instruction is used to indicate the finger print information that the second terminal deletes the decryption.
8. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal
The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption
Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute
It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal
Finger print information;
Wherein, after the first terminal detects that the default application receives new information, in the first terminal to
Before two terminals send the decoding request for carrying identification information, the method also includes:
Whether the sender for detecting the new information is default sender;
If the sender of the new information is default sender, the first terminal is executed to second terminal and sends carrying mark
The step of decoding request of information.
9. a kind of processing method of finger print information, which is characterized in that the described method includes:
Whether the default application of first terminal detection receives new information;
If the first terminal detects that the default application receives new information, the first terminal is sent to second terminal
The decoding request of identification information is carried, the identification information is the mark of the first terminal or the mark of user, the decryption
Request is decrypted for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Finger print information, the finger print information that the finger print information of the decryption is used to send the first terminal verifies, wherein institute
It states first terminal and sends the decoding request for carrying identification information to second terminal, sent prior to the first terminal to second terminal
Finger print information;
Wherein, after the first terminal detects that the default application receives new information, in the first terminal to
Before two terminals send the decoding request for carrying identification information, the method also includes:
It whether detects in the new information comprising preset content;
If in the new information including preset content, the first terminal is executed to second terminal and sends carrying identification information
The step of decoding request.
10. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information
The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution
Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein
The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal
Send finger print information;
Wherein, the user terminal further include:
Receiving module, for receiving after the sending module sends the decoding request for carrying identification information to second terminal
The first finger print information that user is inputted by fingerprint input area;
The sending module is also used to send the verification including first finger print information to the second terminal and request;
The receiving module, is also used to receive the first response message that the second terminal is sent, and first response message is
What the second terminal was sent when the finger print information for verifying first finger print information and the decryption matches, described first
Response message is used to indicate the first finger print information verification and passes through;
Execution module is operated for performance objective, and the object run includes unlocking screen operation, logs in the default application
Operate and unlock the combination of any one or more in the operation of the default application.
11. user terminal according to claim 10, which is characterized in that the object run includes unlocking screen operation
When, the detection module is specifically used for:
Whether the default application of detection in the state of the lock screen receives new information;
The object run includes when logging in the operation of the default application, and the detection module is specifically used for:
In the case where being not logged in the default application, detect whether the default application receives new information;
The object run includes when unlocking the operation of the default application, and the detection module is specifically used for:
In the case where not unlocking the default application, detect whether the default application receives new information.
12. user terminal according to claim 10, which is characterized in that
The sending module is also used to after the first response message that the receiving module receives that the second terminal is sent,
It is sent to the second terminal and deletes instruction, the deletion instruction is used to indicate the fingerprint that the second terminal deletes the decryption
Information.
13. user terminal described in 0~12 any one according to claim 1, which is characterized in that
The sending module is also used to send the decoding request of carrying identification information to the second terminal in the sending module
Later, if not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, to described second
Terminal, which is sent, deletes instruction, and the deletion instruction is used to indicate the finger print information that the second terminal deletes the decryption.
14. user terminal described in 0~12 any one according to claim 1, which is characterized in that
The detection module is also used to after the detection module detects that the default application receives new information, in institute
Before stating the decoding request that sending module sends carrying identification information to second terminal, whether the sender for detecting new information is pre-
If sender;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that the sender of the new information is default sender, the sending module is whole to second
End sends the decoding request for carrying identification information.
15. user terminal described in 0~12 any one according to claim 1, which is characterized in that
The detection module is also used to after the detection module detects that the default application receives new information, in institute
Before stating the decoding request that sending module sends carrying identification information to second terminal, whether detect in the new information comprising pre-
If content;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that, comprising preset content in the new information, the sending module is sent to second terminal
Carry the decoding request of identification information.
16. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information
The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution
Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein
The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal
Send finger print information;
Wherein, the sending module is also used to send the solution of carrying identification information to the second terminal in the sending module
After close request, if not receiving the finger print information that user is inputted by fingerprint input area within a preset period of time, to institute
It states second terminal and sends deletion instruction, the deletion instruction is used to indicate the fingerprint letter that the second terminal deletes the decryption
Breath.
17. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information
The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution
Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein
The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal
Send finger print information;
The detection module is also used to after the detection module detects that the default application receives new information, in institute
Before stating the decoding request that sending module sends carrying identification information to second terminal, whether the sender for detecting new information is pre-
If sender;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that the sender of the new information is default sender, the sending module is whole to second
End sends the decoding request for carrying identification information.
18. a kind of user terminal, which is characterized in that the user terminal includes:
Detection module, for detecting whether default application receives new information;
Sending module, for being sent out to second terminal when the detection module detects that the default application receives new information
The decoding request for carrying identification information is sent, the identification information is the mark of the user terminal or the mark of user, the solution
Close request is solved for requesting the second terminal that the finger print information corresponding with the identification information of storage is decrypted
Close finger print information, the finger print information that the finger print information of the decryption is used to send the user terminal verify, wherein
The sending module sends the decoding request for carrying identification information to second terminal, sends out prior to the sending module to second terminal
Send finger print information;
The detection module is also used to after the detection module detects that the default application receives new information, in institute
Before stating the decoding request that sending module sends carrying identification information to second terminal, whether detect in the new information comprising pre-
If content;
The sending module sends the mode for carrying the decoding request of identification information to second terminal specifically:
If the detection module detects that, comprising preset content in the new information, the sending module is sent to second terminal
Carry the decoding request of identification information.
19. a kind of user terminal, comprising: processor and memory, wherein the processor requires 1 to 9 for perform claim
Method described in meaning one.
20. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to
It enables, the computer instruction is for instructing user terminal related hardware, to complete side described in claim 1 to 9 any one
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610368326.9A CN106022056B (en) | 2016-05-27 | 2016-05-27 | A kind of processing method and user terminal of finger print information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610368326.9A CN106022056B (en) | 2016-05-27 | 2016-05-27 | A kind of processing method and user terminal of finger print information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106022056A CN106022056A (en) | 2016-10-12 |
CN106022056B true CN106022056B (en) | 2019-03-15 |
Family
ID=57091225
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610368326.9A Active CN106022056B (en) | 2016-05-27 | 2016-05-27 | A kind of processing method and user terminal of finger print information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106022056B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
CN105549836A (en) * | 2014-10-31 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Method for processing messages on screen-lock interface of mobile electronic terminal and mobile electronic terminal |
CN105574389A (en) * | 2015-06-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint identification method and terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102013108714B3 (en) * | 2013-08-12 | 2014-08-21 | Deutsche Post Ag | Support decryption of encrypted data |
-
2016
- 2016-05-27 CN CN201610368326.9A patent/CN106022056B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
CN105549836A (en) * | 2014-10-31 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Method for processing messages on screen-lock interface of mobile electronic terminal and mobile electronic terminal |
CN105574389A (en) * | 2015-06-29 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint identification method and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106022056A (en) | 2016-10-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017118437A1 (en) | Service processing method, device, and system | |
CN103634294B (en) | Information verifying method and device | |
WO2017118412A1 (en) | Method, apparatus and system for updating key | |
CN104796385B (en) | Terminal binding method, apparatus and system | |
CN106912048B (en) | Access point information sharing method and device | |
WO2015101273A1 (en) | Security verification method, and related device and system | |
CN110417543B (en) | Data encryption method, device and storage medium | |
CN104426963B (en) | The method and terminal of associated terminal | |
CN107040609A (en) | A kind of network request treating method and apparatus | |
CN103530562A (en) | Method and device for identifying malicious websites | |
CN106341809B (en) | A kind of data transmission method and equipment | |
CN105468952A (en) | Authentication method and apparatus | |
CN108702357A (en) | A kind of method, terminal device and service server authorizing authority migration | |
CN109102297A (en) | A kind of voidable method of payment and device | |
WO2016192511A1 (en) | Method and apparatus for remotely deleting information | |
CN104573437B (en) | Information authentication method, device and terminal | |
CN104426848B (en) | The method and system of log-on webpage application | |
CN104899488A (en) | Numerical value transferring method and device | |
CN107102913B (en) | Data back up method, device and computer equipment | |
CN104751333B (en) | A kind of method, apparatus and system of information exchange | |
CN110418311A (en) | A kind of interconnected method based on multiple terminals, device and terminal | |
CN107993300A (en) | A kind of Work attendance method and device based on intelligent terminal | |
CN106067002B (en) | A kind of finger print information processing method and user terminal | |
CN108234412A (en) | Auth method and device | |
CN104104508B (en) | Method of calibration, device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |