CN107395363B - Fingerprint sharing method and mobile terminal - Google Patents

Fingerprint sharing method and mobile terminal Download PDF

Info

Publication number
CN107395363B
CN107395363B CN201710643494.9A CN201710643494A CN107395363B CN 107395363 B CN107395363 B CN 107395363B CN 201710643494 A CN201710643494 A CN 201710643494A CN 107395363 B CN107395363 B CN 107395363B
Authority
CN
China
Prior art keywords
mobile terminal
fingerprint
template information
request
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710643494.9A
Other languages
Chinese (zh)
Other versions
CN107395363A (en
Inventor
张腾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing North Star Technology Development Co ltd
Original Assignee
Nanjing Zhongchengxie Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Zhongchengxie Information Technology Co Ltd filed Critical Nanjing Zhongchengxie Information Technology Co Ltd
Priority to CN201710643494.9A priority Critical patent/CN107395363B/en
Publication of CN107395363A publication Critical patent/CN107395363A/en
Application granted granted Critical
Publication of CN107395363B publication Critical patent/CN107395363B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1347Preprocessing; Feature extraction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a mobile terminal, which comprises a memory, a processor and a fingerprint sharing program which is stored on the memory and can be operated on the processor, wherein the fingerprint sharing program realizes the following steps when being executed by the processor: detecting a fingerprint sharing request in real time; judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal have the same algorithm; if the algorithms are the same, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal so that the requesting mobile terminal compares the acquired fingerprint characteristic information of the current fingerprint image with the fingerprint template information; if the algorithms are different, acquiring fingerprint template information and a feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal, so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information. Compared with the prior art, the fingerprint sharing method realizes the fingerprint sharing between the two mobile terminals.

Description

Fingerprint sharing method and mobile terminal
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a fingerprint sharing method and a mobile terminal.
Background
With the development and popularization of the mobile internet, a user may use a plurality of mobile phones. Among the plurality of mobile phones, there are mobile phones that are frequently used by users, mobile phones that are not frequently used by users, and mobile phones that are newly purchased by users. In general, a user may perform more perfect initialization setting in a common mobile phone, such as setting a fingerprint, a password, and the like, while some less common mobile phones may be used only for making a call or other operations, and thus the user may not perform fingerprint or password setting. However, in some cases, the user may need to use these mobile phones that are not commonly used or new mobile phones to perform security operations, such as payment, transfer, unlocking, etc., and at this time, a fingerprint or password is needed, so that the user needs to initialize a fingerprint or a password on these mobile phones, which has the following disadvantages: (1) the personal initialization operation of setting the password and setting the fingerprint is related to privacy security, and if the mobile phones are public or other users can use the mobile phones, the privacy can be leaked; (2) the user may accidentally use the mobile phone (e.g., someone else's mobile phone or a new mobile phone) for a few times, so that it is troublesome to reset the fingerprint or password and unnecessary.
Therefore, it is necessary to provide a fingerprint sharing method and a mobile terminal to solve the above technical problems.
Disclosure of Invention
The invention mainly aims to provide a fingerprint sharing method and a mobile terminal, and aims to solve the problem that when a user uses a fingerprint on a mobile terminal which is not frequently used, newly bought or belongs to other people, the fingerprint needs to be initialized, and realize the fingerprint sharing among a plurality of devices.
First, to achieve the above object, the present invention provides a mobile terminal, including a memory, a processor, and a fingerprint sharing program stored in the memory and operable on the processor, where the fingerprint sharing program, when executed by the processor, implements the following steps:
detecting a fingerprint sharing request in real time;
when a fingerprint sharing request is detected, judging whether the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same;
if the judgment result is that the algorithms are the same, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal so that the requesting mobile terminal compares the acquired fingerprint feature information of the current fingerprint image with the fingerprint template information, wherein the fingerprint template information is obtained by calculating an initial fingerprint image on the current mobile terminal through a feature extraction algorithm;
and if the judgment result shows that the algorithms are different, acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
Optionally, the processor is further configured to execute the fingerprint sharing program to implement the following steps:
reading standard fingerprint template information from an encrypted storage area;
and decrypting the standard fingerprint template information through a pre-stored decryption algorithm and a key to obtain the fingerprint template information.
Optionally, before the step of determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm, the processor is further configured to execute the fingerprint sharing program to implement the following steps:
judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal are the same in principle or not;
if the judgment result is that the principle is the same, executing the step of judging whether the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same;
and if the judgment result is that the principle is different, executing the step of acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
Optionally, the processor is further configured to execute the fingerprint sharing program to implement the following steps:
receiving a connection request of the request mobile terminal, establishing wireless connection with the request mobile terminal, performing identity verification on the request mobile terminal, and executing the step of detecting the fingerprint sharing request in real time if the identity verification is passed;
obtaining the models of the current mobile terminal and the requested mobile terminal, judging whether the models of the current mobile terminal and the requested mobile terminal are the same, and if the judgment result is that the models are the same, judging that the algorithms of the fingerprint modules of the current mobile terminal and the requested mobile terminal are the same.
Meanwhile, the invention also provides a fingerprint sharing method, which is applied to the mobile terminal and comprises the following steps:
detecting a fingerprint sharing request in real time;
when a fingerprint sharing request is detected, judging whether the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same;
if the judgment result is that the algorithms are the same, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal so that the requesting mobile terminal compares the acquired fingerprint feature information of the current fingerprint image with the fingerprint template information, wherein the fingerprint template information is obtained by calculating an initial fingerprint image on the current mobile terminal through a feature extraction algorithm;
and if the judgment result shows that the algorithms are different, acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
Optionally, the step of acquiring fingerprint template information includes:
reading standard fingerprint template information from an encrypted storage area;
and decrypting the standard fingerprint template information through a pre-stored decryption algorithm and a key to obtain the fingerprint template information.
Optionally, before the step of determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm, the method further includes:
judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal are the same in principle or not;
if the judgment result is that the principle is the same, executing the step of judging whether the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same;
and if the judgment result is that the principle is different, executing the step of acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
Optionally, the step of determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm specifically includes:
obtaining the models of the current mobile terminal and the requested mobile terminal;
judging whether the models of the current mobile terminal and the request mobile terminal are the same;
and if the judgment result is that the types are the same, judging that the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same.
Optionally, the step of detecting a fingerprint sharing request in real time further includes:
receiving a connection request of the request mobile terminal and establishing wireless connection with the request mobile terminal;
and performing identity authentication on the request mobile terminal, and if the identity authentication is passed, executing the step of detecting the fingerprint sharing request in real time.
Furthermore, to achieve the above object, the present invention also provides a computer readable storage medium having a fingerprint sharing program stored thereon, which when executed by a processor implements the steps of the above fingerprint sharing method.
Compared with the prior art, the fingerprint sharing method, the mobile terminal and the computer readable storage medium provided by the invention have the advantages that the fingerprint sharing between the two mobile terminals is realized, the problem that the fingerprint needs to be initialized and set when the user uses the fingerprint on the mobile terminal which is not commonly used, newly bought or belongs to other people is avoided, the user operation is simplified, and the safety of the user operation is improved; and whether the algorithms of the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same or not is judged, the fingerprint template information is shared when the algorithms are the same, and the feature extraction algorithm and the fingerprint template information are shared when the algorithms are different, so that the problem of fingerprint identification errors caused by different algorithms of the two mobile terminals is solved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention;
fig. 2 is a diagram of a communication network system architecture according to an embodiment of the present invention;
FIG. 3 is a functional block diagram of a fingerprint sharing program according to a first embodiment of the present invention;
FIG. 4 is a functional block diagram of a fingerprint sharing program according to a second embodiment of the present invention;
FIG. 5 is a flowchart illustrating a first embodiment of a fingerprint sharing method according to the present invention;
FIG. 6 is a flowchart illustrating a second embodiment of a fingerprint sharing method according to the present invention;
fig. 7 is a diagram illustrating an embodiment when mobile terminal B requests a fingerprint from mobile terminal a.
Reference numerals:
Figure BDA0001366369720000041
Figure BDA0001366369720000051
Figure BDA0001366369720000061
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of a mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, WiFi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
WiFi belongs to short-distance wireless transmission technology, and the mobile terminal can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 102, and provides wireless broadband internet access for the user. Although fig. 1 shows the WiFi module 102, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphic processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to various components, and preferably, the power supply 111 may be logically connected to the processor 110 via a power management system, so as to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the hardware structure of the mobile terminal 100 and the communication network system, various embodiments of the method of the present invention are provided.
First, the present invention proposes a mobile terminal comprising a memory, a processor and a fingerprint sharing program 400 stored on the memory and operable on the processor.
Fig. 3 is a functional block diagram of a fingerprint sharing program 400 according to a first embodiment of the present invention. In this embodiment, the fingerprint sharing program 400 may be divided into one or more modules, and the one or more modules are stored in the memory 109 of the mobile terminal 100 and executed by one or more processors (in this embodiment, the controller 110) to complete the present invention. For example, in fig. 3, the fingerprint sharing program 400 may be divided into a detection module 401, an algorithm determination module 402, a first sharing module 403, and a second sharing module 404. The module referred to in the present invention refers to a series of instruction segments of the fetcher program that can perform specific functions, and is more suitable than the fetcher program for describing the execution process of the software in the mobile terminal 100. The detailed description of the functions of the functional modules 401 and 404 will be described below. Wherein:
the detection module 401 is configured to detect a fingerprint sharing request in real time.
Referring to fig. 7, fig. 7 is a schematic diagram of an embodiment when a mobile terminal B requests a fingerprint from a mobile terminal a, where the mobile terminal a is denoted as a current mobile terminal, which represents a mobile terminal that is frequently used by a user and has a fingerprint set during initialization setting, and the mobile terminal B is a mobile terminal that is not frequently used by the user, newly purchased, or belongs to another person, and is denoted as a requesting mobile terminal in this embodiment. When a user performs a secret-related operation (such as a fingerprint payment operation, a fingerprint transfer operation, a fingerprint unlocking operation, and the like) requiring a fingerprint through the mobile terminal B, a fingerprint sharing request may be sent to the mobile terminal a through the mobile terminal B to obtain the fingerprint stored on the mobile terminal a. For the mobile terminal A, after the fingerprint sharing function is started, the fingerprint sharing request is detected in real time.
The algorithm determining module 402 is configured to determine whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same in algorithm when the fingerprint sharing request is detected.
In this embodiment, when the mobile terminal a receives a fingerprint sharing request from the mobile terminal B, the fingerprint sharing method of the present invention first determines whether the algorithms of the fingerprint modules in the mobile terminal a and the mobile terminal B are the same, wherein the step of determining whether the algorithms of the fingerprint modules are the same specifically includes: (1) obtaining the models of the current mobile terminal and the requested mobile terminal; (2) judging whether the models of the current mobile terminal and the request mobile terminal are the same; (3) and if the judgment result is that the types are the same, judging that the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same. The judgment basis of the judgment process is as follows: the fingerprint modules adopted by mobile terminals with different operating systems, brands and models may be different, specifically, the fingerprint image acquisition modes and feature extraction algorithms in the fingerprint modules are different, and the fingerprint modules of the mobile terminals with the same model are the same, that is, the image acquisition modes and the feature extraction algorithms are the same. Therefore, whether the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same or not can be judged according to the model of the mobile terminal. In addition, in other preferred embodiments, the method for determining whether the fingerprint modules have the same algorithm may further be: the method comprises the steps that a mobile terminal grouping list is preset on a current mobile terminal, the mobile terminal grouping list is a mobile terminal for counting various operating systems, brands and models existing in the current market, then grouping lists are conducted according to different algorithms of a fingerprint module, whether the current mobile terminal and a request mobile terminal are in the same group or not can be checked through the mobile terminal grouping list, when the current mobile terminal and the request mobile terminal are in the same group, the algorithms of the current mobile terminal and the request mobile terminal are the same, and otherwise, the algorithms of the current mobile terminal and the request mobile terminal are different. It should be noted that, only two implementations of determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm are described above, and the implementations as long as the steps can be implemented all belong to the protection scope of the present invention. In addition, the invention only considers the condition that the fingerprint image acquisition mode is the same, namely the default image acquisition mode of the current mobile terminal is the same as that of the request mobile terminal, and only the characteristic extraction algorithm can be the same or different.
The first sharing module 403 is configured to, when the determination result is that the algorithms are the same, acquire fingerprint template information and send the fingerprint template information to the requesting mobile terminal, so that the requesting mobile terminal compares the fingerprint feature information of the acquired current fingerprint image with the fingerprint template information, where the fingerprint template information is obtained by calculating an initial fingerprint image on the current mobile terminal through a feature extraction algorithm.
In order to better illustrate the fingerprint sharing method of the present invention, the following describes the implementation principle of the fingerprint module in the prior art. In the prior art, when a fingerprint is set on a mobile terminal, the process is as follows: the fingerprint module collects a fingerprint image, then utilizes a feature extraction algorithm to extract feature points of the fingerprint image to obtain fingerprint feature information, the fingerprint feature information is recorded as fingerprint template information when being used as reference information for user identity authentication, then the fingerprint feature information (namely the fingerprint template information) is encrypted by utilizing an encryption algorithm (such as AES256) of the mobile terminal, so that encrypted fingerprint feature information is obtained. It should be noted that the encryption chip has a unique key, and the key is once fused and written when the chip leaves the factory, and therefore cannot be read and modified from the outside, that is, the standard fingerprint template information can only be written and deleted, cannot be read and modified, cannot be uploaded to any server, and cannot be read by any third-party program. After the fingerprint is set, when a user operates through the fingerprint, a fingerprint module on the mobile terminal can extract feature points and perform encryption operation on a currently input fingerprint image, then the calculated fingerprint template information is compared with standard fingerprint template information in an encryption storage area to judge whether the currently input fingerprint is legal or not, and then a fingerprint comparison result is notified to a third-party application program, such as a fingerprint unlocking program or a payment treasure. In order to realize fingerprint sharing, the invention improves the encryption storage area (secure world), so that the data of the encryption storage area can be read and decryption operation can be carried out.
Based on the principle, in the invention, if the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same, only the fingerprint template information is sent to the request mobile terminal, and the fingerprint template information is obtained by calculating the initial fingerprint image on the current mobile terminal through a feature extraction algorithm. Taking the mobile terminal a and the mobile terminal B as an example for explanation, when a user sets a fingerprint in an initialization setting process of the mobile terminal a, the fingerprint module collects a fingerprint image (i.e. an initial fingerprint image), then performs feature extraction on the initial fingerprint image through a feature extraction algorithm to obtain fingerprint feature information (also recorded as fingerprint template information), and then performs encryption through an encryption algorithm of the mobile terminal itself to obtain standard fingerprint template information and store the standard fingerprint template information in an encryption storage area. When the mobile terminal a acquires the fingerprint template information, the specific process includes: (1) reading standard fingerprint template information from an encrypted storage area; (2) and decrypting the standard fingerprint template information through a pre-stored decryption algorithm and a key to obtain the fingerprint template information. After the mobile terminal B receives the fingerprint template information, a fingerprint module on the mobile terminal B collects a current fingerprint image input by a user, then characteristic extraction is carried out on the current fingerprint image by utilizing a characteristic extraction algorithm of the mobile terminal B to obtain fingerprint characteristic information, the obtained fingerprint characteristic information is compared with the fingerprint template information sent by the mobile terminal A, and because the algorithms of the fingerprint modules of the mobile terminal A and the mobile terminal B are the same, whether the current fingerprint image on the mobile terminal B is consistent with the initial fingerprint image on the mobile terminal A or not can be judged by comparing the fingerprint template information, if the current fingerprint image on the mobile terminal B is consistent with the initial fingerprint image on the mobile terminal A, the identity authentication is passed, and if the current fingerprint image on the mobile terminal B is inconsistent with the initial fingerprint image on the mobile terminal A, the identity authentication is failed.
The second sharing module 404 is configured to, when the determination result is that the algorithms are different, obtain the fingerprint template information and the feature extraction algorithm and send the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal, so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
If the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are different, the fingerprint template information and the feature extraction algorithm need to be simultaneously sent to the request mobile terminal. Taking a mobile terminal A and a mobile terminal B as an example for explanation, after the mobile terminal B receives fingerprint template information and a feature extraction algorithm, a fingerprint module of the mobile terminal B acquires a current fingerprint image input by a user, then, feature extraction is carried out on the current fingerprint image by using the feature extraction algorithm sent by the mobile terminal A to obtain fingerprint feature information, then, the obtained fingerprint feature information is compared with the fingerprint template information sent by the mobile terminal A, if the two are consistent, identity authentication is passed, and if the two are inconsistent, identity authentication is failed, so that the mobile terminal A shares a fingerprint to the mobile terminal B. The reason why the mobile terminal a sends the feature extraction algorithm is as follows: the algorithms of the fingerprint modules of the mobile terminal a and the mobile terminal B are different, so that even if the current fingerprint image on the mobile terminal B is the same as the initial fingerprint image on the mobile terminal a, the comparison result is inconsistent, and therefore, the algorithms on the mobile terminal a and the mobile terminal B need to be the same, and the mobile terminal a sends the fingerprint template information and the feature extraction algorithm to the mobile terminal B at the same time.
Through the module 401 and the module 404, the fingerprint sharing program of the invention realizes the fingerprint sharing between the two mobile terminals, avoids the problem that the fingerprint needs to be initialized when the user uses the fingerprint on the mobile terminal which is not commonly used, newly bought or belongs to other people, simplifies the user operation and improves the user experience; and whether the algorithms of the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same or not is judged, the fingerprint template information is shared when the algorithms are the same, and the feature extraction algorithm and the fingerprint template information are shared when the algorithms are different, so that the problem of fingerprint identification errors caused by different algorithms of the two mobile terminals is solved.
Further, based on the above-described first embodiment of the fingerprint sharing program 400 of the present invention, a second embodiment of the fingerprint sharing program 400 of the present invention is proposed. Referring to fig. 4, fig. 4 is a functional block diagram of a fingerprint sharing procedure 400 according to a second embodiment of the present invention, wherein, compared with the first embodiment, the fingerprint sharing procedure 400 further includes a connection module 405 and a principle determination module 406. In this embodiment, each functional module is described as follows:
the connection module 405 is configured to receive a connection request of a requesting mobile terminal, establish a connection with the requesting mobile terminal, perform identity authentication on the requesting mobile terminal, and if the identity authentication passes, execute the detection module 401. In this embodiment, if fingerprint sharing is required, the request mobile terminal and the current mobile terminal may be operated to approach each other, and then the current mobile terminal and the request mobile terminal establish NFC connection through a built-in NFC module. After the requesting mobile terminal establishes the NFC connection with the current mobile terminal, the current mobile terminal performs authentication on the requesting mobile terminal, if the authentication passes, the detection module 401 is executed, and if the authentication does not pass, the process is ended.
The principle judgment module 406 is configured to judge whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same in principle, if so, execute the algorithm judgment module 402, otherwise execute the second sharing module 404. In this embodiment, when the current mobile terminal detects a fingerprint sharing request, it is first determined whether the principles of the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same. The principle of the fingerprint modules is the same, which means that the principle of the feature extraction algorithm is the same, but the specific algorithms may be different when the principle of the feature extraction algorithm is the same, and the extracted fingerprint feature information of the same fingerprint image is different when the algorithms are different, so that it is necessary to further judge whether the algorithms of the fingerprint modules are the same when the principle is the same. Preferably, the process of judging whether the fingerprint modules have the same principle specifically comprises the following steps: the method comprises the steps that a fingerprint module principle grouping list is preset on a current mobile terminal, the fingerprint module principle grouping list is used for counting various operating systems, brands and models of the current mobile terminal on the market, then grouping lists are carried out according to different fingerprint module principles, whether the current mobile terminal and a request mobile terminal are in the same group or not can be checked through the mobile terminal grouping list, when the current mobile terminal and the request mobile terminal are in the same group, the principle of the current mobile terminal and the principle of the request mobile terminal are the same, otherwise, the principle of the current mobile terminal and the principle of the request mobile terminal are different. It should be noted that, only one implementation manner of determining whether the principle of the fingerprint modules of the current mobile terminal and the requesting mobile terminal is the same is described above, and the implementation manner as long as the step can be implemented falls within the scope of the present invention.
Through the module 401 and the module 406, the fingerprint sharing program provided by the invention realizes the fingerprint sharing between the two mobile terminals, avoids the problem that the fingerprint needs to be initialized and set when the user uses the fingerprint on a mobile terminal which is not commonly used, newly purchased or belongs to other people, simplifies the user operation and improves the user experience; meanwhile, the connection between the current mobile terminal and the request mobile terminal is established through the NFC module, and the operation mode is simple and easy to realize; in addition, when a fingerprint sharing request is detected, whether the principle of the fingerprint module is the same or not is preferentially judged, whether the algorithm is the same or not is further judged when the principle is the same, only the fingerprint template information is shared only when the algorithms are the same, otherwise, the feature extraction algorithm needs to be shared, and therefore the problem that fingerprint identification errors are caused by the fact that the algorithms of the two mobile terminals are different is solved.
In addition, the present invention proposes a fingerprint sharing method, which is applied to the mobile terminal shown in fig. 1 to 2, and the mobile terminal includes a memory and a processor.
Fig. 5 is a flowchart illustrating a first embodiment of a fingerprint sharing method according to the present invention. In this embodiment, the execution order of the steps in the flowchart shown in fig. 5 may be changed and some steps may be omitted according to different requirements. The fingerprint sharing method comprises the following steps:
step S501, a fingerprint sharing request is detected in real time.
Referring to fig. 7, fig. 7 is a schematic diagram of an embodiment when a mobile terminal B requests a fingerprint from a mobile terminal a, where the mobile terminal a is denoted as a current mobile terminal, which represents a mobile terminal that is frequently used by a user and has a fingerprint set during initialization setting, and the mobile terminal B is a mobile terminal that is not frequently used by the user, newly purchased, or belongs to another person, and is denoted as a requesting mobile terminal in this embodiment. When a user performs a secret-related operation (such as a fingerprint payment operation, a fingerprint transfer operation, a fingerprint unlocking operation, and the like) requiring a fingerprint through the mobile terminal B, a fingerprint sharing request may be sent to the mobile terminal a through the mobile terminal B to obtain the fingerprint stored on the mobile terminal a. For the mobile terminal A, after the fingerprint sharing function is started, the fingerprint sharing request is detected in real time.
Step S502, when the fingerprint sharing request is detected, whether the fingerprint modules of the current mobile terminal and the request mobile terminal have the same algorithm is judged, if the judgment result is the same algorithm, the step S503 is executed, otherwise, if the judgment result is different algorithms, the step S504 is executed.
In this embodiment, when the mobile terminal a receives a fingerprint sharing request from the mobile terminal B, the fingerprint sharing method of the present invention first determines whether the algorithms of the fingerprint modules in the mobile terminal a and the mobile terminal B are the same, wherein the step of determining whether the algorithms of the fingerprint modules are the same specifically includes: (1) obtaining the models of the current mobile terminal and the requested mobile terminal; (2) judging whether the models of the current mobile terminal and the request mobile terminal are the same; (3) and if the judgment result is that the types are the same, judging that the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same. The judgment basis of the judgment process is as follows: the fingerprint modules adopted by mobile terminals with different operating systems, brands and models may be different, specifically, the fingerprint image acquisition modes and feature extraction algorithms in the fingerprint modules are different, and the fingerprint modules of the mobile terminals with the same model are the same, that is, the image acquisition modes and the feature extraction algorithms are the same. Therefore, whether the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same or not can be judged according to the model of the mobile terminal. In addition, in other preferred embodiments, the method for determining whether the fingerprint modules have the same algorithm may further be: the method comprises the steps that a mobile terminal grouping list is preset on a current mobile terminal, the mobile terminal grouping list is a mobile terminal for counting various operating systems, brands and models existing in the current market, then grouping lists are conducted according to different algorithms of a fingerprint module, whether the current mobile terminal and a request mobile terminal are in the same group or not can be checked through the mobile terminal grouping list, when the current mobile terminal and the request mobile terminal are in the same group, the algorithms of the current mobile terminal and the request mobile terminal are the same, and otherwise, the algorithms of the current mobile terminal and the request mobile terminal are different. It should be noted that, only two implementations of determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm are described above, and the implementations as long as the steps can be implemented all belong to the protection scope of the present invention. In addition, the invention only considers the condition that the fingerprint image acquisition mode is the same, namely the default image acquisition mode of the current mobile terminal is the same as that of the request mobile terminal, and only the characteristic extraction algorithm can be the same or different.
Step S503, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal, so that the requesting mobile terminal compares the fingerprint feature information of the current acquired fingerprint image with the fingerprint template information, wherein the fingerprint template information is calculated by a feature extraction algorithm for the initial fingerprint image on the current mobile terminal.
In order to better illustrate the fingerprint sharing method of the present invention, the following describes the implementation principle of the fingerprint module in the prior art. In the prior art, when a fingerprint is set on a mobile terminal, the process is as follows: the fingerprint module collects a fingerprint image, then utilizes a feature extraction algorithm to extract feature points of the fingerprint image to obtain fingerprint feature information, the fingerprint feature information is recorded as fingerprint template information when being used as reference information for user identity authentication, then the fingerprint feature information (namely the fingerprint template information) is encrypted by utilizing an encryption algorithm (such as AES256) of the mobile terminal, so that encrypted fingerprint feature information is obtained. It should be noted that the encryption chip has a unique key, and the key is once fused and written when the chip leaves the factory, and therefore cannot be read and modified from the outside, that is, the standard fingerprint template information can only be written and deleted, cannot be read and modified, cannot be uploaded to any server, and cannot be read by any third-party program. After the fingerprint is set, when a user operates through the fingerprint, a fingerprint module on the mobile terminal can extract feature points and perform encryption operation on a currently input fingerprint image, then the calculated fingerprint template information is compared with standard fingerprint template information in an encryption storage area to judge whether the currently input fingerprint is legal or not, and then a fingerprint comparison result is notified to a third-party application program, such as a fingerprint unlocking program or a payment treasure. In order to realize fingerprint sharing, the invention improves the encryption storage area (secure world), so that the data of the encryption storage area can be read and decryption operation can be carried out.
Based on the principle, in the invention, if the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same, only the fingerprint template information is sent to the request mobile terminal, and the fingerprint template information is obtained by calculating the initial fingerprint image on the current mobile terminal through a feature extraction algorithm. Taking the mobile terminal a and the mobile terminal B as an example for explanation, when a user sets a fingerprint in an initialization setting process of the mobile terminal a, the fingerprint module collects a fingerprint image (i.e. an initial fingerprint image), then performs feature extraction on the initial fingerprint image through a feature extraction algorithm to obtain fingerprint feature information (also recorded as fingerprint template information), and then performs encryption through an encryption algorithm of the mobile terminal itself to obtain standard fingerprint template information and store the standard fingerprint template information in an encryption storage area. When the mobile terminal a acquires the fingerprint template information, the specific process includes: (1) reading standard fingerprint template information from an encrypted storage area; (2) and decrypting the standard fingerprint template information through a pre-stored decryption algorithm and a key to obtain the fingerprint template information. After the mobile terminal B receives the fingerprint template information, a fingerprint module on the mobile terminal B collects a current fingerprint image input by a user, then characteristic extraction is carried out on the current fingerprint image by utilizing a characteristic extraction algorithm of the mobile terminal B to obtain fingerprint characteristic information, the obtained fingerprint characteristic information is compared with the fingerprint template information sent by the mobile terminal A, and because the algorithms of the fingerprint modules of the mobile terminal A and the mobile terminal B are the same, whether the current fingerprint image on the mobile terminal B is consistent with the initial fingerprint image on the mobile terminal A or not can be judged by comparing the fingerprint template information, if the current fingerprint image on the mobile terminal B is consistent with the initial fingerprint image on the mobile terminal A, the identity authentication is passed, and if the current fingerprint image on the mobile terminal B is inconsistent with the initial fingerprint image on the mobile terminal A, the identity authentication is failed.
Step S504, the fingerprint template information and the feature extraction algorithm are obtained and sent to the requesting mobile terminal, so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the current fingerprint image through the feature extraction algorithm with the fingerprint template information.
If the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are different, the fingerprint template information and the feature extraction algorithm need to be simultaneously sent to the request mobile terminal. Taking a mobile terminal A and a mobile terminal B as an example for explanation, after the mobile terminal B receives fingerprint template information and a feature extraction algorithm, a fingerprint module of the mobile terminal B acquires a current fingerprint image input by a user, then, feature extraction is carried out on the current fingerprint image by using the feature extraction algorithm sent by the mobile terminal A to obtain fingerprint feature information, then, the obtained fingerprint feature information is compared with the fingerprint template information sent by the mobile terminal A, if the two are consistent, identity authentication is passed, and if the two are inconsistent, identity authentication is failed, so that the mobile terminal A shares a fingerprint to the mobile terminal B. The reason why the mobile terminal a sends the feature extraction algorithm is as follows: the algorithms of the fingerprint modules of the mobile terminal A and the mobile terminal B are different, so that even if the current fingerprint image on the mobile terminal B is the same as the initial fingerprint image on the mobile terminal A, the comparison result is inconsistent, and therefore, the algorithms on the mobile terminal A and the mobile terminal B need to be the same, so that the mobile terminal A sends the fingerprint template information and the feature extraction algorithm to the mobile terminal B at the same time.
Through the steps S501-S504, the fingerprint sharing method realizes the fingerprint sharing between the two mobile terminals, avoids the problem that the fingerprint needs to be initialized when the user uses the fingerprint on the mobile terminal which is not commonly used, newly bought or belongs to other people, simplifies the user operation and improves the user experience; and whether the algorithms of the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same or not is judged, the fingerprint template information is shared when the algorithms are the same, and the feature extraction algorithm and the fingerprint template information are shared when the algorithms are different, so that the problem of fingerprint identification errors caused by different algorithms of the two mobile terminals is solved.
Further, based on the first embodiment described above, a second embodiment of the fingerprint sharing method of the present invention is proposed. Fig. 6 is a flowchart illustrating a second embodiment of the fingerprint sharing method according to the present invention. In this embodiment, the execution order of the steps in the flowchart shown in fig. 6 may be changed and some steps may be omitted according to different requirements. The fingerprint sharing method comprises the following steps:
step S601, the current mobile terminal receives the connection request of the request mobile terminal and establishes connection with the request mobile terminal, and performs identity authentication on the request mobile terminal, if the identity authentication passes, step S602 is executed.
In this embodiment, if fingerprint sharing is required, the request mobile terminal and the current mobile terminal may be operated to approach each other, and then the current mobile terminal and the request mobile terminal establish NFC connection through a built-in NFC module. After the requesting mobile terminal establishes the NFC connection with the current mobile terminal, the current mobile terminal performs authentication on the requesting mobile terminal, if the authentication passes, step S602 is executed, and if the authentication does not pass, the process is ended.
Step S602, a fingerprint sharing request is detected in real time, and when the fingerprint sharing request is detected, step S603 is executed.
Step S603, determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same in principle, if so, executing step S604, otherwise, executing step S606.
In this embodiment, when the current mobile terminal detects a fingerprint sharing request, it is first determined whether the principles of the fingerprint modules of the current mobile terminal and the requesting mobile terminal are the same. The principle of the fingerprint modules is the same, which means that the principle of the feature extraction algorithm is the same, but the specific algorithms may be different when the principle of the feature extraction algorithm is the same, and the extracted fingerprint feature information of the same fingerprint image is different when the algorithms are different, so that it is necessary to further judge whether the algorithms of the fingerprint modules are the same when the principle is the same. Preferably, the process of judging whether the fingerprint modules have the same principle specifically comprises the following steps: the method comprises the steps that a fingerprint module principle grouping list is preset on a current mobile terminal, the fingerprint module principle grouping list is used for counting various operating systems, brands and models of the current mobile terminal on the market, then grouping lists are carried out according to different fingerprint module principles, whether the current mobile terminal and a request mobile terminal are in the same group or not can be checked through the mobile terminal grouping list, when the current mobile terminal and the request mobile terminal are in the same group, the principle of the current mobile terminal and the principle of the request mobile terminal are the same, otherwise, the principle of the current mobile terminal and the principle of the request mobile terminal are different. It should be noted that, only one implementation manner of determining whether the principle of the fingerprint modules of the current mobile terminal and the requesting mobile terminal is the same is described above, and the implementation manner as long as the step can be implemented falls within the scope of the present invention.
Step S604, determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm, if so, executing step S605, otherwise, executing step S606.
Step S605, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal, so that the requesting mobile terminal compares the acquired fingerprint feature information of the current fingerprint image with the fingerprint template information.
Step S606, acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal, so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the current fingerprint image through the feature extraction algorithm with the fingerprint template information.
Through the steps S601 to S606, the fingerprint sharing method realizes the fingerprint sharing between the two mobile terminals, avoids the problem that the fingerprint needs to be initialized when the user uses the fingerprint on the mobile terminal which is not commonly used, newly bought or belongs to other people, simplifies the user operation and improves the user experience; meanwhile, the connection between the current mobile terminal and the request mobile terminal is established through the NFC module, and the operation mode is simple and easy to realize; in addition, when a fingerprint sharing request is detected, whether the principle of the fingerprint module is the same or not is preferentially judged, whether the algorithm is the same or not is further judged when the principle is the same, only the fingerprint template information is shared only when the algorithms are the same, otherwise, the feature extraction algorithm needs to be shared, and therefore the problem that fingerprint identification errors are caused by the fact that the algorithms of the two mobile terminals are different is solved.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A mobile terminal, characterized in that the mobile terminal comprises a memory, a processor and a fingerprint sharing program stored on the memory and executable on the processor, the fingerprint sharing program when executed by the processor implementing the steps of:
detecting a fingerprint sharing request in real time;
when a fingerprint sharing request is detected, judging whether the principle of fingerprint modules of a current mobile terminal and a requesting mobile terminal is the same;
if the judgment result is that the principle is the same, executing the step of judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal have the same algorithm;
if the judgment result is that the principle is different, executing the steps of acquiring fingerprint template information and a feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information;
the step of judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal have the same algorithm comprises the following steps:
if the judgment result is that the algorithms are the same, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal so that the requesting mobile terminal compares the acquired fingerprint feature information of the current fingerprint image with the fingerprint template information, wherein the fingerprint template information is obtained by calculating an initial fingerprint image on the current mobile terminal through a feature extraction algorithm;
and if the judgment result shows that the algorithms are different, acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
2. The mobile terminal of claim 1, wherein the processor is further configured to execute the fingerprint sharing program to perform the steps of:
reading standard fingerprint template information from an encrypted storage area;
and decrypting the standard fingerprint template information through a pre-stored decryption algorithm and a key to obtain the fingerprint template information.
3. The mobile terminal of any of claims 1 to 2, wherein the processor is further configured to execute the fingerprint sharing program to perform the steps of:
receiving a connection request of the request mobile terminal, establishing wireless connection with the request mobile terminal, performing identity verification on the request mobile terminal, and executing the step of detecting the fingerprint sharing request in real time if the identity verification is passed;
obtaining the models of the current mobile terminal and the request mobile terminal, judging whether the models of the current mobile terminal and the request mobile terminal are the same, and if the judgment result is that the models are the same, judging that the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same.
4. A fingerprint sharing method is applied to a mobile terminal, and is characterized by comprising the following steps:
detecting a fingerprint sharing request in real time;
when a fingerprint sharing request is detected, judging whether the principle of fingerprint modules of a current mobile terminal and a requesting mobile terminal is the same;
if the judgment result is that the principle is the same, executing the step of judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal have the same algorithm;
if the judgment result is that the principle is different, executing the steps of acquiring fingerprint template information and a feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information;
the step of judging whether the fingerprint modules of the current mobile terminal and the request mobile terminal have the same algorithm comprises the following steps:
if the judgment result is that the algorithms are the same, acquiring fingerprint template information and sending the fingerprint template information to the requesting mobile terminal so that the requesting mobile terminal compares the acquired fingerprint feature information of the current fingerprint image with the fingerprint template information, wherein the fingerprint template information is obtained by calculating an initial fingerprint image on the current mobile terminal through a feature extraction algorithm;
and if the judgment result shows that the algorithms are different, acquiring the fingerprint template information and the feature extraction algorithm and sending the fingerprint template information and the feature extraction algorithm to the requesting mobile terminal so that the requesting mobile terminal compares the fingerprint feature information obtained by calculating the acquired current fingerprint image through the feature extraction algorithm with the fingerprint template information.
5. The fingerprint sharing method of claim 4, wherein the step of acquiring fingerprint template information comprises:
reading standard fingerprint template information from an encrypted storage area;
and decrypting the standard fingerprint template information through a pre-stored decryption algorithm and a key to obtain the fingerprint template information.
6. The fingerprint sharing method according to any one of claims 4 to 5, wherein the step of determining whether the fingerprint modules of the current mobile terminal and the requesting mobile terminal have the same algorithm is specifically:
obtaining the models of the current mobile terminal and the request mobile terminal;
judging whether the models of the current mobile terminal and the request mobile terminal are the same;
and if the judgment result is that the types are the same, judging that the algorithms of the fingerprint modules of the current mobile terminal and the request mobile terminal are the same.
7. The fingerprint sharing method of claim 5, wherein the step of detecting in real time a fingerprint sharing request further comprises:
receiving a connection request of the request mobile terminal and establishing wireless connection with the request mobile terminal;
and performing identity authentication on the request mobile terminal, and if the identity authentication is passed, executing the step of detecting the fingerprint sharing request in real time.
8. A computer-readable storage medium, having stored thereon a fingerprint sharing program, which when executed by a processor, performs the steps of the fingerprint sharing method according to any one of claims 4 to 7.
CN201710643494.9A 2017-07-31 2017-07-31 Fingerprint sharing method and mobile terminal Active CN107395363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710643494.9A CN107395363B (en) 2017-07-31 2017-07-31 Fingerprint sharing method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710643494.9A CN107395363B (en) 2017-07-31 2017-07-31 Fingerprint sharing method and mobile terminal

Publications (2)

Publication Number Publication Date
CN107395363A CN107395363A (en) 2017-11-24
CN107395363B true CN107395363B (en) 2020-12-15

Family

ID=60344241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710643494.9A Active CN107395363B (en) 2017-07-31 2017-07-31 Fingerprint sharing method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107395363B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108022349A (en) * 2017-12-22 2018-05-11 北京小米移动软件有限公司 Information input method, equipment, smart lock and storage medium
CN111259359A (en) * 2020-01-21 2020-06-09 恒大智慧科技有限公司 Community-based fingerprint management method and system, community server and storage medium
CN113486738A (en) * 2021-06-22 2021-10-08 维沃移动通信有限公司 Fingerprint identification method and device, electronic equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697184A (en) * 2009-09-21 2010-04-21 杭州六易科技有限公司 Plug-in card fingerprint identification anti-theft laptop
US9100245B1 (en) * 2012-02-08 2015-08-04 Amazon Technologies, Inc. Identifying protected media files
CN106330977A (en) * 2016-10-28 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method and related equipment
CN106470239A (en) * 2015-08-21 2017-03-01 华为终端(东莞)有限公司 A kind of target switching method and relevant device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697184A (en) * 2009-09-21 2010-04-21 杭州六易科技有限公司 Plug-in card fingerprint identification anti-theft laptop
US9100245B1 (en) * 2012-02-08 2015-08-04 Amazon Technologies, Inc. Identifying protected media files
CN106470239A (en) * 2015-08-21 2017-03-01 华为终端(东莞)有限公司 A kind of target switching method and relevant device
CN106330977A (en) * 2016-10-28 2017-01-11 宇龙计算机通信科技(深圳)有限公司 Fingerprint authentication method and related equipment

Also Published As

Publication number Publication date
CN107395363A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
CN109151169B (en) Camera authority management method, mobile terminal and computer readable storage medium
CN107038245B (en) Page switching method, mobile terminal and storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN108989322B (en) Data transmission method, mobile terminal and computer readable storage medium
CN109600740B (en) File downloading method and device and computer readable storage medium
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN107563158B (en) Method, device and computer readable storage medium for displaying hidden application icon
CN107124718B (en) Data transmission method, mobile terminal and storage medium
CN108601062B (en) WiFi connection sharing method, terminal and computer storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN108376239B (en) Face recognition method, mobile terminal and storage medium
CN107395363B (en) Fingerprint sharing method and mobile terminal
CN107562343B (en) Interactive regulation and control method, equipment and computer readable storage medium
CN107220554B (en) File forwarding management method, corresponding system and terminal equipment
CN108810262B (en) Application configuration method, terminal and computer readable storage medium
CN107317804B (en) Private cloud encrypted data access method, terminal and storage medium
CN107194217B (en) User data access control method, apparatus and computer-readable storage medium
CN107135498B (en) File sharing method and equipment
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
CN107885987B (en) Unlocking method, terminal and computer readable storage medium
CN107340958B (en) Horizontal and vertical screen switching method and mobile terminal
CN109711198B (en) Application management method, mobile terminal and storage medium
CN108876387B (en) Payment verification method, payment verification equipment and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201127

Address after: 210036, 303 Hanzhoung Avenue, Gulou District, Jiangsu, Nanjing

Applicant after: Nanjing zhongchengxie Information Technology Co.,Ltd.

Address before: 518057 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221122

Address after: Room 501, 85 Xiaguang Dongli, Haicang District, Xiamen City, Fujian Province

Patentee after: Xiamen Jiupin sesame Information Technology Co.,Ltd.

Address before: 303 Hanzhongmen street, Gulou District, Nanjing City, Jiangsu Province

Patentee before: Nanjing zhongchengxie Information Technology Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20221230

Address after: 2225, floor 19, No. 19, Madian East Road, Haidian District, Beijing 100089

Patentee after: BEIJING NORTH-STAR TECHNOLOGY DEVELOPMENT Co.,Ltd.

Address before: Room 501, 85 Xiaguang Dongli, Haicang District, Xiamen City, Fujian Province

Patentee before: Xiamen Jiupin sesame Information Technology Co.,Ltd.