CN103077340A - Method and equipment for calling data through biological characteristic data - Google Patents
Method and equipment for calling data through biological characteristic data Download PDFInfo
- Publication number
- CN103077340A CN103077340A CN2012105950209A CN201210595020A CN103077340A CN 103077340 A CN103077340 A CN 103077340A CN 2012105950209 A CN2012105950209 A CN 2012105950209A CN 201210595020 A CN201210595020 A CN 201210595020A CN 103077340 A CN103077340 A CN 103077340A
- Authority
- CN
- China
- Prior art keywords
- data
- biological attribute
- attribute data
- equipment
- data group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
The invention discloses a method and equipment for calling data through biological characteristic data. The method comprises the following steps: identifying input biological characteristic data, calling a data group associated with the biological characteristic data according to the identified biological characteristic data, wherein the data group comprises at least one of the data, and selecting one of the data from the data group and executing corresponding operation according to the selected data. The data input process is simplified through the input biological characteristic data, and required operation is rapidly executed. Simultaneously, the problem of data memory is solved in the condition that a large amount of data exists.
Description
Technical field
The present invention relates to the intelligent terminal field, relate in particular to a kind of method and apparatus by the biological attribute data calling data.
Background technology
One of them background technology is the use of password.A lot of when modern society uses password, for example, bank debits, Net silver is used for another example, for another example stock exchange and inquiry.The use of password has brought a lot of worries to the people, and it is bad that password is simple, complicated and difficult especially note; All use same password easily to be cracked, security is had a greatly reduced quality; Use different passwords, especially easily obscure again, do not remember clearly.The biological characteristic password, for example therefore fingerprint just climbs up stage.But, because many times the use of password is interactively, for example, method, apparatus being received only numeral or other code datas, biological attribute data is just have more than is needed, so biometrics password can't be dealt with problems fully.
Another background technology relates to the secret authentication in the prompt operation selection.Can have a plurality of functions to select in the same equipment, some the time we wish fast to find corresponding function.For example, intelligent mobile phone terminal both can make a phone call also to be used for paying the bill.Not in the situation of authorizing, the possessor of smart mobile phone does not wish that certainly other people use this two functions, taking into account under the condition of secret, if fast find the function of one of them, a method is exactly by the different function of the related definition of different code datas, namely by the input password, fast enter into the operation interface of corresponding function.But as aforementioned, adopting general numerical ciphers is to lose more than gain, too complicated, the difficult note of numeral; Adopting the biological characteristic password is a better method, but because single people's biological characteristic is limited, people's face only has one, if need related data a lot, can not solve fully and deal with problems.
Existing biological attribute data purview certification technology generally is to adopt the directly certificate scheme of contrast identification, can not be converted to other required data, so can not solve the above problems.For example, application number is that the technology of employing is directly to gather finger print identifying, obtains authority in 200520086791.0 the patent; For another example, number of patent application is in 03114340.7 the patent, although many long-range purview certifications are direct finger print identifying equally.
Summary of the invention
The purpose of this invention is to provide a kind of method and apparatus by the biological attribute data calling data, to solve the application problem that the password complexity causes in the intelligent terminal.
Technical scheme of the present invention provides a kind of method by the biological attribute data calling data, and described method comprises the steps:
The described biological attribute data of identification input; And
Described biological attribute data according to identification accesses the data group that is associated with described biological attribute data, and described data group comprises described data at least; And
Select described data in described data group, equipment is carried out corresponding operation according to the described data of selecting.
The embodiment of the invention provides a kind of equipment by the biological attribute data calling data, comprising: biological attribute data recognition unit, data group unit and operation execution unit.
Described biological attribute data recognition unit is identified described biological attribute data; And
Described data group unit accesses the data group that is associated with described biological attribute data according to the described biological attribute data of identification, and described data group comprises described data at least; And
The described operation execution unit of described equipment is carried out corresponding operation according to the described data of selecting in described data group.
The embodiment of the invention obtains following beneficial effect: guarantee to call the data group of setting by biological attribute data under the condition of privacy the process of reduced data input; By the data-mapping concrete operations of data group, realize carrying out fast needed operation.Solved simultaneously in the situation that has a lot of code datas, remembered the problem of these code datas; And the setting of passing through the protective data, the safety of protection equipment possessor when being coerced use equipment.
Description of drawings
Fig. 1 is the described method flow diagram of first embodiment of the invention;
Fig. 2 is the structural drawing of the described equipment of second embodiment of the invention.
Embodiment
In order conveniently to understand the present invention, the below will provide specific embodiment and further specify.
First embodiment of the invention is put forward a kind of method by the biological attribute data calling data, and as shown in Figure 1, step comprises:
Step S101, the biological attribute data of identification input.
Step S102, the biological attribute data according to identification accesses the data group that is associated with biological attribute data, and the data group comprises data at least.
Step S103 selects data in the data group, equipment is carried out corresponding operation according to the data of selecting.
In the preferred embodiment, the biological attribute data of identification input, step before is: the interface that enters the identification biological attribute data.
In the preferred embodiment, also comprise the step that the data group is set before:
Input respectively or access biological attribute data, data;
The device storage data are to the data group that is associated with biological attribute data.
In the preferred embodiment, also comprise afterwards step: mapping (enum) data is to operation, make data selected after, operation can be performed.
In the preferred embodiment, operation comprises following part or all of at least: open man machine operation interface, allow to use application or program, permission execution or sending controling instruction, calling data, downloading data, deletion data, connecting moves, open, close.
In the preferred embodiment, data comprise following part or all of at least: numeral, picture, literal, language, symbol, sound characteristic.
In the preferred embodiment, the data group comprises data at least, and data wherein are protective data, and operation corresponding to protective data is protective operations.The protective operation can be: open virtual man machine operation interface; Or virtual application or program are used in permission; Or allow execution or send virtual steering order; Or virtually carry out connecting moves; Or prompting fault.
In the preferred embodiment, the protective operation comprises at least:
Export or provide material object; Wherein, export or the material object that provides and normal running under output or the outward appearance in kind that provides consistent, preset tracked in the material object and/or be identified sign; Further, sign is RFID label or NFC label.Or/and
Send warning message to preassigned equipment, warning message comprises at least by opening the equipment operating people's that positioning function obtains position information.Or/and
Make or simulate fault.Or/and
Using method and process by corresponding to normal running provide improper Output rusults, and improper Output rusults comprises: the output quantity of mistake or the prompting favourable to the user.Or/and
Delete preassigned critical data.Or/and
Pattern by wireless or wire communication returns critical data behind the preassigned equipment of user, the deletion critical data.
The embodiment of the invention provides a kind of equipment by the biological attribute data calling data, and as shown in Figure 2, equipment comprises:
Biological attribute data recognition unit 21, data group unit 22 and operation execution unit 23.
Biological attribute data recognition unit 21 identification biological attribute datas;
The operation execution unit 23 of equipment is carried out corresponding operation according to the data of selecting in the data group.
More than be part specific embodiment of the present invention, but do not represent full content of the present invention, the technician that this area is relevant can obtain other relevant concrete application with above embodiment according to the solution of the present invention, does not exemplify one by one at this.
Obviously, those skilled in the art can carry out various changes and modification to the present invention and not break away from the spirit and scope of the present invention.Like this, if of the present invention these are revised and modification belongs to that claim of the present invention requires and the scope of equivalent technologies within, then the present invention also is intended to comprise these changes and modification interior.
Claims (9)
1. the method by the biological attribute data calling data is characterized in that, described method step is as follows:
The described biological attribute data of identification input; And
Described biological attribute data according to identification accesses the data group that is associated with described biological attribute data, and described data group comprises described data at least; And
Select described data in described data group, equipment is carried out corresponding operation according to the described data of selecting.
2. the method for claim 1 is characterized in that, the described biological attribute data of described identification input, and step before is: the interface that enters the described biological attribute data of identification.
3. method as claimed in claim 1 or 2 is characterized in that, also comprises the step that described data group is set before:
Input respectively or access described biological attribute data, described data; And
The described data of described device storage are to the described data group that is associated with described biological attribute data.
4. method as described in claim 3 is characterized in that, also comprises afterwards step: shine upon described data to described operation, make described data selected after, described operation can be performed.
5. such as each described method of claim 1 to 4, it is characterized in that, described operation comprises following part or all of at least: open man machine operation interface, allow to use application or program, permission execution or sending controling instruction, calling data, downloading data, deletion data, connecting moves, open, close.
6. such as each described method of claim 1 to 5, described data comprise following part or all of at least: numeral, picture, literal, language, symbol, sound characteristic.
7. such as each described method of claim 1 to 6, it is characterized in that, described: described data group comprises described data at least, and described data wherein are protective data, and described operation corresponding to described protective data is protective operations.
Described protective operation can be: open virtual man machine operation interface; Or virtual application or program are used in permission; Or allow execution or send virtual steering order; Or virtually carry out connecting moves; Or prompting fault.
8. method as claimed in claim 7 is characterized in that, described protective operation comprises at least:
Export or provide material object; Wherein, export or the described material object that provides and normal running under output or the outward appearance in kind that provides consistent, preset tracked in the described material object and/or be identified sign; Further, described sign is RFID label or NFC label.Or/and
Send warning message to preassigned equipment, described warning message comprises at least by opening the described equipment operating people's that positioning function obtains position information.Or/and
Make or simulate fault.Or/and
Using method and process by corresponding to normal running provide improper Output rusults, and described improper Output rusults comprises: the output quantity of mistake or the prompting favourable to the user.Or/and
Delete preassigned critical data.Or/and
Pattern by wireless or wire communication returns described critical data behind the preassigned equipment of user, deletes described critical data.
9. the equipment by the biological attribute data calling data is characterized in that, described equipment comprises:
Biological attribute data recognition unit, data group unit and operation execution unit.
Described biological attribute data recognition unit is identified described biological attribute data; And
Described data group unit accesses the data group that is associated with described biological attribute data according to the described biological attribute data of identification, and described data group comprises described data at least; And
The described operation execution unit of described equipment is carried out corresponding operation according to the described data of selecting in described data group.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105950209A CN103077340A (en) | 2012-12-28 | 2012-12-28 | Method and equipment for calling data through biological characteristic data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012105950209A CN103077340A (en) | 2012-12-28 | 2012-12-28 | Method and equipment for calling data through biological characteristic data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103077340A true CN103077340A (en) | 2013-05-01 |
Family
ID=48153868
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012105950209A Pending CN103077340A (en) | 2012-12-28 | 2012-12-28 | Method and equipment for calling data through biological characteristic data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103077340A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016065718A1 (en) * | 2014-10-27 | 2016-05-06 | 深圳市汇顶科技股份有限公司 | Operation method and apparatus based on biological feature recognition |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1392475A (en) * | 2001-06-20 | 2003-01-22 | 徐孝民 | Multiple cipher privacy warning system |
CN101030174A (en) * | 2006-03-04 | 2007-09-05 | 深圳市朗科科技有限公司 | Mobile memory with fingerprint recognition function |
CN101383704A (en) * | 2008-04-23 | 2009-03-11 | 鲁东大学 | Cipher module based on finger print recognition technology |
CN101436935A (en) * | 2008-12-10 | 2009-05-20 | 华中科技大学 | PIN code verification method through fingerprint identification |
CN101727550A (en) * | 2008-10-27 | 2010-06-09 | 联想(北京)有限公司 | Cipher safety system identified on basis of biological characteristics and method |
CN102122402A (en) * | 2010-12-27 | 2011-07-13 | 北京天公瑞丰科技有限公司 | Access control system based on palm vein authentication and authentication method using same |
-
2012
- 2012-12-28 CN CN2012105950209A patent/CN103077340A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1392475A (en) * | 2001-06-20 | 2003-01-22 | 徐孝民 | Multiple cipher privacy warning system |
CN101030174A (en) * | 2006-03-04 | 2007-09-05 | 深圳市朗科科技有限公司 | Mobile memory with fingerprint recognition function |
CN101383704A (en) * | 2008-04-23 | 2009-03-11 | 鲁东大学 | Cipher module based on finger print recognition technology |
CN101727550A (en) * | 2008-10-27 | 2010-06-09 | 联想(北京)有限公司 | Cipher safety system identified on basis of biological characteristics and method |
CN101436935A (en) * | 2008-12-10 | 2009-05-20 | 华中科技大学 | PIN code verification method through fingerprint identification |
CN102122402A (en) * | 2010-12-27 | 2011-07-13 | 北京天公瑞丰科技有限公司 | Access control system based on palm vein authentication and authentication method using same |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016065718A1 (en) * | 2014-10-27 | 2016-05-06 | 深圳市汇顶科技股份有限公司 | Operation method and apparatus based on biological feature recognition |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105045085B (en) | The control method and intelligent watch of a kind of intelligent watch | |
CN102509055A (en) | Mobile terminal and method for hiding programs of mobile terminal | |
CN102136085B (en) | Telecom smart card and telecom smart card-based non-contact application management method | |
CN103813314A (en) | Soft SIM card enabling method and network access method, terminal, and network access device | |
CN101098540A (en) | Encrypting chip based mobile terminal network-locking device | |
CN106354399A (en) | Method, device, and electronic device for assignment of application permission | |
CN104184900A (en) | Data processing method, system and mobile terminal | |
CN105187599A (en) | Contact person information management method and terminal | |
CN107391308A (en) | Data processing method and device, terminal and computer-readable recording medium | |
CN107948970A (en) | System of real name method of network entry, system and the mobile terminal of subordinate terminal | |
CN105225102A (en) | Method of mobile payment and the wearable mobile payment device for the method under line | |
CN109977039A (en) | HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing | |
CN103544114B (en) | Based on many M1 card control system and the control method thereof of single CPU card | |
CN105825149A (en) | Switching method for multi-operation system and terminal equipment | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN103179547B (en) | A kind of system and method for binding phone number and SIM supplement cards | |
CN104270754B (en) | A kind of Subscriber Identity Module method for authenticating and device | |
CN105260658A (en) | Method and system for setting privacy interface | |
CN103077340A (en) | Method and equipment for calling data through biological characteristic data | |
CN106066956A (en) | A kind of user terminal screen unlocking method, device and user terminal | |
CN203206256U (en) | A mobile storage device | |
CN105426720A (en) | Method and terminal for modifying registered fingerprints | |
CN105871840A (en) | Certificate management method and system | |
CN115509619A (en) | Operating system event processing method, operating system, electronic device and storage medium | |
CN106951058A (en) | Electronic equipment and its control method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
DD01 | Delivery of document by public notice |
Addressee: Zhou Wanrong Document name: Notification of Passing Preliminary Examination of the Application for Invention |
|
C06 | Publication | ||
PB01 | Publication | ||
DD01 | Delivery of document by public notice |
Addressee: Zhou Wanrong Document name: Notification of Publication of the Application for Invention |
|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
DD01 | Delivery of document by public notice |
Addressee: Zhou Wanrong Document name: Notification of Patent Invention Entering into Substantive Examination Stage |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130501 |
|
RJ01 | Rejection of invention patent application after publication |