CN105160227A - Remote fingerprint verification method, user terminal and fingerprint verification system - Google Patents

Remote fingerprint verification method, user terminal and fingerprint verification system Download PDF

Info

Publication number
CN105160227A
CN105160227A CN201510540526.3A CN201510540526A CN105160227A CN 105160227 A CN105160227 A CN 105160227A CN 201510540526 A CN201510540526 A CN 201510540526A CN 105160227 A CN105160227 A CN 105160227A
Authority
CN
China
Prior art keywords
fingerprint
remote
sequence
user terminal
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510540526.3A
Other languages
Chinese (zh)
Other versions
CN105160227B (en
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510540526.3A priority Critical patent/CN105160227B/en
Publication of CN105160227A publication Critical patent/CN105160227A/en
Application granted granted Critical
Publication of CN105160227B publication Critical patent/CN105160227B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

Embodiments of the invention disclose a remote fingerprint verification method, a user terminal and a fingerprint verification system. The remote fingerprint verification method comprises: when the user terminal receives a user instruction i which can be executed by the user terminal only after fingerprint verification is passed, acquiring x fingerprints input through x touch inputs by a user within a set duration; sending a remote fingerprint verification request carrying a fingerprint sequence j obtained based on x fingerprints to a verification server; and when a remote fingerprint verification response, indicating that remote fingerprint verification is successful, sent by the verification server is received, executing the user instruction i. According to the technical scheme provided by the embodiments of the invention, the expansion of application scenarios of user fingerprints is facilitated and the use convenience is brought for users.

Description

Remote fingerprint verification method and user terminal and fingerprint verification system
Technical field
The present invention relates to electronic technology field, specifically relate generally to remote fingerprint verification method and user terminal and fingerprint verification system.
Background technology
Along with the high speed development of internet and communications industry, multimedia service and various virtual technology start sizable application, and the identification of user identity and discriminating seem particularly important.The identifying schemes of user identity conventional at present has character string password password, digital certificate of file, mobile digital certificate (being commonly called as excellent Key), biometric identification etc.
The method of monitoring biometric (bioyetrics) is at protection information or determine individual identification is significant.Biometric system uses the distinguishing characteristics of individual face, fingerprint, gesture, blood vessel, iris, signature, retina and vocal print etc.Wherein finger print information is owing to reading conveniently, uses the method for fingerprint recognition protection personal information and secret product constantly to increase.
Wherein, the existing application scenarios for user fingerprints is substantially all the local application scenarios relevant to identification, such as standard fingerprint template is stored in mobile phone this locality, authentication is carried out according to the fingerprint of mobile phone typing and the match condition of standard fingerprint template, this mode has stronger scene restriction (such as mobile phone this locality must prestore standard fingerprint template), has had influence on the range of application utilizing fingerprint to carry out identification.
Summary of the invention
The embodiment of the present invention provides remote fingerprint verification method and relevant apparatus and fingerprint verification system, with the application scenarios of extending user fingerprint, and then brings convenience to the use of user.
Embodiment of the present invention first aspect provides a kind of remote fingerprint verification method, comprising:
User terminal when have received described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be greater than 1 integer;
Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation;
Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful, wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in fingerprint sequence j and wherein 1 the successful situation of standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.
In conjunction with first aspect, in the first possible embodiment of first aspect,
Described method also comprises: described user terminal is encrypted to obtain x cryptographic fingerprint to a described x fingerprint.Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains.Between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
In conjunction with first aspect, in the embodiment that the second of first aspect is possible,
The arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
In conjunction with the first possible embodiment of first aspect or the possible embodiment of the second of first aspect, in the third possible embodiment of first aspect, describedly a described x fingerprint is encrypted to obtain x cryptographic fingerprint comprises: use mutually different cryptographic algorithm to be encrypted to obtain x cryptographic fingerprint to a described x fingerprint.
In conjunction with the first possible embodiment of first aspect or the possible embodiment of the second of first aspect, in the 4th kind of possible embodiment of first aspect, used cryptographic algorithm part is encrypted to a described x fingerprint identical or all identical.
In conjunction with the third possible embodiment of first aspect or the first possible embodiment of first aspect or the possible embodiment of the second of first aspect or first aspect, in the 4th kind of possible embodiment of first aspect,
Described method also comprises: when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
In conjunction with the 4th kind of possible embodiment of first aspect or the first possible embodiment of first aspect or the possible embodiment of the second of first aspect or first aspect, in the 5th kind of possible embodiment of first aspect, the terminal iidentification of user terminal is carried in described remote fingerprint checking request, has binding relationship between terminal iidentification and decipherment algorithm.
Embodiment of the present invention second aspect provides a kind of user terminal, comprising:
Collecting unit, for when the user instruction i that could perform after receiving described user terminal and needing fingerprint authentication to pass through, gathers user's x fingerprint by the typing of x touch operation institute within setting duration, described x be greater than 1 integer;
Transmitting element, for sending the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x cryptographic fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation;
Perform control module, for performing described user instruction i when receiving the remote fingerprint auth response that instruction remote fingerprint that described authentication server sends is proved to be successful, the remote fingerprint auth response that described instruction remote fingerprint is proved to be successful is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y standard fingerprint sequence prestoring by described authentication server.
In conjunction with second aspect, in the first possible embodiment of second aspect,
Described user terminal also comprises: ciphering unit is used for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint; Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains, and has corresponding relation between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing.
In conjunction with the first possible embodiment of second aspect, in the embodiment that the second of second aspect is possible,
Described ciphering unit is encrypted to obtain x cryptographic fingerprint to a described x fingerprint specifically for using mutually different cryptographic algorithm.
In conjunction with the first possible embodiment of second aspect, among the third possible embodiment of second aspect, used cryptographic algorithm part is encrypted to a described x fingerprint identical or all identical.
In conjunction with the third possible embodiment of the first possible embodiment of second aspect or the possible embodiment of the second of second aspect or second aspect, among the 4th kind of possible embodiment of second aspect, the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
In conjunction with second aspect or the first possible embodiment of second aspect or the possible embodiment of the second of second aspect or the third possible embodiment of second aspect or the 4th kind of possible embodiment of second aspect, in the 5th kind of possible embodiment of second aspect
Described execution control module also for: when receiving the remote fingerprint auth response of instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
In conjunction with second aspect or the first possible embodiment of second aspect or the possible embodiment of the second of second aspect or the 4th kind of possible embodiment of second aspect or the 5th kind of possible embodiment of second aspect, in the 6th kind of possible embodiment of second aspect, the terminal iidentification of user terminal is carried in described remote fingerprint checking request, has binding relationship between terminal iidentification and decipherment algorithm.
The embodiment of the present invention third aspect provides a kind of fingerprint verification system, comprising:
User terminal, for when the user instruction i that could perform after receiving described user terminal and needing fingerprint authentication to pass through, gathers user's x fingerprint by the typing of x touch operation institute within setting duration, described x be greater than 1 integer; Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x cryptographic fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful;
Described authentication server, for receiving described remote fingerprint checking request, described fingerprint sequence j is mated with y the standard fingerprint sequence prestored, at described fingerprint sequence j with in the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored, send the remote fingerprint auth response indicating remote fingerprint to be proved to be successful to described user terminal.
In conjunction with the third aspect, in the first possible embodiment of the third aspect, user terminal is also for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains, and has corresponding relation between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing.
In conjunction with the first possible embodiment of the third aspect, in the embodiment that the second of the third aspect is possible, used cryptographic algorithm part is encrypted to a described x fingerprint identical or all identical or different.
In conjunction with the first possible embodiment of the third aspect or the possible embodiment of the second of the third aspect, in the third possible embodiment of the third aspect, the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
In conjunction with the third possible embodiment of the third aspect or the first possible embodiment of the third aspect or the possible embodiment of the second of the third aspect or the third aspect, in the 4th kind of possible embodiment of the third aspect,
Described user terminal also for, when receiving the remote fingerprint auth response of instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
In conjunction with the 4th kind of possible embodiment of the third aspect or the first possible embodiment of the third aspect or the possible embodiment of the second of the third aspect or the third aspect, in the 5th kind of possible embodiment of the third aspect, the terminal iidentification of user terminal is carried in described remote fingerprint checking request, has binding relationship between terminal iidentification and decipherment algorithm.
Can find out, in the technical scheme of the embodiment of the present invention, user terminal when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
And, fingerprint sequence j obtains based on x fingerprint, each fingerprint putting in order in fingerprint sequence j is also taken into account, therefore, along with the increase of x, the quantity of the fingerprint sequence that may be formed can become very many gradually, this quantity just making possible total fingerprint sequence can bind the user instruction of association can become very many, and then may make a lot of operations all can by touch input to trigger execution, be conducive to the manipulation convenience strengthening touch control operation further like this, bring more convenience to the use of user.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The schematic diagram of a kind of network architecture that Fig. 1-a provides for the embodiment of the present invention;
The schematic flow sheet of a kind of remote fingerprint verification method that Fig. 1-b provides for the embodiment of the present invention;
The schematic flow sheet of the another kind of remote fingerprint verification method that Fig. 2 provides for embodiments of the invention;
The schematic flow sheet of the another kind of remote fingerprint verification method that Fig. 3 provides for embodiments of the invention;
The schematic flow sheet of the another kind of remote fingerprint verification method that Fig. 4 provides for embodiments of the invention;
The schematic diagram of a kind of user terminal that Fig. 5 provides for the embodiment of the present invention;
Fig. 6 is the schematic diagram of the another kind of user terminal of embodiment of the present invention confession;
The schematic diagram of a kind of fingerprint verification system that Fig. 7 provides for the embodiment of the present invention.
Embodiment
The embodiment of the present invention provides remote fingerprint verification method and relevant apparatus and fingerprint verification system, with the application scenarios of extending user fingerprint, and then brings convenience to the use of user.
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
The term " first " occurred in instructions of the present invention, claims and accompanying drawing, " second " and " the 3rd " etc. are for distinguishing different objects, and not for describing specific order.In addition, term " comprises " and " having " and their any distortion, and intention is to cover not exclusive comprising.Such as contain the process of series of steps or unit, method, system, product or equipment and be not defined in the step or unit listed, but also comprise the step or unit do not listed alternatively, or also comprise alternatively for other intrinsic step of these processes, method, product or equipment or unit.
See the schematic diagram of a kind of network architecture that Fig. 1-a, Fig. 1-a provides for the embodiment of the present invention, in the network architecture shown in Fig. 1-a, several user terminals are connected with authentication server by network.The technical scheme of the embodiment of the present invention specifically can be implemented based on the network architecture shown in 1-a.
An embodiment of remote fingerprint verification method of the present invention.A kind of remote fingerprint verification method, can comprise: user terminal when have received described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be more than or equal to 2 positive integer; Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation; Perform described user instruction i when receiving the remote fingerprint auth response that instruction remote fingerprint that described authentication server sends is proved to be successful, the remote fingerprint auth response that described instruction remote fingerprint is proved to be successful is being sent in fingerprint sequence j and wherein 1 the successful situation of standard fingerprint sequences match in y standard fingerprint sequence prestoring by described authentication server.
Refer to Fig. 1-b, Fig. 1-b is the schematic flow sheet of a kind of remote fingerprint verification method that one embodiment of the present of invention provide.Wherein, as shown in Fig. 1-b, a kind of remote fingerprint verification method that one embodiment of the present of invention provide can comprise following content:
101, user terminal when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be greater than 1 integer.
Wherein, user terminal such as can be mobile phone, panel computer, notebook computer, palm PC, mobile internet device or other user terminals.
Wherein, described x be greater than or equal to 2 integer.
For example, x such as can equal 2,3,5,7,8,10,21,29,36,50,100 or other value.
Wherein, the value of above-mentioned setting duration can be come to set flexibly according to specific needs, and the span such as setting duration can between 3 seconds ~ 30 seconds or other scope.Concrete example as, setting duration can equal 10 seconds, 20 seconds, 30 seconds, 3 seconds, 7 seconds, 100 seconds or other duration.
Perform the finger touching input in the embodiment of the present invention and can be finger finger and/or toe finger.That is, not only support in various embodiments of the present invention that user uses finger to carry out touch input, also support that user uses toe to carry out touch input, this, for the individuals with disabilities using finger manipulation inconvenience, will become effectively very convenient.
102, user terminal sends the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Wherein, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.Such as the arrangement sequencing of the cryptographic fingerprint of x fingerprint or x fingerprint in fingerprint sequence j is identical with the typing sequencing of a described x fingerprint, that is, the fingerprint of more first typing or its cryptographic fingerprint putting in order in fingerprint sequence i is more forward, the fingerprint of rear typing or its cryptographic fingerprint putting in order more rearward in fingerprint sequence i.Such as the arrangement sequencing of the cryptographic fingerprint of x fingerprint or x fingerprint in fingerprint sequence j is contrary with the typing sequencing of a described x fingerprint again, that is, the fingerprint of more first typing or its cryptographic fingerprint put in order more rearward in fingerprint sequence i, and the fingerprint of rear typing or its cryptographic fingerprint putting in order in fingerprint sequence i is more forward.Certainly, the corresponding relation had between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing is also not limited to above-mentioned citing.
103, user terminal performs described user instruction i when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful.
Wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in fingerprint sequence j and wherein 1 the successful situation of standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.
Wherein, described y be greater than or equal to 1 integer.
For example, y such as can equal 1,2,3,5,7,8,10,21,29,36,50,100 or other value.
In addition, user terminal, when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, can eject the information of the execution authority authentication failed for pointing out described user instruction i.Wherein, the remote fingerprint auth response of described instruction remote fingerprint authentication failed can by described authentication server when sending fingerprint sequence j with when any 1 standard fingerprint sequences match failure in y standard fingerprint sequence prestoring.
Can find out, among the technical scheme of the present embodiment, user terminal when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
And, fingerprint sequence j obtains based on x fingerprint, each fingerprint putting in order in fingerprint sequence j is also taken into account, therefore, along with the increase of x, the quantity of the fingerprint sequence that may be formed can become very many gradually, this quantity just making possible total fingerprint sequence can bind the user instruction of association can become very many, and then may make a lot of operations all can by touch input to trigger execution, be conducive to the manipulation convenience strengthening touch control operation further like this, bring more convenience to the use of user.
For example, suppose x=3, so suppose that x fingerprint touches the typing of input institute by 3 different fingers among 10 fingers of user by performing, like this, the quantity of the fingerprint sequence that may be formed just may reach P 10 3 = 720.
Be appreciated that, user instruction i can be the user instruction for starting application program, also may be the user instruction for menu page turning, also may be the user instruction of amplification of volume, also may be the user instruction for adjusting screen intensity, also may be the user instruction for zooming in or out picture, also may be other user instruction.
Wherein, application program such as can comprise note application, photo browse application, mail applications, text editing application, instant messaging application (such as QQ, micro-letter, footpath between fields, footpath between fields etc.) video playback application and/or other application.
Optionally, in possible embodiments more of the present invention, may further be user instruction and arrange certain Permission Levels, wherein, Permission Levels higher expression jurisdictions mandate is higher.Such as, Permission Levels are divided and be can be A level, B level and C level, and wherein, A level is higher than B level, and B level is higher than C level.The Permission Levels of user instruction i may be A level, B level or C level.
Optionally, in some possible embodiments of the present invention, when the Permission Levels of described user instruction i have exceeded setting threshold value, also comprise before the described user instruction i of described execution: the vocal print w receiving user's typing, described vocal print w has been mated with the vocal print in standard vocal print storehouse.Perform described user instruction i to comprise: in the successful situation of certain voice print matching in described vocal print w and standard vocal print storehouse, perform described user instruction i.
Certain the voice print matching success in described vocal print w and standard vocal print storehouse such as can be determined when the similarity of certain vocal print in described vocal print w and standard vocal print storehouse is greater than Second Threshold.
For example, Second Threshold can be such as 50%, 80%, 85%, 88%, 91%, 95% or other value.
Be understandable that, Permission Levels characteristic introduced to user instruction, utilizes vocal print and fingerprint sequence to jointly control the execution of the user instruction of high Permission Levels, be conducive to the safe controllability improving user instruction execution further.
Optionally, in some possible embodiments of the present invention, when the Permission Levels of described user instruction i have exceeded setting threshold value, also comprise before the described user instruction i of described execution: the iris Q receiving user's typing, described iris Q has been mated with the iris in standard iris storehouse.Perform described user instruction i to comprise: certain iris in described iris Q and standard iris storehouse when the match is successful, performs described user instruction i.
The match is successful for certain iris such as can determining in described iris Q and standard iris storehouse when the similarity of certain iris in described iris Q and standard iris storehouse is greater than the 3rd threshold value.
For example, the 3rd threshold value can be such as 80%, 82%, 85%, 88%, 91%, 95% or other value.
Be understandable that, Permission Levels characteristic introduced to user instruction, utilizes iris and fingerprint sequence to jointly control the execution of the user instruction of high Permission Levels, be conducive to the safe controllability improving user instruction execution further.
Optionally, in some possible embodiments of the present invention, described method also can comprise: whether detection user terminal occurs first is got rid of action event, if described user terminal occurs first get rid of action event, detect wearable device that described user terminal specifies whether to occur second and get rid of action event, if wearable device occurs second get rid of action event, judge described first get rid of that action event and described second gets rid of that action event comprises whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge that described first gets rid of action event and second and get rid of whipping that action event comprises and make initial time and whether be all positioned at preset duration, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and do to continue duration and whether be all positioned at described preset duration, get rid of whipping that action event comprises and make initial time if described first gets rid of action event and described second and be all positioned at preset duration, and described first gets rid of action event and described second gets rid of whipping that action event comprises and does to continue duration and be all positioned within described preset duration, judge that first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes initial time and whether be less than the 3rd predetermined threshold value, get rid of the difference that whipping that action event comprises makes initial time be less than the 3rd predetermined threshold value if described first gets rid of action event and described second, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes to continue duration and whether be less than the 4th predetermined threshold value, get rid of the difference that whipping that action event comprises makes to continue duration be less than the 4th predetermined threshold value if described first gets rid of action event and described second, determine that described user terminal and described wearable device all in described preset duration, same action event occur.
Optionally, in possibility embodiments more of the present invention, when the initial time of above-mentioned setting duration can be and determines that described user terminal and described wearable device all in described preset duration, same action event occur.Or, send to authentication server the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to comprise: when determining that described user terminal and described wearable device all in described preset duration, same action event occur, send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Optionally, in some possibility embodiments of the present invention, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains.Wherein, between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
Optionally, in some possibility embodiments of the present invention, used cryptographic algorithm part is encrypted to a described x fingerprint identical or all identical or different.
Optionally, in some possibility embodiments of the present invention, the terminal iidentification (terminal iidentification of user terminal such as can be device identification or cell-phone number etc.) of user terminal is carried in remote fingerprint checking request, has binding relationship between terminal iidentification and decipherment algorithm.Therefore, authentication server can based on the binding relationship between terminal iidentification and decipherment algorithm, determine to verify the decipherment algorithm of asking the terminal iidentification of the user terminal carried to be bound with remote fingerprint, be decrypted to obtain decrypt fingerprint sequence j to the cryptographic fingerprint of the x in fingerprint sequence j based on described decipherment algorithm, by decrypt fingerprint sequence j and wherein 1 the standard fingerprint sequences match in y the standard fingerprint sequence prestored.Wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in decrypt fingerprint sequence j and wherein 1 the successful situation of standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.The remote fingerprint auth response of described instruction remote fingerprint authentication failed can by described authentication server when sending decrypt fingerprint sequence j with when any 1 standard fingerprint sequences match failure in y the standard fingerprint sequence prestored.
For ease of better understanding and implement the technical scheme of the embodiment of the present invention, the application scenarios concrete below in conjunction with some is illustrated.
Refer to Fig. 2, Fig. 2 is the schematic flow sheet of the another kind of remote fingerprint verification method that an alternative embodiment of the invention provides.Wherein, as shown in Figure 2, the another kind of remote fingerprint verification method that an alternative embodiment of the invention provides can comprise following content:
201, user terminal receives user instruction i.
Be appreciated that, user instruction i can be the user instruction for starting application program, also may be the user instruction for menu page turning, also may be the user instruction of amplification of volume, also may be the user instruction for adjusting screen intensity, also may be the user instruction for zooming in or out picture, also may be other user instruction.
If 202, described user terminal determine described user terminal need fingerprint authentication pass through after the user instruction i that could perform, described user terminal gathers user's x fingerprint by the typing of x touch operation institute within setting duration, described x be greater than 1 integer.
Wherein, user terminal such as can be mobile phone, panel computer, notebook computer, palm PC, mobile internet device or other user terminals.
Wherein, described x be greater than or equal to 2 integer.
For example, x such as can equal 2,3,5,7,8,10,21,29,36,50,100 or other value.
203, user terminal sends the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Wherein, described fingerprint sequence j obtains by carrying out combination to a described x fingerprint.
Wherein, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
Optionally, in some possible embodiments of the present invention, described method also can comprise: whether user terminal detection user terminal occurs first is got rid of action event, if described user terminal occurs first get rid of action event, detect wearable device that described user terminal specifies whether to occur second and get rid of action event, if wearable device occurs second get rid of action event, judge described first get rid of that action event and described second gets rid of that action event comprises whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge that described first gets rid of action event and second and get rid of whipping that action event comprises and make initial time and whether be all positioned at preset duration, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and do to continue duration and whether be all positioned at described preset duration, get rid of whipping that action event comprises and make initial time if described first gets rid of action event and described second and be all positioned at preset duration, and described first gets rid of action event and described second gets rid of whipping that action event comprises and does to continue duration and be all positioned within described preset duration, judge that first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes initial time and whether be less than the 3rd predetermined threshold value, get rid of the difference that whipping that action event comprises makes initial time be less than the 3rd predetermined threshold value if described first gets rid of action event and described second, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes to continue duration and whether be less than the 4th predetermined threshold value, get rid of the difference that whipping that action event comprises makes to continue duration be less than the 4th predetermined threshold value if described first gets rid of action event and described second, determine that described user terminal and described wearable device all in described preset duration, same action event occur.
Optionally, in some possibility embodiments of the present invention, user terminal sends to authentication server the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint and comprises: user terminal, when determining described user terminal and described wearable device all in described preset duration, same action event occurs, sends the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Optionally, described first duration can be 10 seconds, 20 seconds, 30 seconds, 50 seconds, 70 seconds, 100 seconds or At All Other Times.
Optionally, the 3rd predetermined threshold value can be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 80 seconds or At All Other Times.
Optionally, the 4th predetermined threshold value can be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 50 seconds, 81 seconds or At All Other Times.
204, authentication server receives remote fingerprint checking request, is mated by fingerprint sequence j with the standard fingerprint sequence in y the standard fingerprint sequence prestored.
205, described authentication server by fingerprint sequence j with in wherein 1 the successful situation of standard fingerprint sequences match in y standard fingerprint sequence prestoring, send the remote fingerprint auth response indicating remote fingerprint to be proved to be successful to user terminal.
Wherein, described y be greater than or equal to 1 integer.
For example, y such as can equal 1,2,3,5,7,8,10,21,29,36,50,100 or other value.
In addition, described authentication server also when all it fails to match with any 1 the standard fingerprint sequence in y the standard fingerprint sequence prestored by fingerprint sequence j, can send the remote fingerprint auth response of instruction remote fingerprint authentication failed to user terminal.
206, user terminal performs described user instruction i when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful.
In addition, user terminal, when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, can eject the information of the execution authority authentication failed for pointing out described user instruction i.
Can find out, among the technical scheme of the present embodiment, user terminal when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
And, fingerprint sequence j obtains based on x fingerprint, each fingerprint putting in order in fingerprint sequence j is also taken into account, therefore, along with the increase of x, the quantity of the fingerprint sequence that may be formed can become very many gradually, this quantity just making possible total fingerprint sequence can bind the user instruction of association can become very many, and then may make a lot of operations all can by touch input to trigger execution, be conducive to the manipulation convenience strengthening touch control operation further like this, bring more convenience to the use of user.
Refer to Fig. 3, Fig. 3 is the schematic flow sheet of the another kind of remote fingerprint verification method that an alternative embodiment of the invention provides.Wherein, as shown in Figure 3, the another kind of remote fingerprint verification method that an alternative embodiment of the invention provides can comprise following content:
301, user terminal receives user instruction i.
Be appreciated that, user instruction i can be the user instruction for starting application program, also may be the user instruction for menu page turning, also may be the user instruction of amplification of volume, also may be the user instruction for adjusting screen intensity, also may be the user instruction for zooming in or out picture, also may be other user instruction.
If 302, described user terminal determine described user terminal need fingerprint authentication pass through after the user instruction i that could perform, described user terminal gathers user's x fingerprint by the typing of x touch operation institute within setting duration, described x be greater than 1 integer.
Wherein, described x be greater than or equal to 2 integer.
In addition, if described user terminal determines that described user terminal is without the need to the user instruction i of fingerprint authentication by just performing, then described user terminal also can directly perform user instruction i.In the present embodiment for described user terminal need fingerprint authentication pass through after the situation of user instruction i that could perform.
303, user terminal is encrypted to obtain x cryptographic fingerprint to a described x fingerprint.
Wherein, to be encrypted used cryptographic algorithm part to a described x fingerprint identical or all identical or different for user terminal.
304, user terminal sends the remote fingerprint checking request of carrying fingerprint sequence j to authentication server.
Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains.Between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
305, authentication server receives remote fingerprint checking request, authentication server is decrypted to obtain decrypt fingerprint sequence j to the cryptographic fingerprint of the x in fingerprint sequence j, by decrypt fingerprint sequence j and the standard fingerprint sequences match in y the standard fingerprint sequence prestored.
306, described authentication server by decrypt fingerprint sequence j with in wherein 1 the successful situation of standard fingerprint sequences match in y standard fingerprint sequence prestoring, send the remote fingerprint auth response indicating remote fingerprint to be proved to be successful to user terminal.
Wherein, described y be greater than or equal to 1 integer.
In addition, described authentication server also can when by decrypt fingerprint sequence j with any 1 standard fingerprint sequences match failure in y standard fingerprint sequence prestoring, send the remote fingerprint auth response indicating remote fingerprint authentication failed to user terminal.
307, user terminal performs described user instruction i when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful.
In addition, user terminal, when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, can eject the information of the execution authority authentication failed for pointing out described user instruction i.
Can find out, among the technical scheme of the present embodiment, user terminal when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
And, fingerprint sequence j obtains based on x fingerprint, each fingerprint putting in order in fingerprint sequence j is also taken into account, therefore, along with the increase of x, the quantity of the fingerprint sequence that may be formed can become very many gradually, this quantity just making possible total fingerprint sequence can bind the user instruction of association can become very many, and then may make a lot of operations all can by touch input to trigger execution, be conducive to the manipulation convenience strengthening touch control operation further like this, bring more convenience to the use of user.
Further, introduce the mechanism that the fingerprint in fingerprint sequence is encrypted, be conducive to improving the mutual security of fingerprint sequence between user terminal and authentication server.
Refer to Fig. 4, Fig. 4 is the schematic flow sheet of the another kind of remote fingerprint verification method that an alternative embodiment of the invention provides.Wherein, as shown in Figure 4, the another kind of remote fingerprint verification method that an alternative embodiment of the invention provides can comprise following content:
401, user terminal receives user instruction i.
Be appreciated that, user instruction i can be the user instruction for starting application program, also may be the user instruction for menu page turning, also may be the user instruction of amplification of volume, also may be the user instruction for adjusting screen intensity, also may be the user instruction for zooming in or out picture, also may be other user instruction.
If 402, described user terminal determine described user terminal need fingerprint authentication pass through after the user instruction i that could perform, described user terminal gathers user's x fingerprint by the typing of x touch operation institute within setting duration.
Wherein, described x be greater than or equal to 2 integer.
403, user terminal is encrypted to obtain x cryptographic fingerprint to a described x fingerprint.
Wherein, to be encrypted used cryptographic algorithm part to a described x fingerprint identical or all identical or different for user terminal.
404, user terminal sends the remote fingerprint checking request of carrying fingerprint sequence j to authentication server.
Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains.Between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
405, authentication server receives remote fingerprint checking request, authentication server is decrypted to obtain decrypt fingerprint sequence j to the cryptographic fingerprint of the x in fingerprint sequence j, by decrypt fingerprint sequence j and the standard fingerprint sequences match in y the standard fingerprint sequence prestored.
406, described authentication server by decrypt fingerprint sequence j with in wherein 1 the successful situation of standard fingerprint sequences match in y standard fingerprint sequence prestoring, send the remote fingerprint auth response indicating remote fingerprint to be proved to be successful to user terminal.
Wherein, described y be greater than or equal to 1 integer.
In addition, described authentication server also can when by decrypt fingerprint sequence j with any 1 standard fingerprint sequences match failure in y standard fingerprint sequence prestoring, send the remote fingerprint auth response indicating remote fingerprint authentication failed to user terminal.
407, user terminal is when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful, and judges whether the Permission Levels of described user instruction i have exceeded setting threshold value.
If so, then step 408 is performed.If not, then step 410 is performed.
408, user terminal ejects the information for pointing out typing vocal print on a display screen, the vocal print of monitor user ' typing.
Wherein, by the vocal print of the device monitor user typings such as microphone.
If 409, user terminal receives the vocal print w of user's typing, described vocal print w is mated with the vocal print in standard vocal print storehouse.If certain voice print matching success in described vocal print w and standard vocal print storehouse, performs step 410.
In addition, if any one voice print matching failure in described vocal print w and standard vocal print storehouse, user terminal such as can eject on a display screen for pointing out current typing vocal print to trigger the information performing user instruction failure.
410, described user instruction i is performed.
In addition, user terminal, when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, can eject the information of the execution authority authentication failed for pointing out described user instruction i.
Can find out, among the technical scheme of the present embodiment, user terminal when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
And, fingerprint sequence j obtains based on x fingerprint, each fingerprint putting in order in fingerprint sequence j is also taken into account, therefore, along with the increase of x, the quantity of the fingerprint sequence that may be formed can become very many gradually, this quantity just making possible total fingerprint sequence can bind the user instruction of association can become very many, and then may make a lot of operations all can by touch input to trigger execution, be conducive to the manipulation convenience strengthening touch control operation further like this, bring more convenience to the use of user.
Further, introduce the mechanism that the fingerprint in fingerprint sequence is encrypted, be conducive to improving the mutual security of fingerprint sequence between user terminal and authentication server.
Further, Permission Levels characteristic is introduced to user instruction, utilizes vocal print and fingerprint sequence etc. to jointly control the execution of the user instruction of high Permission Levels, be conducive to the security controllability improving user instruction execution further.
See Fig. 5, the embodiment of the present invention also provides a kind of user terminal 500, can comprise:
Collecting unit 510, for when the user instruction i that could perform after receiving described user terminal and needing fingerprint authentication to pass through, gathers user's x fingerprint by the typing of x touch operation institute within setting duration, described x be greater than 1 integer.
Transmitting element 520, for sending the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
Perform control module 530, for when receive described authentication server send instruction remote fingerprint be proved to be successful remote fingerprint auth response perform described user instruction i.
Wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.
Optionally, in possibility embodiments more of the present invention,
Described user terminal also comprises: ciphering unit, for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint; Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains.Between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
Optionally, in possibility embodiments more of the present invention, it is identical or all identical or different that described ciphering unit is encrypted used cryptographic algorithm part to a described x fingerprint.
Optionally, in possibility embodiments more of the present invention, the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
Optionally, in possibility embodiments more of the present invention,
Described execution control module 530 also can be used for: when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
Optionally, in possible embodiments more of the present invention, described user terminal 500 also can comprise further: monitoring means, whether occur first get rid of action event for detecting user terminal, if described user terminal occurs first get rid of action event, detect wearable device that described user terminal specifies whether to occur second and get rid of action event, if described wearable device occurs second get rid of action event, judge described first get rid of that action event and described second gets rid of that action event comprises whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and make initial time and whether be all positioned at preset duration, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and do to continue duration and whether be all positioned at described preset duration, get rid of whipping that action event comprises and make initial time if described first gets rid of action event and described second and be all positioned at preset duration, and described first gets rid of action event and described second gets rid of whipping that action event comprises and does to continue duration and be all positioned within described preset duration, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes initial time and whether be less than the 3rd predetermined threshold value, get rid of the difference that whipping that action event comprises makes initial time be less than the 3rd predetermined threshold value if described first gets rid of action event and described second, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes to continue duration and whether be less than the 4th predetermined threshold value, get rid of the difference that whipping that action event comprises makes to continue duration be less than the 4th predetermined threshold value if described first gets rid of action event and described second, determine that described user terminal and described wearable device all in described preset duration, same action event occur.
Optionally, among possible embodiments more of the present invention, transmitting element 520, specifically for when determining described user terminal and described wearable device all in described preset duration, same action event occurs, sends the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Be understandable that, the function of each functional module of the user terminal 500 of the present embodiment can according to the method specific implementation in said method embodiment, and its specific implementation process with reference to the associated description of said method embodiment, can repeat no more herein.
Can find out, among the technical scheme of the present embodiment, user terminal 500 when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
See the schematic diagram of the user terminal 600 that Fig. 6, Fig. 6 provide for the embodiment of the present invention, at least 1 storer 603 that user terminal 600 can comprise at least 1 bus 601, at least 1 processor 602 be connected with bus 601 and be connected with bus 601.
Wherein, processor 602 calls the code or instruction that store in storer 603 for when the user instruction i that could perform after receiving described user terminal and needing fingerprint authentication to pass through by bus 601, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be greater than or equal to 2 integer; Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful.
Wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.
Optionally, in possibility embodiments more of the present invention, processor 602 is also for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint; Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains.Between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
Optionally, in possibility embodiments more of the present invention, it is identical or all identical or different that processor 602 is encrypted used cryptographic algorithm part to a described x fingerprint.
Optionally, in possibility embodiments more of the present invention, processor 602 also can be used for, when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
Optionally, in possibility embodiments more of the present invention, the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
Optionally, in possible embodiments more of the present invention, whether processor 602 also occurs first get rid of action event for detecting user terminal, if described user terminal occurs first get rid of action event, detect wearable device that described user terminal specifies whether to occur second and get rid of action event, if described wearable device occurs second get rid of action event, judge described first get rid of that action event and described second gets rid of that action event comprises whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and make initial time and whether be all positioned at preset duration, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and do to continue duration and whether be all positioned at described preset duration, get rid of whipping that action event comprises and make initial time if described first gets rid of action event and described second and be all positioned at preset duration, and described first gets rid of action event and described second gets rid of whipping that action event comprises and does to continue duration and be all positioned within described preset duration, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes initial time and whether be less than the 3rd predetermined threshold value, get rid of the difference that whipping that action event comprises makes initial time be less than the 3rd predetermined threshold value if described first gets rid of action event and described second, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes to continue duration and whether be less than the 4th predetermined threshold value, get rid of the difference that whipping that action event comprises makes to continue duration be less than the 4th predetermined threshold value if described first gets rid of action event and described second, determine that described user terminal and described wearable device all in described preset duration, same action event occur.
Optionally, among possible embodiments more of the present invention, to authentication server send carry the fingerprint sequence j obtained based on a described x fingerprint remote fingerprint checking ask in, processor 602 specifically for, when determining described user terminal and described wearable device all in described preset duration, same action event occurs, send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Be understandable that, the function of each functional module of the user terminal 600 of the present embodiment can according to the method specific implementation in said method embodiment, and its specific implementation process with reference to the associated description of said method embodiment, can repeat no more herein.
Can find out, among the technical scheme of the present embodiment, user terminal 600 when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user within setting duration by x fingerprint of x touch operation institute typing; The remote fingerprint checking request carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving authentication server transmission is proved to be successful.The remote fingerprint auth response be proved to be successful due to described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server, visible technique scheme is equivalent to provide a kind ofly long-rangely carries out finger print authentication mechanism, user terminal can complete fingerprint authentication by authentication server is next long-range and then determines whether to perform user instruction, even if the non-storage standards fingerprint sequence in this locality of such user terminal also can realize fingerprint authentication, visible technique scheme is conducive to the application scenarios of extending user fingerprint, and then bring convenience to the use of user.
Further, fingerprint sequence j obtains based on x fingerprint, therefore along with the increase of x, the quantity of the fingerprint sequence that may be formed can become very many gradually, this quantity just making possible total fingerprint sequence can bind the user instruction of association can become very many, and then a lot of operations may be made all by touching input to trigger execution, the manipulation convenience strengthening touch control operation further can be conducive to like this, to bring more convenience to the use of user.
See Fig. 7, the embodiment of the present invention also provides a kind of fingerprint verification system 700, comprising: user terminal 710 and authentication server 720.
User terminal 710, for when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be greater than 1 integer; Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x cryptographic fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful;
Authentication server 720, for receiving described remote fingerprint checking request, described fingerprint sequence j is mated with y the standard fingerprint sequence prestored, at described fingerprint sequence j with in the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored, send the remote fingerprint auth response indicating remote fingerprint to be proved to be successful to described user terminal.
Optionally, in possibility embodiments more of the present invention, user terminal is also for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint, wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains, wherein, between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation.
Optionally, in possibility embodiments more of the present invention, used cryptographic algorithm part is encrypted to a described x fingerprint identical or all identical or different.
Optionally, in possibility embodiments more of the present invention, it is identical or all identical or different that user terminal 710 is encrypted used cryptographic algorithm part to a described x fingerprint.
Optionally, in possible embodiments more of the present invention, user terminal 710 also can be used for detecting user terminal 710 and whether occurs first and get rid of action event, if described user terminal 710 occurs first get rid of action event, detect wearable device that described user terminal specifies whether to occur second and get rid of action event, if described wearable device occurs second get rid of action event, judge described first get rid of that action event and described second gets rid of that action event comprises whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and make initial time and whether be all positioned at preset duration, judge that described first gets rid of action event and described second and get rid of whipping that action event comprises and do to continue duration and whether be all positioned at described preset duration, get rid of whipping that action event comprises and make initial time if described first gets rid of action event and described second and be all positioned at preset duration, and described first gets rid of action event and described second gets rid of whipping that action event comprises and does to continue duration and be all positioned within described preset duration, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes initial time and whether be less than the 3rd predetermined threshold value, get rid of the difference that whipping that action event comprises makes initial time be less than the 3rd predetermined threshold value if described first gets rid of action event and described second, judge that described first gets rid of action event and described second and get rid of the difference that whipping that action event comprises makes to continue duration and whether be less than the 4th predetermined threshold value, get rid of the difference that whipping that action event comprises makes to continue duration be less than the 4th predetermined threshold value if described first gets rid of action event and described second, determine that described user terminal and described wearable device all in described preset duration, same action event occur.
Optionally, among possible embodiments more of the present invention, to authentication server send carry the fingerprint sequence j obtained based on a described x fingerprint remote fingerprint checking ask in, user terminal 710 specifically for, when determining user terminal 710 and described wearable device all in described preset duration, same action event occurs, send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server.
Be understandable that, the user terminal 710 of the present embodiment and the function of authentication server 720 can according to the method specific implementations in said method embodiment, and its specific implementation process with reference to the associated description of said method embodiment, can repeat no more herein.
In the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
In several embodiments that the application provides, should be understood that, disclosed device, the mode by other realizes.Such as, device embodiment described above is only schematic, the such as division of described unit, be only a kind of logic function to divide, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of device or unit or communication connection can be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprises all or part of step of some instructions in order to make a computer equipment (can be personal computer, server or the network equipment etc.) perform method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.

Claims (10)

1. a remote fingerprint verification method, is characterized in that, comprising:
User terminal when have received described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be greater than 1 integer;
Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation;
Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful, wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in fingerprint sequence j and wherein 1 the successful situation of standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.
2. method according to claim 1, is characterized in that,
Described method also comprises: when receiving the remote fingerprint auth response of the instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
3. method according to claim 1 and 2, is characterized in that,
Described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains, and has corresponding relation between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing.
4. method according to claim 3, is characterized in that,
The arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
5. a user terminal, is characterized in that, comprising:
Collecting unit, for when the user instruction i that could perform after receiving described user terminal and needing fingerprint authentication to pass through, gathers user's x fingerprint by the typing of x touch operation institute within setting duration, described x be greater than 1 integer;
Transmitting element, for sending the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation;
Perform control module, for when receive described authentication server send instruction remote fingerprint be proved to be successful remote fingerprint auth response perform described user instruction i, wherein, the remote fingerprint auth response that is proved to be successful of described instruction remote fingerprint is being sent in fingerprint sequence j and the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored by described authentication server.
6. user terminal according to claim 5, is characterized in that,
Described user terminal also comprises: ciphering unit is used for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint; Wherein, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains, and has corresponding relation between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing.
7. user terminal according to claim 6, is characterized in that,
The arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i is identical or contrary with the sequencing of corresponding fingerprint typing.
8. the user terminal according to any one of claim 5 to 7, it is characterized in that, described execution control module also for: when receiving the remote fingerprint auth response of instruction remote fingerprint authentication failed that described authentication server sends, eject the information of the execution authority authentication failed for pointing out described user instruction i.
9. a fingerprint verification system, is characterized in that, comprising:
User terminal, for when receive described user terminal need fingerprint authentication pass through after could perform user instruction i, gather user by x fingerprint of x touch operation institute typing within setting duration, described x be greater than 1 integer; Send the remote fingerprint checking request carrying the fingerprint sequence j obtained based on a described x cryptographic fingerprint to authentication server, between the arrangement sequencing of the fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing, there is corresponding relation; Described user instruction i is performed when the remote fingerprint auth response that the instruction remote fingerprint receiving the transmission of described authentication server is proved to be successful;
Described authentication server, for receiving described remote fingerprint checking request, described fingerprint sequence j is mated with y the standard fingerprint sequence prestored, at described fingerprint sequence j with in the successful situation of one of them standard fingerprint sequences match in y the standard fingerprint sequence prestored, send the remote fingerprint auth response indicating remote fingerprint to be proved to be successful to described user terminal.
10. fingerprint verification system according to claim 9, it is characterized in that, described user terminal is also for being encrypted to obtain x cryptographic fingerprint to a described x fingerprint, described fingerprint sequence j carries out combination by x the cryptographic fingerprint being encrypted to obtain to a described x fingerprint and obtains, and has corresponding relation between the arrangement sequencing of a described x cryptographic fingerprint in described fingerprint sequence i and the sequencing of corresponding fingerprint typing.
CN201510540526.3A 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system Expired - Fee Related CN105160227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510540526.3A CN105160227B (en) 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510540526.3A CN105160227B (en) 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system

Publications (2)

Publication Number Publication Date
CN105160227A true CN105160227A (en) 2015-12-16
CN105160227B CN105160227B (en) 2019-03-15

Family

ID=54801083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510540526.3A Expired - Fee Related CN105160227B (en) 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system

Country Status (1)

Country Link
CN (1) CN105160227B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472348A (en) * 2015-12-30 2016-04-06 广州励丰文化科技股份有限公司 Method and system for monitoring prison based on fingerprint and touch pressure control
CN105491342A (en) * 2015-12-30 2016-04-13 广州励丰文化科技股份有限公司 Intelligent monitoring method and system based on fingerprint and pressure under multi-camera condition
CN105516678A (en) * 2015-12-30 2016-04-20 广州励丰文化科技股份有限公司 Method and system for intelligent monitoring according to contact surface and fingerprints in multi-camera scene
CN105530489A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for intelligently monitoring according to touch pressure in multi-camera scene
CN105530483A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for controlling monitoring under multi-camera scene with fingerprint and touch surface as reference
CN105530487A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for carrying out intelligent monitoring under multi-camera scene according to pressure change and fingerprint
CN105530482A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for controlling monitoring under multi-camera scene with pressure change and fingerprint as reference
CN105554467A (en) * 2015-12-30 2016-05-04 广州励丰文化科技股份有限公司 Intelligent monitoring method and system according to touch duration in multi-camera scene
CN105681740A (en) * 2015-12-30 2016-06-15 广州励丰文化科技股份有限公司 Method and system for monitoring detention room based on touch duration control
CN105681742A (en) * 2015-12-30 2016-06-15 广州励丰文化科技股份有限公司 Method and system for performing intelligent monitoring according to fingerprints and duration in multi-camera scene
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device
CN106786903A (en) * 2016-12-26 2017-05-31 广东欧珀移动通信有限公司 Information Authentication method, device, wireless charging device and mobile terminal
CN106937082A (en) * 2015-12-30 2017-07-07 广州励丰文化科技股份有限公司 With reference to the method and system of touch-control area control monitoring under multi-cam scene
WO2017148154A1 (en) * 2016-02-29 2017-09-08 北京小米移动软件有限公司 Fingerprint authentication method and device
CN107679385A (en) * 2017-10-20 2018-02-09 珠海市魅族科技有限公司 A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing
CN109214232A (en) * 2017-06-29 2019-01-15 中国电信股份有限公司 Utilize the method and terminal of fingerprint sequence triggering application
CN109543383A (en) * 2018-11-23 2019-03-29 Oppo广东移动通信有限公司 Information sharing method and Related product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853379A (en) * 2009-03-18 2010-10-06 Lg电子株式会社 The method of portable terminal and this portable terminal of control
CN102523556A (en) * 2011-12-15 2012-06-27 百度在线网络技术(北京)有限公司 Matching method and system of mobile terminal as well as mobile terminal and server
CN103902861A (en) * 2012-12-28 2014-07-02 联想(北京)有限公司 Status switching method and electronic device
US20140337635A1 (en) * 2013-05-13 2014-11-13 Ira Konvalinka Biometric verification with improved privacy and network performance in client-server networks
CN104541282A (en) * 2014-05-14 2015-04-22 华为技术有限公司 Unlocking method, apparatus and device
CN104574073A (en) * 2013-10-18 2015-04-29 阿里巴巴集团控股有限公司 Matching method and system for electronic equipment
CN104751038A (en) * 2013-12-25 2015-07-01 腾讯科技(深圳)有限公司 Identity authentication method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101853379A (en) * 2009-03-18 2010-10-06 Lg电子株式会社 The method of portable terminal and this portable terminal of control
CN102523556A (en) * 2011-12-15 2012-06-27 百度在线网络技术(北京)有限公司 Matching method and system of mobile terminal as well as mobile terminal and server
CN103902861A (en) * 2012-12-28 2014-07-02 联想(北京)有限公司 Status switching method and electronic device
US20140337635A1 (en) * 2013-05-13 2014-11-13 Ira Konvalinka Biometric verification with improved privacy and network performance in client-server networks
CN104574073A (en) * 2013-10-18 2015-04-29 阿里巴巴集团控股有限公司 Matching method and system for electronic equipment
CN104751038A (en) * 2013-12-25 2015-07-01 腾讯科技(深圳)有限公司 Identity authentication method, device and system
CN104541282A (en) * 2014-05-14 2015-04-22 华为技术有限公司 Unlocking method, apparatus and device

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681740A (en) * 2015-12-30 2016-06-15 广州励丰文化科技股份有限公司 Method and system for monitoring detention room based on touch duration control
CN106937082A (en) * 2015-12-30 2017-07-07 广州励丰文化科技股份有限公司 With reference to the method and system of touch-control area control monitoring under multi-cam scene
CN105472348A (en) * 2015-12-30 2016-04-06 广州励丰文化科技股份有限公司 Method and system for monitoring prison based on fingerprint and touch pressure control
CN105530489A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for intelligently monitoring according to touch pressure in multi-camera scene
CN105530483A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for controlling monitoring under multi-camera scene with fingerprint and touch surface as reference
CN105530487A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for carrying out intelligent monitoring under multi-camera scene according to pressure change and fingerprint
CN105530482A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for controlling monitoring under multi-camera scene with pressure change and fingerprint as reference
CN105554467A (en) * 2015-12-30 2016-05-04 广州励丰文化科技股份有限公司 Intelligent monitoring method and system according to touch duration in multi-camera scene
CN105516678A (en) * 2015-12-30 2016-04-20 广州励丰文化科技股份有限公司 Method and system for intelligent monitoring according to contact surface and fingerprints in multi-camera scene
CN105681742A (en) * 2015-12-30 2016-06-15 广州励丰文化科技股份有限公司 Method and system for performing intelligent monitoring according to fingerprints and duration in multi-camera scene
CN105491342A (en) * 2015-12-30 2016-04-13 广州励丰文化科技股份有限公司 Intelligent monitoring method and system based on fingerprint and pressure under multi-camera condition
WO2017148154A1 (en) * 2016-02-29 2017-09-08 北京小米移动软件有限公司 Fingerprint authentication method and device
US10133911B2 (en) 2016-02-29 2018-11-20 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for verifying fingerprint
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device
CN106786903A (en) * 2016-12-26 2017-05-31 广东欧珀移动通信有限公司 Information Authentication method, device, wireless charging device and mobile terminal
CN109214232A (en) * 2017-06-29 2019-01-15 中国电信股份有限公司 Utilize the method and terminal of fingerprint sequence triggering application
CN107679385A (en) * 2017-10-20 2018-02-09 珠海市魅族科技有限公司 A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing
CN109543383A (en) * 2018-11-23 2019-03-29 Oppo广东移动通信有限公司 Information sharing method and Related product
CN109543383B (en) * 2018-11-23 2022-02-11 Oppo广东移动通信有限公司 Information sharing method and related product

Also Published As

Publication number Publication date
CN105160227B (en) 2019-03-15

Similar Documents

Publication Publication Date Title
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
WO2017032008A1 (en) Method for starting application, and mobile terminal
CN105069335A (en) Password setting method, verification method and terminal
EP2739006A1 (en) Validation processing method, user equipment, and server
US10789372B2 (en) Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
CN104951685A (en) Method and mobile terminal for running application programs
CN105184126A (en) Password setting method, authentication method and terminal
CN106101463B (en) Gesture-based verification method in mobile application, mobile terminal and system
CN105574418A (en) Data encryption method and apparatus
WO2017032128A1 (en) Terminal unlocking method and terminal
CN106648583B (en) Information processing method and terminal
CN104769601A (en) Method for recognition of user identity and electronic equipment
CN104951684A (en) Fingerprint encryption and decryption method and terminal
CN105550627A (en) Fingerprint verification method and apparatus
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN105069360B (en) A kind of file encryption, decryption method and terminal
CN101271507B (en) File hiding method, system and device based on USB equipment
CN105141609A (en) Fingerprint verification method, relevant device and fingerprint verification system
CN103546287A (en) Password verification method and electronic equipment
CN110990821B (en) Identity type verification method, device and storage medium
CN105320868A (en) Application encryption method and mobile terminal
CN105005729A (en) Method for unlocking screen based on image, and user terminal
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
CN109543431B (en) Application encryption method and device, electronic equipment and storage medium
CN105069332A (en) Fingerprint-based password authentication method and password authentication apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190315