CN105160227B - Remote fingerprint verification method and user terminal and fingerprint verification system - Google Patents

Remote fingerprint verification method and user terminal and fingerprint verification system Download PDF

Info

Publication number
CN105160227B
CN105160227B CN201510540526.3A CN201510540526A CN105160227B CN 105160227 B CN105160227 B CN 105160227B CN 201510540526 A CN201510540526 A CN 201510540526A CN 105160227 B CN105160227 B CN 105160227B
Authority
CN
China
Prior art keywords
fingerprint
whipping
user terminal
event
action event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510540526.3A
Other languages
Chinese (zh)
Other versions
CN105160227A (en
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510540526.3A priority Critical patent/CN105160227B/en
Publication of CN105160227A publication Critical patent/CN105160227A/en
Application granted granted Critical
Publication of CN105160227B publication Critical patent/CN105160227B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the invention discloses remote fingerprint verification methods and user terminal and fingerprint verification system.A kind of remote fingerprint verification method includes: user terminal in the case where receiving the user instruction i that user terminal needs fingerprint authentication could execute after, acquires the x fingerprint that user passes through x touch input institute typing within the set duration;The remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint is sent to authentication server;The user instruction i is executed in the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful.Technical solution provided in an embodiment of the present invention is conducive to the application scenarios of extending user fingerprint, and then brings convenience to the use of user.

Description

Remote fingerprint verification method and user terminal and fingerprint verification system
Technical field
The present invention relates to electronic technology fields, have specifically related generally to remote fingerprint verification method and user terminal and fingerprint Verifying system.
Background technique
With the high speed development of internet and communications industry, multimedia service and various virtual technologies start sizable application, The identification and identification of user identity are particularly important.The identifying schemes of currently used user identity have character string password mouth It enables, digital certificate of file, mobile digital certificate (being commonly called as excellent Key), biometric identification etc..
The method for monitoring biometric (bioyetrics) is of great significance in protection information or determining individual identification. Biometric system uses the distinguishing characteristics of face, fingerprint, gesture, blood vessel, iris, signature, retina and vocal print of individual etc..Its Middle finger print information is convenient due to reading, and is continuously increased using the method protection personal information of fingerprint recognition and secret product.
Wherein, the existing application scenarios for user fingerprints are substantially locally applied field relevant to identification Scape, such as standard fingerprint template is stored in mobile phone local, according to the matching feelings of the fingerprint of mobile phone typing and standard fingerprint template Condition carries out authentication, and this mode has stronger scene restriction, and (such as mobile phone locally has to standard is stored in advance and refer to Line template), influence the application range that identification is carried out using fingerprint.
Summary of the invention
The embodiment of the present invention provides remote fingerprint verification method and relevant apparatus and fingerprint verification system, is referred to extending user The application scenarios of line, and then brought convenience to the use of user.
First aspect of the embodiment of the present invention provides a kind of remote fingerprint verification method, comprising:
The user instruction i that user terminal could execute after having received the user terminal and fingerprint authentication is needed to pass through In the case where, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1 Integer;
The remote fingerprint verifying for carrying the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission is asked It asks, there is corresponding close between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i System;
In the remote fingerprint auth response that the instruction remote fingerprint for receiving the authentication server transmission is proved to be successful In the case of execute the user instruction i, wherein the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by described Authentication server is successful by wherein 1 standard fingerprint sequences match in fingerprint sequence j and the y standard fingerprint sequence prestored In the case where send.
With reference to first aspect, in the first possible embodiment of first aspect,
The method also includes: the user terminal is encrypted the x fingerprint to obtain x encryption and refer to Line.Wherein, the fingerprint sequence j is combined by the x fingerprint is encrypted with x obtained cryptographic fingerprint It arrives.The x cryptographic fingerprint is between arrangement sequencing and the sequencing of corresponding fingerprint typing in the fingerprint sequence i With corresponding relationship.
With reference to first aspect, in second of possible embodiment of first aspect,
Arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing Sequence is identical or opposite.
Second of possible embodiment of the possible embodiment of with reference to first aspect the first or first aspect, It is described the x fingerprint to be encrypted to obtain x encryption and refer in the third possible embodiment of first aspect Line includes: to be encrypted the x fingerprint to obtain x cryptographic fingerprint using mutually different Encryption Algorithm.
Second of possible embodiment of the possible embodiment of with reference to first aspect the first or first aspect, In 4th kind of possible embodiment of first aspect, used Encryption Algorithm portion is encrypted to the x fingerprint Split-phase with or all it is identical.
With reference to first aspect or second of the first possible embodiment of first aspect or first aspect possible The possible embodiment of the third of embodiment or first aspect, in the 4th kind of possible embodiment of first aspect,
The method also includes: receiving the long-range of the instruction remote fingerprint authentication failed of the authentication server transmission In the case that fingerprint authentication responds, the prompt information for prompting the execution permission authentication failed of the user instruction i is popped up.
With reference to first aspect or second of the first possible embodiment of first aspect or first aspect possible 4th kind of possible embodiment of embodiment or first aspect, in the 5th kind of possible embodiment of first aspect, The remote fingerprint checking request carries the terminal iidentification of user terminal, between terminal iidentification and decipherment algorithm there is binding to close System.
Second aspect of the embodiment of the present invention provides a kind of user terminal, comprising:
Acquisition unit, the user instruction for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through In the case where i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1 Integer;
Transmission unit, for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint to authentication server transmission Remote fingerprint checking request, the arrangement sequencing of the fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing There is corresponding relationship between sequence;
Control unit is executed, it is remote for being proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission Journey fingerprint authentication executes the user instruction i in the case where responding, the remote fingerprint that the instruction remote fingerprint is proved to be successful is tested Card response is referred to by the authentication server by fingerprint sequence j and one of standard in y standard fingerprint sequence prestoring It is sent in the successful situation of line sequences match.
In conjunction with second aspect, in the first possible embodiment of second aspect,
The user terminal further include: encryption unit obtains x encryption for the x fingerprint to be encrypted Fingerprint;Wherein, the fingerprint sequence j is combined by the x fingerprint is encrypted with x obtained cryptographic fingerprint Obtain, the x cryptographic fingerprint in the fingerprint sequence i arrangement sequencing and corresponding fingerprint typing sequencing it Between have corresponding relationship.
In conjunction with the first possible embodiment of second aspect, in second of possible embodiment of second aspect In,
The encryption unit be specifically used for using mutually different Encryption Algorithm to the x fingerprint be encrypted with Obtain x cryptographic fingerprint.
In conjunction with the first possible embodiment of second aspect, second aspect the third possible embodiment it In, it is identical or all identical that used Encryption Algorithm part is encrypted to the x fingerprint.
In conjunction with the first possible embodiment of second aspect or second of possible embodiment of second aspect or The third possible embodiment of second aspect, among the 4th kind of possible embodiment of second aspect, the x add Arrangement sequencing and the sequencing of corresponding fingerprint typing of the close fingerprint in the fingerprint sequence i are identical or opposite.
Second in conjunction with the possible embodiment of the first of second aspect or second aspect or second aspect is possible 4th kind of possible embodiment of the possible embodiment of the third of embodiment or second aspect or second aspect, In 5th kind of possible embodiment of two aspects,
The control unit that executes is also used to: being lost receiving the instruction remote fingerprint verifying that the authentication server is sent In the case where the remote fingerprint auth response lost, mentioning for the execution permission authentication failed for prompting the user instruction i is popped up Show information.
Second in conjunction with the possible embodiment of the first of second aspect or second aspect or second aspect is possible 5th kind of possible embodiment of the 4th kind of possible embodiment or second aspect of embodiment or second aspect, In 6th kind of possible embodiment of two aspects, the remote fingerprint checking request carries the terminal iidentification of user terminal, eventually There is binding relationship between end mark and decipherment algorithm.
The third aspect of the embodiment of the present invention provides a kind of fingerprint verification system, comprising:
User terminal, the user instruction for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through In the case where i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1 Integer;The remote fingerprint verifying for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint to authentication server transmission is asked It asks, there is corresponding close between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i System;In the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful Execute the user instruction i;
The authentication server, for receiving the remote fingerprint checking request, by the fingerprint sequence j and the y prestored A standard fingerprint sequence is matched, one of standard in the fingerprint sequence j and the y standard fingerprint sequence prestored In the case where fingerprint sequence successful match, Xiang Suoshu user terminal sends the remote fingerprint verifying that instruction remote fingerprint is proved to be successful Response.
In conjunction with the third aspect, in the first possible embodiment of the third aspect, user terminal is also used to the x A fingerprint is encrypted to obtain x cryptographic fingerprint, and the fingerprint sequence j is by being encrypted the x fingerprint It is combined to obtain with x obtained cryptographic fingerprint, arrangement of the x cryptographic fingerprint in the fingerprint sequence i is successively suitable There is corresponding relationship between sequence and the sequencing of corresponding fingerprint typing.
In conjunction with the first possible embodiment of the third aspect, in second of possible embodiment of the third aspect In, it is identical or all identical or different that used Encryption Algorithm part is encrypted to the x fingerprint.
In conjunction with the first possible embodiment of the third aspect or second of possible embodiment of the third aspect, In the third possible embodiment of the third aspect, arrangement of the x cryptographic fingerprint in the fingerprint sequence i is successively suitable Sequence and the sequencing of corresponding fingerprint typing are identical or opposite.
Second in conjunction with the possible embodiment of the first of the third aspect or the third aspect or the third aspect is possible The possible embodiment of the third of embodiment or the third aspect, in the 4th kind of possible embodiment of the third aspect,
The user terminal is also used to, and is receiving the instruction remote fingerprint authentication failed of the authentication server transmission In the case where remote fingerprint auth response, the prompt letter for prompting the execution permission authentication failed of the user instruction i is popped up Breath.
Second in conjunction with the possible embodiment of the first of the third aspect or the third aspect or the third aspect is possible 4th kind of possible embodiment of embodiment or the third aspect, in the 5th kind of possible embodiment of the third aspect, The remote fingerprint checking request carries the terminal iidentification of user terminal, between terminal iidentification and decipherment algorithm there is binding to close System.
As can be seen that user terminal needs to refer to receiving the user terminal in the technical solution of the embodiment of the present invention In the case where the user instruction i that line could execute after being verified, acquisition user is grasped within setting duration by x touch Make x fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server Checking request;The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that authentication server is sent is proved to be successful It is lower to execute the user instruction i.Since the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by the verifying Server is successful by fingerprint sequence j and one of standard fingerprint sequences match in y standard fingerprint sequence prestoring In the case of send, it is seen that above-mentioned technical proposal be equivalent to provides it is a kind of long-range carry out finger print authentication mechanism, user terminal can be with Remotely to complete fingerprint authentication by authentication server and then determine whether to execute user instruction, the local of such user terminal is Make not stored standard fingerprint sequence that can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the application of extending user fingerprint Scene, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's Using bringing more convenience.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, below by embodiment it is required use it is attached Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this field For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1-a is a kind of schematic diagram of the network architecture provided in an embodiment of the present invention;
Fig. 1-b is a kind of flow diagram of remote fingerprint verification method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram for another remote fingerprint verification method that the embodiment of the present invention provides;
Fig. 3 is the flow diagram for another remote fingerprint verification method that the embodiment of the present invention provides;
Fig. 4 is the flow diagram for another remote fingerprint verification method that the embodiment of the present invention provides;
Fig. 5 is a kind of schematic diagram of user terminal provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram for another user terminal that the embodiment of the present invention supplies;
Fig. 7 is a kind of schematic diagram of fingerprint verification system provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the present invention provides remote fingerprint verification method and relevant apparatus and fingerprint verification system, is referred to extending user The application scenarios of line, and then brought convenience to the use of user.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical solution in the embodiment of the present invention are explicitly described, it is clear that described embodiment is only the present invention The embodiment of a part, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not having Every other embodiment obtained under the premise of creative work is made, should fall within the scope of the present invention.
The term " first " that occurs in description of the invention, claims and attached drawing, " second " and " third " etc. are to use In the different object of difference, and it is not intended to describe specific sequence.In addition, term " includes " and " having " and they are any Deformation, it is intended that cover and non-exclusive include.Such as contain the process, method, system, product of a series of steps or units Or equipment is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or can Selection of land further includes the other step or units intrinsic for these process, methods, product or equipment.
Referring to Fig. 1-a, Fig. 1-a is a kind of schematic diagram of the network architecture provided in an embodiment of the present invention, network shown in Fig. 1-a In framework, several user terminals can be connect by network with authentication server.The technical solution of the embodiment of the present invention can be based on The network architecture shown in 1-a is embodied.
One embodiment of remote fingerprint verification method of the invention.A kind of remote fingerprint verification method, may include: use Family terminal have received the user terminal need fingerprint authentication by after could execute user instruction i in the case where, The x fingerprint that user passes through the typing of x touch operation institute within setting duration is acquired, the x is just whole more than or equal to 2 Number;The remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint, institute are sent to authentication server Stating has corresponding relationship between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in fingerprint sequence i;? It is executed in the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful The user instruction i, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful are being incited somebody to action by the authentication server It is sent in fingerprint sequence j and wherein 1 successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Fig. 1-b is please referred to, Fig. 1-b is a kind of process for remote fingerprint verification method that one embodiment of the present of invention provides Schematic diagram.Wherein, as shown in Fig. 1-b, a kind of remote fingerprint verification method that one embodiment of the present of invention provides may include The following contents:
101, user terminal needs the fingerprint authentication user that could execute after to refer to receiving the user terminal In the case where enabling i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1 Integer.
Wherein, user terminal may be, for example, mobile phone, tablet computer, laptop, palm PC, mobile internet device Or other users terminal.
Wherein, the x is the integer more than or equal to 2.
For example, x for example can be equal to 2,3,5,7,8,10,21,29,36,50,100 or other values.
Wherein, the value of above-mentioned setting duration is flexibly set according to specific needs, such as setting duration Value range can be between 3 seconds~30 seconds or other ranges.Specifically for example, setting duration can be equal to 10 seconds, 20 seconds, 30 Second, 3 seconds, 7 seconds, 100 seconds or other durations.
It can be finger finger and/or toe finger that the finger of touch input is executed in the embodiment of the present invention.That is, this It invents and user is not only supported to carry out touch input using finger in each embodiment, also support user touch using toe defeated Enter, this individuals with disabilities for using finger manipulation inconvenience, it will become it is very convenient effectively.
102, user terminal carries the remote of the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission The request of journey fingerprint authentication.
Wherein, between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i With corresponding relationship.Such as arrangement sequencing and the x of the cryptographic fingerprint of x fingerprint or x fingerprint in fingerprint sequence j The typing sequencing of a fingerprint is identical, that is to say, that the row of the fingerprint of more first typing or its cryptographic fingerprint in fingerprint sequence i More forward, the fingerprint of rear typing or its cryptographic fingerprint the putting in order more rearward in fingerprint sequence i of column sequence.In another example x The typing of arrangement sequencing and the x fingerprint of the cryptographic fingerprint of a fingerprint or x fingerprint in fingerprint sequence j is successively suitable Sequence is opposite, that is to say, that the fingerprint of more first typing or its cryptographic fingerprint putting in order more rearward in fingerprint sequence i, more after The fingerprint of typing or its cryptographic fingerprint putting in order in fingerprint sequence i are more forward.Certainly, the finger in the fingerprint sequence i The corresponding relationship having between the arrangement sequencing of line and the sequencing of corresponding fingerprint typing is also not necessarily limited to the example above.
103, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission The user instruction i is executed in the case where line auth response.
Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful will referred to by the authentication server It is sent in line sequence j and wherein 1 successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Wherein, the y is the integer more than or equal to 1.
For example, y for example can be equal to 1,2,3,5,7,8,10,21,29,36,50,100 or other values.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.Its In, the remote fingerprint auth response of the instruction remote fingerprint authentication failed can be by the authentication server by fingerprint sequence j It is sent in the case where any 1 standard fingerprint sequences match failure in y standard fingerprint sequence prestoring.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's Using bringing more convenience.
As an example it is assumed that x=3, it is assumed that x fingerprint is led to by 3 different fingers among 10 fingers of user The typing of execution touch input institute is crossed, in that way it is possible to which the quantity of the fingerprint sequence formed may reach
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity, It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
Wherein, application program for example may include short message application, photo browse application, mail applications, text editing application, i.e. When communication applications (such as QQ, wechat, footpath between fields footpath between fields etc.) video playing application and/or other application.
Optionally, in some possible embodiments of the invention, it may further be user instruction and certain power be set Limit grade, wherein Permission Levels are higher, and expression jurisdictions mandate is higher.For example, Permission Levels point can be A grades, B grades and C grades, In, A grades are higher than B grades, and B grades are higher than C grades.The Permission Levels of user instruction i may be A grades, B grades or C grades.
It optionally, has been more than to set in the Permission Levels of the user instruction i in some possible embodiments of the present invention In the case where determining threshold value, before the execution user instruction i further include: the vocal print w for receiving user's typing, by the vocal print W is matched with the vocal print in standard vocal print library.Executing the user instruction i includes: in the vocal print w and standard vocal print library The successful situation of certain voice print matching under, execute the user instruction i.
Such as it can be true in the case that the similarity of the vocal print w and certain vocal print in standard vocal print library are greater than second threshold Certain voice print matching success in the fixed vocal print w and standard vocal print library.
For example, second threshold for example can be 50%, 80%, 85%, 88%, 91%, 95% or other values.
It is understood that introducing Permission Levels characteristic to user instruction, jointly controlled using vocal print and fingerprint sequence The execution of the user instruction of high Permission Levels is conducive to the safely controllable property for further increasing user instruction execution.
It optionally, has been more than to set in the Permission Levels of the user instruction i in some possible embodiments of the present invention In the case where determining threshold value, before the execution user instruction i further include: the iris Q for receiving user's typing, by the iris Q is matched with the iris in standard iris library.Executing the user instruction i includes: in the iris Q and standard iris library In the case where certain iris successful match, the user instruction i is executed.
Such as it can be true in the case that the similarity of the iris Q and certain iris in standard iris library are greater than third threshold value Certain iris successful match in the fixed iris Q and standard iris library.
For example, third threshold value for example can be 80%, 82%, 85%, 88%, 91%, 95% or other values.
It is understood that introducing Permission Levels characteristic to user instruction, jointly controlled using iris and fingerprint sequence The execution of the user instruction of high Permission Levels is conducive to the safely controllable property for further increasing user instruction execution.
Optionally, in some possible embodiments of the present invention, whether the method may also include that detection user terminal Occur first and get rid of action event, if the user terminal, which occurs first, gets rid of action event, detects what the user terminal was specified Whether wearable device, which occurs second, is got rid of action event, if wearable device, which occurs second, gets rid of action event, judges first whipping Make event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge institute It states first and gets rid of action event and the second whipping and make whether initial time is respectively positioned in preset duration as the whipping that event includes, judge Described first, which gets rid of action event and second whipping, makees whether duration is respectively positioned on described preset as the whipping that event includes In duration, if described first get rid of the whipping that action event and second whipping include as event be respectively positioned on as initial time it is pre- If in duration, and described first gets rid of action event and second whipping is respectively positioned on as the whipping that event includes as duration Within the preset duration, judge that first gets rid of action event and second whipping and make initial time as the whipping that event includes Whether difference is less than third predetermined threshold value, if described first gets rid of the whipping that action event includes as event with second whipping The difference for making initial time is less than third predetermined threshold value, judge that described first gets rid of action event and second whipping and make event package The whipping included makees the difference of duration whether less than the 4th preset threshold, if described first gets rid of action event and described second Whipping makees the difference of duration less than the 4th preset threshold as the whipping that event includes, and determines the user terminal and described wears It wears equipment and same action event occurs in the preset duration.
Optionally, in some possible embodiments of the invention, the initial time of above-mentioned setting duration can be to determine At the time of in the preset duration same action event occurs for the user terminal and the wearable device.Alternatively, to testing The remote fingerprint checking request that card server transmission carries the fingerprint sequence j obtained based on the x fingerprint comprises determining that institute User terminal is stated and in the case that in the preset duration same action event occurs for the wearable device, to the service for checking credentials Device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
Optionally, in some possible embodiments of the present invention, the fingerprint sequence j is by adding the x fingerprint Close processing is combined to obtain with x obtained cryptographic fingerprint.Wherein, the x cryptographic fingerprint is in the fingerprint sequence i Arranging has corresponding relationship between sequencing and the sequencing of corresponding fingerprint typing.
Optionally, in some possible embodiments of the present invention is encrypted to the x fingerprint used add Close algorithm part is identical or all identical or different.
Optionally, in some possible embodiments of the present invention, remote fingerprint checking request carries the terminal of user terminal It identifies (terminal iidentification of user terminal may be, for example, device identification or cell-phone number etc.), has between terminal iidentification and decipherment algorithm Binding relationship.Therefore, authentication server can be based on the binding relationship between terminal iidentification and decipherment algorithm, determining and remote fingerprint The decipherment algorithm of the terminal iidentification binding for the user terminal that checking request carries, based on the decipherment algorithm in fingerprint sequence j X cryptographic fingerprint be decrypted to obtain decryption fingerprint sequence j, fingerprint sequence j and y standard fingerprint sequence prestoring will be decrypted Wherein 1 standard fingerprint sequences match in column.Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful By wherein 1 standard fingerprint sequence of the authentication server in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore It is sent in the case where column successful match.The remote fingerprint auth response of the instruction remote fingerprint authentication failed can be by the verifying Any 1 standard fingerprint sequences match of the server in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore fails In the case where send.
For the technical solution convenient for better understanding and implementing the embodiment of the present invention, below with reference to some specific applied fields Scape is illustrated.
Referring to Fig. 2, Fig. 2 be another embodiment of the present invention provides another remote fingerprint verification method process Schematic diagram.Wherein, as shown in Fig. 2, another embodiment of the present invention provides another remote fingerprint verification method can wrap Include the following contents:
201, user terminal receives user instructions i.
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity, It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
202, the user terminal is if it is determined that the user that the user terminal needs fingerprint authentication that could execute after I is instructed, the user terminal acquisition user passes through x fingerprint of x touch operation institute typing, the x within setting duration For the integer greater than 1.
Wherein, user terminal may be, for example, mobile phone, tablet computer, laptop, palm PC, mobile internet device Or other users terminal.
Wherein, the x is the integer more than or equal to 2.
For example, x for example can be equal to 2,3,5,7,8,10,21,29,36,50,100 or other values.
203, user terminal carries the remote of the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission The request of journey fingerprint authentication.
Wherein, the fingerprint sequence j to the x fingerprint by being combined to obtain.
Wherein, between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i With corresponding relationship.
Optionally, in some possible embodiments of the present invention, the method may also include that user terminal detects user Whether terminal, which occurs first, is got rid of action event, if the user terminal, which occurs first, gets rid of action event, it is whole to detect the user Whether the specified wearable device in end, which occurs second, is got rid of action event, if wearable device, which occurs second, gets rid of action event, described in judgement First get rid of action event and second whipping as event include whether get rid of direction of action identical, if getting rid of direction of action phase Together, judge described first when getting rid of action event and the second whipping and making initial time as the whipping that event includes and whether be respectively positioned on default In length, judge that described first gets rid of action event and second whipping and make whether duration is respectively positioned on as the whipping that event includes In the preset duration, if described first gets rid of action event and second whipping and makees initial time as the whipping that event includes It is respectively positioned in preset duration, and described first gets rid of action event and when second whipping continues as the whipping that event includes Length is respectively positioned within the preset duration, judge that first gets rid of action event and second whipping and rise as the whipping that event includes Whether the difference of time of beginning is less than third predetermined threshold value, if described first gets rid of action event and second whipping makees event package The difference that the whipping included makees initial time is less than third predetermined threshold value, judges that described first gets rid of action event and second whipping Whether the whipping for including as event makees the difference of duration less than the 4th preset threshold, if described first get rid of action event with The difference that second whipping makees duration as the whipping that event includes determines the user terminal less than the 4th preset threshold Same action event occurs in the preset duration with the wearable device.
Optionally, in some possible embodiments of the present invention, user terminal is carried to authentication server transmission and is based on The remote fingerprint checking request for the fingerprint sequence j that the x fingerprint obtains include: user terminal determine the user terminal and In the case that in the preset duration same action event occurs for the wearable device, carried to authentication server transmission Remote fingerprint checking request based on the fingerprint sequence j that the x fingerprint obtains.
Optionally, first duration can be 10 seconds, 20 seconds, 30 seconds, 50 seconds, 70 seconds, 100 seconds or other time.
Optionally, third predetermined threshold value can be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 80 seconds or other time.
Optionally, the 4th preset threshold can be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 50 seconds, 81 seconds or other time.
204, authentication server receives remote fingerprint checking request, by fingerprint sequence j and the y standard fingerprint sequence prestored In standard fingerprint sequence matched.
205, the authentication server is by fingerprint sequence j and wherein 1 standard in y standard fingerprint sequence prestoring In the case where fingerprint sequence successful match, the remote fingerprint verifying that instruction remote fingerprint is proved to be successful is sent to user terminal and is rung It answers.
Wherein, the y is the integer more than or equal to 1.
For example, y for example can be equal to 1,2,3,5,7,8,10,21,29,36,50,100 or other values.
In addition, the authentication server can also be by fingerprint sequence j and any 1 in y standard fingerprint sequence prestoring A standard fingerprint sequence sends the remote fingerprint of instruction remote fingerprint authentication failed to user terminal in the case that it fails to match Auth response.
206, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission The user instruction i is executed in the case where line auth response.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's Using bringing more convenience.
Referring to Fig. 3, Fig. 3 be another embodiment of the present invention provides another remote fingerprint verification method process Schematic diagram.Wherein, as shown in figure 3, another embodiment of the present invention provides another remote fingerprint verification method can wrap Include the following contents:
301, user terminal receives user instructions i.
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity, It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
302, the user terminal is if it is determined that the user that the user terminal needs fingerprint authentication that could execute after I is instructed, the user terminal acquisition user passes through x fingerprint of x touch operation institute typing, the x within setting duration For the integer greater than 1.
Wherein, the x is the integer more than or equal to 2.
In addition, the user terminal is if it is determined that the user terminal passes through the user instruction that can be executed without fingerprint authentication I, then the user terminal also can directly execute user instruction i.Need fingerprint authentication logical with the user terminal in the present embodiment In case where the user instruction i that could be executed after crossing.
303, the x fingerprint is encrypted to obtain x cryptographic fingerprint in user terminal.
Wherein, it is identical or complete that used Encryption Algorithm part is encrypted to the x fingerprint in user terminal Portion is identical or different.
304, user terminal sends the remote fingerprint checking request for carrying fingerprint sequence j to authentication server.
Wherein, the x cryptographic fingerprint that the fingerprint sequence j is obtained by the x fingerprint is encrypted carries out Combination obtains.Arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing There is corresponding relationship between sequence.
305, authentication server receives remote fingerprint checking request, and authentication server refers to x encryption in fingerprint sequence j Line is decrypted to obtain decryption fingerprint sequence j, will decrypt the standard in fingerprint sequence j and the y standard fingerprint sequence prestored Fingerprint sequence matching.
306, the authentication server will decrypt fingerprint sequence j and wherein 1 in y standard fingerprint sequence prestoring In the successful situation of standard fingerprint sequences match, the remote fingerprint verifying that instruction remote fingerprint is proved to be successful is sent to user terminal Response.
Wherein, the y is the integer more than or equal to 1.
In addition, the authentication server can also appoint in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore It anticipates in the case where 1 standard fingerprint sequences match failure, the long-range finger of instruction remote fingerprint authentication failed is sent to user terminal Line auth response.
307, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission The user instruction i is executed in the case where line auth response.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's Using bringing more convenience.
Also, it is introduced into the mechanism encrypted to the fingerprint in fingerprint sequence, is conducive to improve user terminal and verifying clothes Fingerprint sequence interaction safety between business device.
Referring to Fig. 4, Fig. 4 be another embodiment of the present invention provides another remote fingerprint verification method process Schematic diagram.Wherein, as shown in figure 4, another embodiment of the present invention provides another remote fingerprint verification method can wrap Include the following contents:
401, user terminal receives user instructions i.
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity, It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
402, the user terminal is if it is determined that the user that the user terminal needs fingerprint authentication that could execute after I is instructed, the user terminal acquisition user passes through x fingerprint of x touch operation institute typing within setting duration.
Wherein, the x is the integer more than or equal to 2.
403, the x fingerprint is encrypted to obtain x cryptographic fingerprint in user terminal.
Wherein, it is identical or complete that used Encryption Algorithm part is encrypted to the x fingerprint in user terminal Portion is identical or different.
404, user terminal sends the remote fingerprint checking request for carrying fingerprint sequence j to authentication server.
Wherein, the x cryptographic fingerprint that the fingerprint sequence j is obtained by the x fingerprint is encrypted carries out Combination obtains.Arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing There is corresponding relationship between sequence.
405, authentication server receives remote fingerprint checking request, and authentication server refers to x encryption in fingerprint sequence j Line is decrypted to obtain decryption fingerprint sequence j, will decrypt the standard in fingerprint sequence j and the y standard fingerprint sequence prestored Fingerprint sequence matching.
406, the authentication server will decrypt fingerprint sequence j and wherein 1 in y standard fingerprint sequence prestoring In the successful situation of standard fingerprint sequences match, the remote fingerprint verifying that instruction remote fingerprint is proved to be successful is sent to user terminal Response.
Wherein, the y is the integer more than or equal to 1.
In addition, the authentication server can also appoint in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore It anticipates in the case where 1 standard fingerprint sequences match failure, the long-range finger of instruction remote fingerprint authentication failed is sent to user terminal Line auth response.
407, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission In the case where line auth response, judge whether the Permission Levels of the user instruction i have been more than given threshold.
If so, thening follow the steps 408.If it is not, thening follow the steps 410.
408, user terminal pops up the prompt information for prompting typing vocal print on a display screen, monitors the sound of user's typing Line.
Wherein, the vocal print of device monitors user's typing such as microphone can be passed through.
If 409, user terminal receives the vocal print w of user's typing, by the vocal print in the vocal print w and standard vocal print library into Row matching.If certain voice print matching success in the vocal print w and standard vocal print library, executes step 410.
In addition, if any one voice print matching in the vocal print w and standard vocal print library fails, user terminal for example can be The prompt information for prompting current typing vocal print triggering to execute user instruction failure is popped up on display screen.
410, the user instruction i is executed.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's Using bringing more convenience.
Further, it is introduced into the mechanism encrypted to the fingerprint in fingerprint sequence, be conducive to improve user terminal and is tested Demonstrate,prove the fingerprint sequence interaction safety between server.
Further, Permission Levels characteristic is introduced to user instruction, jointly controls height using vocal print and fingerprint sequence etc. The execution of the user instruction of Permission Levels is conducive to the safety controllability for further increasing user instruction execution.
Referring to Fig. 5, the embodiment of the present invention also provides a kind of user terminal 500, it may include:
Acquisition unit 510, the user for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through In the case where instructing i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is big In 1 integer.
Transmission unit 520, for carrying the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission Remote fingerprint checking request, the arrangement sequencing of the fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing There is corresponding relationship between sequence.
Control unit 530 is executed, for being proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission Remote fingerprint auth response in the case where execute the user instruction i.
Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful will referred to by the authentication server It is sent in line sequence j and one of successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Optionally, in some possible embodiments of the invention,
The user terminal further include: encryption unit is added for the x fingerprint to be encrypted with obtaining x Close fingerprint;Wherein, the fingerprint sequence j carries out group by the x fingerprint is encrypted with x obtained cryptographic fingerprint Conjunction obtains.The sequencing of arrangement sequencing and corresponding fingerprint typing of the x cryptographic fingerprint in the fingerprint sequence i Between have corresponding relationship.
Optionally, in some possible embodiments of the invention, the encryption unit encrypts the x fingerprint Encryption Algorithm part used in handling is identical or all identical or different.
Optionally, in some possible embodiments of the invention, the x cryptographic fingerprint is in the fingerprint sequence i Arrangement sequencing and the sequencing of corresponding fingerprint typing it is identical or opposite.
Optionally, in some possible embodiments of the invention,
The control unit 530 that executes can also be used in: in the instruction remote fingerprint for receiving the authentication server transmission In the case where the remote fingerprint auth response of authentication failed, pop up for prompting the execution Authority Verification of the user instruction i to lose The prompt information lost.
Optionally, in some possible embodiments of the invention, the user terminal 500 can also further comprise: Whether monitoring unit occurs first for detecting user terminal and gets rid of action event, if the first whipping occurs for the user terminal Make event, detects the specified wearable device of the user terminal and whether occur second and get rid of action event, if the wearable device is sent out Raw second gets rid of action event, judges that described first gets rid of action event and second whipping as the direction of action of getting rid of that event includes and be No identical, if got rid of, direction of action is identical, judges that described first gets rid of action event and second whipping is got rid of as what event included Whether movement initial time is respectively positioned in preset duration, judges that described first gets rid of action event and second whipping makees event package The whipping included makees whether duration is respectively positioned in the preset duration, if described first gets rid of action event and described second and get rid of The whipping that action event includes is respectively positioned in preset duration as initial time, and described first gets rid of action event and described second Whipping is respectively positioned within the preset duration as the whipping that event includes as duration, judge described first get rid of action event with Whether second whipping is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time, if described first It gets rid of action event and second whipping and is less than third predetermined threshold value, judgement as the difference that the whipping that event includes makees initial time Whether described first gets rid of action event and second whipping makees the difference of duration less than the 4th as the whipping that event includes Preset threshold, if described first gets rid of action event and second whipping makees the difference of duration as the whipping that event includes Less than the 4th preset threshold, determine that same movement occurs in the preset duration for the user terminal and the wearable device Event.
Optionally, among some possible embodiments of the invention, transmission unit 520 is specifically used for described in the determination In the case that in the preset duration same action event occurs for user terminal and the wearable device, to authentication server Send the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
It is understood that the function of each functional module of the user terminal 500 of the present embodiment can be according to above method reality The method specific implementation in example is applied, specific implementation process is referred to the associated description of above method embodiment, herein no longer It repeats.
As can be seen that user terminal 500 needs to refer to receiving the user terminal among the technical solution of the present embodiment In the case where the user instruction i that line could execute after being verified, acquisition user is grasped within setting duration by x touch Make x fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server Checking request;The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that authentication server is sent is proved to be successful It is lower to execute the user instruction i.Since the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by the verifying Server is successful by fingerprint sequence j and one of standard fingerprint sequences match in y standard fingerprint sequence prestoring In the case of send, it is seen that above-mentioned technical proposal be equivalent to provides it is a kind of long-range carry out finger print authentication mechanism, user terminal can be with Remotely to complete fingerprint authentication by authentication server and then determine whether to execute user instruction, the local of such user terminal is Make not stored standard fingerprint sequence that can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the application of extending user fingerprint Scene, and then brought convenience to the use of user.
Referring to Fig. 6, Fig. 6 is the schematic diagram of user terminal 600 provided in an embodiment of the present invention, and user terminal 600 may include At least one bus 601, at least one processor 602 being connected with bus 601 and at least one being connected with bus 601 storage Device 603.
Wherein, processor 602 can call the code stored in memory 603 or instruction to be used for by bus 601 In the case where receiving the user instruction i that could be executed after the user terminal needs fingerprint authentication to pass through, acquisition user is being set Pass through x fingerprint of x touch operation institute typing within timing is long, the x is the integer more than or equal to 2;It is taken to verifying Business device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint, the fingerprint sequence i In fingerprint arrangement sequencing and the sequencing of corresponding fingerprint typing between have corresponding relationship;Receiving described test The user instruction is executed in the case where the remote fingerprint auth response that the instruction remote fingerprint that card server is sent is proved to be successful i。
Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful will referred to by the authentication server It is sent in line sequence j and one of successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Optionally, in some possible embodiments of the invention, processor 602 is also used to carry out the x fingerprint Encryption is to obtain x cryptographic fingerprint;Wherein, the fingerprint sequence j is by being encrypted to obtain the x fingerprint X cryptographic fingerprint be combined to obtain.Arrangement sequencing and phase of the x cryptographic fingerprint in the fingerprint sequence i Answering has corresponding relationship between the sequencing of fingerprint typing.
Optionally, in some possible embodiments of the invention, processor 602 carries out at encryption the x fingerprint Encryption Algorithm part used in managing is identical or all identical or different.
Optionally, in some possible embodiments of the invention, processor 602 can also be used in, and receive described test In the case where the remote fingerprint auth response for demonstrate,proving the instruction remote fingerprint authentication failed that server is sent, pop-up is described for prompting The prompt information of the execution permission authentication failed of user instruction i.
Optionally, in some possible embodiments of the invention, the x cryptographic fingerprint is in the fingerprint sequence i Arrangement sequencing and the sequencing of corresponding fingerprint typing it is identical or opposite.
Optionally, in some possible embodiments of the invention, processor 602 is also used to whether detect user terminal Occur first and get rid of action event, if the user terminal, which occurs first, gets rid of action event, detects what the user terminal was specified Whether wearable device, which occurs second, is got rid of action event, if the wearable device, which occurs second, gets rid of action event, judges described first Get rid of action event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action, sentence Break and described first gets rid of action event and when second whipping makees initial time as the whipping that event includes and whether is respectively positioned on default In length, judge that described first gets rid of action event and second whipping and make whether duration is respectively positioned on as the whipping that event includes In the preset duration, if described first gets rid of action event and second whipping and makees initial time as the whipping that event includes It is respectively positioned in preset duration, and described first gets rid of action event and when second whipping continues as the whipping that event includes Length is respectively positioned within the preset duration, judges that described first gets rid of the whipping that action event includes as event with second whipping Whether the difference for making initial time is less than third predetermined threshold value, if described first gets rid of action event and second whipping makees thing The difference that the whipping that part includes makees initial time is less than third predetermined threshold value, judges that described first gets rid of action event and described second Whipping makees the difference of duration whether less than the 4th preset threshold, if first whipping makees thing as the whipping that event includes The difference that part and second whipping make duration as the whipping that event includes determines the user less than the 4th preset threshold Same action event occurs in the preset duration for terminal and the wearable device.
Optionally, it among some possible embodiments of the invention, is based on being carried to authentication server transmission The aspect of the remote fingerprint checking request for the fingerprint sequence j that the x fingerprint obtains, processor 602 is specifically used for, determining User terminal is stated and in the case that in the preset duration same action event occurs for the wearable device, to the service for checking credentials Device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
It is understood that the function of each functional module of the user terminal 600 of the present embodiment can be according to above method reality The method specific implementation in example is applied, specific implementation process is referred to the associated description of above method embodiment, herein no longer It repeats.
As can be seen that user terminal 600 needs to refer to receiving the user terminal among the technical solution of the present embodiment In the case where the user instruction i that line could execute after being verified, acquisition user is grasped within setting duration by x touch Make x fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server Checking request;The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that authentication server is sent is proved to be successful It is lower to execute the user instruction i.Since the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by the verifying Server is successful by fingerprint sequence j and one of standard fingerprint sequences match in y standard fingerprint sequence prestoring In the case of send, it is seen that above-mentioned technical proposal be equivalent to provides it is a kind of long-range carry out finger print authentication mechanism, user terminal can be with Remotely to complete fingerprint authentication by authentication server and then determine whether to execute user instruction, the local of such user terminal is Make not stored standard fingerprint sequence that can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the application of extending user fingerprint Scene, and then brought convenience to the use of user.
Further, fingerprint sequence j is based on x fingerprint and obtains, therefore with the increase of x, it is possible to create fingerprint sequence Quantity can gradually become very it is more, this, which allows for the possible line sequence that generally refers to, can bind the number of associated user instruction Amount can become very more, and then may make many operations that may all trigger execution by touch input, be conducive in this way The manipulation convenience for further enhancing touch control operation brings more convenience to the use of user.
Referring to Fig. 7, the embodiment of the present invention also provides a kind of fingerprint verification system 700, comprising: user terminal 710 and verifying Server 720.
User terminal 710, the use for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through In the case that family instructs i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is Integer greater than 1;The long-range finger for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint is sent to authentication server Line checking request has between the arrangement sequencing of fingerprint and the sequencing of corresponding fingerprint typing in the fingerprint sequence i There is corresponding relationship;In the remote fingerprint auth response that the instruction remote fingerprint for receiving the authentication server transmission is proved to be successful In the case where execute the user instruction i;
Authentication server 720, for receiving the remote fingerprint checking request, by the fingerprint sequence j and the y prestored Standard fingerprint sequence is matched, and is referred in the fingerprint sequence j and one of standard in y standard fingerprint sequence prestoring In the successful situation of line sequences match, Xiang Suoshu user terminal sends the remote fingerprint verifying that instruction remote fingerprint is proved to be successful and rings It answers.
Optionally, in some possible embodiments of the invention, user terminal is also used to add the x fingerprint Close processing is to obtain x cryptographic fingerprint, wherein what the fingerprint sequence j was obtained by the x fingerprint is encrypted X cryptographic fingerprint is combined to obtain, wherein arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i with There is corresponding relationship between the sequencing of corresponding fingerprint typing.
Optionally, in some possible embodiments of the invention, the x fingerprint is encrypted used Encryption Algorithm part is identical or all identical or different.
Optionally, in some possible embodiments of the invention, user terminal 710 encrypts the x fingerprint Encryption Algorithm part used in handling is identical or all identical or different.
Optionally, in some possible embodiments of the invention, user terminal 710 can also be used to detect user terminal Whether 710, which occur first, is got rid of action event, if the user terminal 710, which occurs first, gets rid of action event, detects the user Whether the specified wearable device of terminal, which occurs second, is got rid of action event, if the wearable device, which occurs second, gets rid of action event, is sentenced Break described first get rid of action event and second whipping as event include whether get rid of direction of action identical, if whipping work side To identical, judge that described first gets rid of action event and second whipping and make the whether equal position of initial time as the whipping that event includes In in preset duration, judging that described first gets rid of action event and second whipping as the whipping that event includes and be as duration It is no to be respectively positioned in the preset duration, if described first gets rid of the whipping work that action event and second whipping include as event Initial time is respectively positioned in preset duration, and described first gets rid of action event and whipping that second whipping includes as event It is respectively positioned within the preset duration as duration, judges that described first gets rid of action event and second whipping makees event package Whether the difference that the whipping included makees initial time is less than third predetermined threshold value, if described first gets rid of action event and described second Whipping as the whipping that event includes make initial time difference be less than third predetermined threshold value, judge described first get rid of action event and Whether second whipping makees the difference of duration less than the 4th preset threshold as the whipping that event includes, if described first It gets rid of action event and second whipping and makees the difference of duration less than the 4th preset threshold, determination as the whipping that event includes Same action event occurs in the preset duration for the user terminal and the wearable device.
Optionally, it among some possible embodiments of the invention, is based on being carried to authentication server transmission The aspect of the remote fingerprint checking request for the fingerprint sequence j that the x fingerprint obtains, user terminal 710 is specifically used for, in determination In the case that in the preset duration same action event occurs for user terminal 710 and the wearable device, taken to verifying Business device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
It is understood that the user terminal 710 of the present embodiment and the function of authentication server 720 can be according to the above methods Method specific implementation in embodiment, specific implementation process are referred to the associated description of above method embodiment, herein not It repeats again.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code Medium.

Claims (10)

1. a kind of remote fingerprint verification method characterized by comprising
User terminal is in the feelings for having received the user instruction i that the user terminal needs fingerprint authentication that could execute after Under condition, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is the integer greater than 1;
The remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint, institute are sent to authentication server Stating has corresponding relationship between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in fingerprint sequence i;
The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful Under, judge whether the Permission Levels of the user instruction have been more than given threshold;
In the case where the Permission Levels of the user instruction have been more than given threshold, determine that the user terminal and a wearing are set It is standby whether same action event to occur in preset duration, and in the user terminal and the wearable device in preset duration In the case where same action event occurs, the user instruction i is executed, wherein the instruction remote fingerprint is proved to be successful remote The response of journey fingerprint authentication is by the authentication server by fingerprint sequence j and wherein 1 in y standard fingerprint sequence prestoring It is sent in the successful situation of standard fingerprint sequences match;Wherein it is determined that whether the user terminal and a wearable device are default Occur same action event includes: whether detection user terminal occurs first and get rid of action event in duration, if the user is whole End occurs first to get rid of action event, detects the specified wearable device of the user terminal and whether occurs second and gets rid of action event, if Wearable device occurs second to get rid of action event, judges that described first gets rid of action event and second whipping is got rid of as what event included Whether direction of action is identical, if it is identical to get rid of direction of action, judges that described first gets rid of action event and the second whipping makees event package The whipping included makees whether initial time is respectively positioned in preset duration, judges that described first gets rid of action event and second whipping work The whipping that event includes makees whether duration is respectively positioned in the preset duration, if described first gets rid of action event and described Second whipping is respectively positioned in preset duration as the whipping that event includes as initial time, and described first gets rid of action event and institute It states the second whipping and is respectively positioned within the preset duration as the whipping that event includes as duration, judge that first gets rid of action event Whether it is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time with second whipping, if described One, which gets rid of action event and second whipping, is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time, sentences Break and described first gets rid of action event and second whipping and whether make the difference of duration less than the as the whipping that event includes Four preset thresholds, if described first gets rid of action event and second whipping makees the difference of duration as the whipping that event includes It is same dynamic to determine that the user terminal and the wearable device occur in the preset duration less than the 4th preset threshold for value Make event.
2. the method according to claim 1, wherein
The method also includes: in the remote fingerprint for receiving the instruction remote fingerprint authentication failed that the authentication server is sent In the case where auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i is popped up.
3. method according to claim 1 or 2, which is characterized in that
The fingerprint sequence j is combined to obtain by the x fingerprint is encrypted with x obtained cryptographic fingerprint, The x cryptographic fingerprint has between the sequencing of arrangement sequencing and corresponding fingerprint typing in the fingerprint sequence i There is corresponding relationship.
4. according to the method described in claim 3, it is characterized in that,
The sequencing phase of arrangement sequencing and corresponding fingerprint typing of the x cryptographic fingerprint in the fingerprint sequence i It is same or opposite.
5. a kind of user terminal characterized by comprising
Acquisition unit, user instruction i's for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through In the case of, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is whole greater than 1 Number;
Transmission unit, for sending the long-range finger for carrying the fingerprint sequence j obtained based on the x fingerprint to authentication server Line checking request has between the arrangement sequencing of fingerprint and the sequencing of corresponding fingerprint typing in the fingerprint sequence i There is corresponding relationship;
Control unit is executed, the long-range finger for being proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission In the case where line auth response, judge whether the Permission Levels of the user instruction have been more than given threshold, are referred in the user In the case that the Permission Levels of order have been more than given threshold, determine the user terminal and a wearable device whether in preset duration It is interior that same action event occurs, and same action event occurs in preset duration in the user terminal and the wearable device In the case where, execute the user instruction i, wherein the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint by The authentication server is by fingerprint sequence j and one of standard fingerprint sequence in y standard fingerprint sequence prestoring It is sent in the case where with success;Wherein it is determined that the user terminal and a wearable device whether occur in preset duration it is same Action event includes: whether detection user terminal occurs first and get rid of action event, if the first whipping occurs for the user terminal Make event, detect the specified wearable device of the user terminal and whether occur second and get rid of action event, if wearable device occurs the Two get rid of action event, judge described first get rid of action event and second whipping as event include get rid of direction of action whether phase Together, if got rid of, direction of action is identical, judges that described first gets rid of action event and the second whipping is originated as the whipping that event includes Whether the time is respectively positioned in preset duration, judges that described first gets rid of action event and whipping that second whipping includes as event Make whether duration is respectively positioned in the preset duration, if described first gets rid of action event and described second and get rid of action event Including whipping be respectively positioned in preset duration as initial time, and described first gets rid of action event and second whipping makees thing The whipping that part includes is respectively positioned within the preset duration as duration, judges that first gets rid of action event and second whipping Whether the difference that the whipping for including as event makees initial time is less than third predetermined threshold value, if described first get rid of action event with Second whipping is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time, judges first whipping Make event and second whipping and whether makees the difference of duration less than the 4th preset threshold as the whipping that event includes, if Described first, which gets rid of action event and second whipping, presets as the difference that the whipping that event includes makees duration less than the 4th Threshold value determines that same action event occurs in the preset duration for the user terminal and the wearable device.
6. user terminal according to claim 5, which is characterized in that
The user terminal further include: encryption unit is for being encrypted the x fingerprint to obtain x encryption and refer to Line;Wherein, the fingerprint sequence j is combined by the x fingerprint is encrypted with x obtained cryptographic fingerprint It arrives, the x cryptographic fingerprint is between arrangement sequencing and the sequencing of corresponding fingerprint typing in the fingerprint sequence i With corresponding relationship.
7. user terminal according to claim 6, which is characterized in that
The sequencing phase of arrangement sequencing and corresponding fingerprint typing of the x cryptographic fingerprint in the fingerprint sequence i It is same or opposite.
8. according to the described in any item user terminals of claim 5 to 7, which is characterized in that the execution control unit is also used to: In the case where receiving the remote fingerprint auth response for the instruction remote fingerprint authentication failed that the authentication server is sent, bullet Out for prompting the prompt information of the execution permission authentication failed of the user instruction i.
9. a kind of fingerprint verification system characterized by comprising
User terminal, the user instruction i for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through In the case where, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1 Integer;The remote fingerprint verifying for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint to authentication server transmission is asked It asks, there is corresponding close between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i System;In the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful Whether the Permission Levels for judging the user instruction have been more than given threshold, have been more than to set in the Permission Levels of the user instruction In the case where determining threshold value, determine whether the user terminal and a wearable device occur same action event in preset duration, And in the case where in preset duration same action event occurs for the user terminal and the wearable device, the use is executed Family instructs i;
The authentication server, for receiving the remote fingerprint checking request, by the fingerprint sequence j and the y mark prestored Quasi- fingerprint sequence is matched, one of standard fingerprint in the fingerprint sequence j and the y standard fingerprint sequence prestored In the successful situation of sequences match, Xiang Suoshu user terminal sends the remote fingerprint verifying that instruction remote fingerprint is proved to be successful and rings It answers;Wherein it is determined that it includes: detection that whether the user terminal and a wearable device occur same action event in preset duration Whether user terminal, which occurs first, is got rid of action event, if the user terminal, which occurs first, gets rid of action event, detects the use Whether terminal specified wearable device in family, which occurs second, is got rid of action event, if wearable device, which occurs second, gets rid of action event, is judged Described first get rid of action event and second whipping as event include whether get rid of direction of action identical, if getting rid of direction of action It is identical, judge described first get rid of action event and the second whipping as the whipping that event includes make initial time whether be respectively positioned on it is default In duration, judge that described first gets rid of action event and second whipping and make the whether equal position of duration as the whipping that event includes In in the preset duration, if described first gets rid of action event and when second whipping is originated as the whipping that event includes Between be respectively positioned in preset duration, and described first gets rid of action event and second whipping continues as the whipping that event includes Duration is respectively positioned within the preset duration, judges that first gets rid of the whipping work that action event and second whipping include as event Whether the difference of initial time is less than third predetermined threshold value, if described first gets rid of action event and described second and get rid of action event Including whipping make the difference of initial time and be less than third predetermined threshold value, judge that described first gets rid of action event and get rid of with described second The whipping that action event includes makees the difference of duration whether less than the 4th preset threshold, if described first gets rid of action event Make the difference of duration less than the 4th preset threshold as the whipping that event includes with second whipping, determines that the user is whole Same action event occurs in the preset duration for end and the wearable device.
10. fingerprint verification system according to claim 9, which is characterized in that the user terminal is also used to the x Fingerprint is encrypted to obtain x cryptographic fingerprint, the fingerprint sequence j by the x fingerprint be encrypted with X obtained cryptographic fingerprint is combined to obtain, arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i There is corresponding relationship between the sequencing of corresponding fingerprint typing.
CN201510540526.3A 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system Expired - Fee Related CN105160227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510540526.3A CN105160227B (en) 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510540526.3A CN105160227B (en) 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system

Publications (2)

Publication Number Publication Date
CN105160227A CN105160227A (en) 2015-12-16
CN105160227B true CN105160227B (en) 2019-03-15

Family

ID=54801083

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510540526.3A Expired - Fee Related CN105160227B (en) 2015-08-28 2015-08-28 Remote fingerprint verification method and user terminal and fingerprint verification system

Country Status (1)

Country Link
CN (1) CN105160227B (en)

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472348A (en) * 2015-12-30 2016-04-06 广州励丰文化科技股份有限公司 Method and system for monitoring prison based on fingerprint and touch pressure control
CN105530483A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for controlling monitoring under multi-camera scene with fingerprint and touch surface as reference
CN106937082A (en) * 2015-12-30 2017-07-07 广州励丰文化科技股份有限公司 With reference to the method and system of touch-control area control monitoring under multi-cam scene
CN105681742A (en) * 2015-12-30 2016-06-15 广州励丰文化科技股份有限公司 Method and system for performing intelligent monitoring according to fingerprints and duration in multi-camera scene
CN105530487A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for carrying out intelligent monitoring under multi-camera scene according to pressure change and fingerprint
CN105681740A (en) * 2015-12-30 2016-06-15 广州励丰文化科技股份有限公司 Method and system for monitoring detention room based on touch duration control
CN105530482A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for controlling monitoring under multi-camera scene with pressure change and fingerprint as reference
CN105554467A (en) * 2015-12-30 2016-05-04 广州励丰文化科技股份有限公司 Intelligent monitoring method and system according to touch duration in multi-camera scene
CN105491342A (en) * 2015-12-30 2016-04-13 广州励丰文化科技股份有限公司 Intelligent monitoring method and system based on fingerprint and pressure under multi-camera condition
CN105516678A (en) * 2015-12-30 2016-04-20 广州励丰文化科技股份有限公司 Method and system for intelligent monitoring according to contact surface and fingerprints in multi-camera scene
CN105530489A (en) * 2015-12-30 2016-04-27 广州励丰文化科技股份有限公司 Method and system for intelligently monitoring according to touch pressure in multi-camera scene
CN107133550B (en) * 2016-02-29 2019-12-03 北京小米移动软件有限公司 Fingerprint authentication method and device
CN106055949A (en) * 2016-05-26 2016-10-26 宇龙计算机通信科技(深圳)有限公司 System access and authorization method and device
CN106786903A (en) * 2016-12-26 2017-05-31 广东欧珀移动通信有限公司 Information Authentication method, device, wireless charging device and mobile terminal
CN109214232A (en) * 2017-06-29 2019-01-15 中国电信股份有限公司 Utilize the method and terminal of fingerprint sequence triggering application
CN107679385A (en) * 2017-10-20 2018-02-09 珠海市魅族科技有限公司 A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing
CN109543383B (en) * 2018-11-23 2022-02-11 Oppo广东移动通信有限公司 Information sharing method and related product

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523556A (en) * 2011-12-15 2012-06-27 百度在线网络技术(北京)有限公司 Matching method and system of mobile terminal as well as mobile terminal and server
CN104541282A (en) * 2014-05-14 2015-04-22 华为技术有限公司 Unlocking method, apparatus and device
CN104574073A (en) * 2013-10-18 2015-04-29 阿里巴巴集团控股有限公司 Matching method and system for electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101549558B1 (en) * 2009-03-18 2015-09-03 엘지전자 주식회사 Mobile terminal and control method thereof
CN103902861A (en) * 2012-12-28 2014-07-02 联想(北京)有限公司 Status switching method and electronic device
US9189612B2 (en) * 2013-05-13 2015-11-17 Ira Konvalinka Biometric verification with improved privacy and network performance in client-server networks
CN104751038A (en) * 2013-12-25 2015-07-01 腾讯科技(深圳)有限公司 Identity authentication method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102523556A (en) * 2011-12-15 2012-06-27 百度在线网络技术(北京)有限公司 Matching method and system of mobile terminal as well as mobile terminal and server
CN104574073A (en) * 2013-10-18 2015-04-29 阿里巴巴集团控股有限公司 Matching method and system for electronic equipment
CN104541282A (en) * 2014-05-14 2015-04-22 华为技术有限公司 Unlocking method, apparatus and device

Also Published As

Publication number Publication date
CN105160227A (en) 2015-12-16

Similar Documents

Publication Publication Date Title
CN105160227B (en) Remote fingerprint verification method and user terminal and fingerprint verification system
US11272362B2 (en) System and method for implicit authentication
Khamis et al. GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication
US9788203B2 (en) System and method for implicit authentication
WO2017032008A1 (en) Method for starting application, and mobile terminal
US8752146B1 (en) Providing authentication codes which include token codes and biometric factors
CN105117663B (en) The encrypted object display methods and device of a kind of application
Li et al. T2pair: Secure and usable pairing for heterogeneous iot devices
US9660995B2 (en) Methods, systems, and computer readable media for combating device theft with user notarization
US20050010768A1 (en) Information hiding through time synchronization
CN106648583B (en) Information processing method and terminal
US10789372B2 (en) Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
EP2182457A1 (en) Dynamic PIN verification for insecure environment
US20170169213A1 (en) Electronic device and method for running applications in different security environments
Mayrhofer et al. Adversary models for mobile device authentication
CN108964920A (en) Authentication method, user terminal and non-face-to-face authentication service server
Guerar et al. A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices
CN110765470A (en) Method and device for realizing safety keyboard, computer equipment and storage medium
CN105141609B (en) Fingerprint authentication method and relevant apparatus and fingerprint verification system
CN105471884B (en) A kind of authentication method, server
CN109086624A (en) login method and device
CN103020509B (en) A kind of terminal device encryption and decryption method, device and terminal device
CN109104759B (en) Interaction method of electronic equipment, electronic equipment and computer readable medium
CN105915696B (en) A kind of communication connection method for building up and terminal
CN105045513B (en) Touch operation method and handheld device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190315

CF01 Termination of patent right due to non-payment of annual fee