CN105160227B - Remote fingerprint verification method and user terminal and fingerprint verification system - Google Patents
Remote fingerprint verification method and user terminal and fingerprint verification system Download PDFInfo
- Publication number
- CN105160227B CN105160227B CN201510540526.3A CN201510540526A CN105160227B CN 105160227 B CN105160227 B CN 105160227B CN 201510540526 A CN201510540526 A CN 201510540526A CN 105160227 B CN105160227 B CN 105160227B
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- whipping
- user terminal
- event
- action event
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses remote fingerprint verification methods and user terminal and fingerprint verification system.A kind of remote fingerprint verification method includes: user terminal in the case where receiving the user instruction i that user terminal needs fingerprint authentication could execute after, acquires the x fingerprint that user passes through x touch input institute typing within the set duration;The remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint is sent to authentication server;The user instruction i is executed in the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful.Technical solution provided in an embodiment of the present invention is conducive to the application scenarios of extending user fingerprint, and then brings convenience to the use of user.
Description
Technical field
The present invention relates to electronic technology fields, have specifically related generally to remote fingerprint verification method and user terminal and fingerprint
Verifying system.
Background technique
With the high speed development of internet and communications industry, multimedia service and various virtual technologies start sizable application,
The identification and identification of user identity are particularly important.The identifying schemes of currently used user identity have character string password mouth
It enables, digital certificate of file, mobile digital certificate (being commonly called as excellent Key), biometric identification etc..
The method for monitoring biometric (bioyetrics) is of great significance in protection information or determining individual identification.
Biometric system uses the distinguishing characteristics of face, fingerprint, gesture, blood vessel, iris, signature, retina and vocal print of individual etc..Its
Middle finger print information is convenient due to reading, and is continuously increased using the method protection personal information of fingerprint recognition and secret product.
Wherein, the existing application scenarios for user fingerprints are substantially locally applied field relevant to identification
Scape, such as standard fingerprint template is stored in mobile phone local, according to the matching feelings of the fingerprint of mobile phone typing and standard fingerprint template
Condition carries out authentication, and this mode has stronger scene restriction, and (such as mobile phone locally has to standard is stored in advance and refer to
Line template), influence the application range that identification is carried out using fingerprint.
Summary of the invention
The embodiment of the present invention provides remote fingerprint verification method and relevant apparatus and fingerprint verification system, is referred to extending user
The application scenarios of line, and then brought convenience to the use of user.
First aspect of the embodiment of the present invention provides a kind of remote fingerprint verification method, comprising:
The user instruction i that user terminal could execute after having received the user terminal and fingerprint authentication is needed to pass through
In the case where, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1
Integer;
The remote fingerprint verifying for carrying the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission is asked
It asks, there is corresponding close between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i
System;
In the remote fingerprint auth response that the instruction remote fingerprint for receiving the authentication server transmission is proved to be successful
In the case of execute the user instruction i, wherein the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by described
Authentication server is successful by wherein 1 standard fingerprint sequences match in fingerprint sequence j and the y standard fingerprint sequence prestored
In the case where send.
With reference to first aspect, in the first possible embodiment of first aspect,
The method also includes: the user terminal is encrypted the x fingerprint to obtain x encryption and refer to
Line.Wherein, the fingerprint sequence j is combined by the x fingerprint is encrypted with x obtained cryptographic fingerprint
It arrives.The x cryptographic fingerprint is between arrangement sequencing and the sequencing of corresponding fingerprint typing in the fingerprint sequence i
With corresponding relationship.
With reference to first aspect, in second of possible embodiment of first aspect,
Arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing
Sequence is identical or opposite.
Second of possible embodiment of the possible embodiment of with reference to first aspect the first or first aspect,
It is described the x fingerprint to be encrypted to obtain x encryption and refer in the third possible embodiment of first aspect
Line includes: to be encrypted the x fingerprint to obtain x cryptographic fingerprint using mutually different Encryption Algorithm.
Second of possible embodiment of the possible embodiment of with reference to first aspect the first or first aspect,
In 4th kind of possible embodiment of first aspect, used Encryption Algorithm portion is encrypted to the x fingerprint
Split-phase with or all it is identical.
With reference to first aspect or second of the first possible embodiment of first aspect or first aspect possible
The possible embodiment of the third of embodiment or first aspect, in the 4th kind of possible embodiment of first aspect,
The method also includes: receiving the long-range of the instruction remote fingerprint authentication failed of the authentication server transmission
In the case that fingerprint authentication responds, the prompt information for prompting the execution permission authentication failed of the user instruction i is popped up.
With reference to first aspect or second of the first possible embodiment of first aspect or first aspect possible
4th kind of possible embodiment of embodiment or first aspect, in the 5th kind of possible embodiment of first aspect,
The remote fingerprint checking request carries the terminal iidentification of user terminal, between terminal iidentification and decipherment algorithm there is binding to close
System.
Second aspect of the embodiment of the present invention provides a kind of user terminal, comprising:
Acquisition unit, the user instruction for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through
In the case where i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1
Integer;
Transmission unit, for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint to authentication server transmission
Remote fingerprint checking request, the arrangement sequencing of the fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing
There is corresponding relationship between sequence;
Control unit is executed, it is remote for being proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
Journey fingerprint authentication executes the user instruction i in the case where responding, the remote fingerprint that the instruction remote fingerprint is proved to be successful is tested
Card response is referred to by the authentication server by fingerprint sequence j and one of standard in y standard fingerprint sequence prestoring
It is sent in the successful situation of line sequences match.
In conjunction with second aspect, in the first possible embodiment of second aspect,
The user terminal further include: encryption unit obtains x encryption for the x fingerprint to be encrypted
Fingerprint;Wherein, the fingerprint sequence j is combined by the x fingerprint is encrypted with x obtained cryptographic fingerprint
Obtain, the x cryptographic fingerprint in the fingerprint sequence i arrangement sequencing and corresponding fingerprint typing sequencing it
Between have corresponding relationship.
In conjunction with the first possible embodiment of second aspect, in second of possible embodiment of second aspect
In,
The encryption unit be specifically used for using mutually different Encryption Algorithm to the x fingerprint be encrypted with
Obtain x cryptographic fingerprint.
In conjunction with the first possible embodiment of second aspect, second aspect the third possible embodiment it
In, it is identical or all identical that used Encryption Algorithm part is encrypted to the x fingerprint.
In conjunction with the first possible embodiment of second aspect or second of possible embodiment of second aspect or
The third possible embodiment of second aspect, among the 4th kind of possible embodiment of second aspect, the x add
Arrangement sequencing and the sequencing of corresponding fingerprint typing of the close fingerprint in the fingerprint sequence i are identical or opposite.
Second in conjunction with the possible embodiment of the first of second aspect or second aspect or second aspect is possible
4th kind of possible embodiment of the possible embodiment of the third of embodiment or second aspect or second aspect,
In 5th kind of possible embodiment of two aspects,
The control unit that executes is also used to: being lost receiving the instruction remote fingerprint verifying that the authentication server is sent
In the case where the remote fingerprint auth response lost, mentioning for the execution permission authentication failed for prompting the user instruction i is popped up
Show information.
Second in conjunction with the possible embodiment of the first of second aspect or second aspect or second aspect is possible
5th kind of possible embodiment of the 4th kind of possible embodiment or second aspect of embodiment or second aspect,
In 6th kind of possible embodiment of two aspects, the remote fingerprint checking request carries the terminal iidentification of user terminal, eventually
There is binding relationship between end mark and decipherment algorithm.
The third aspect of the embodiment of the present invention provides a kind of fingerprint verification system, comprising:
User terminal, the user instruction for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through
In the case where i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1
Integer;The remote fingerprint verifying for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint to authentication server transmission is asked
It asks, there is corresponding close between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i
System;In the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful
Execute the user instruction i;
The authentication server, for receiving the remote fingerprint checking request, by the fingerprint sequence j and the y prestored
A standard fingerprint sequence is matched, one of standard in the fingerprint sequence j and the y standard fingerprint sequence prestored
In the case where fingerprint sequence successful match, Xiang Suoshu user terminal sends the remote fingerprint verifying that instruction remote fingerprint is proved to be successful
Response.
In conjunction with the third aspect, in the first possible embodiment of the third aspect, user terminal is also used to the x
A fingerprint is encrypted to obtain x cryptographic fingerprint, and the fingerprint sequence j is by being encrypted the x fingerprint
It is combined to obtain with x obtained cryptographic fingerprint, arrangement of the x cryptographic fingerprint in the fingerprint sequence i is successively suitable
There is corresponding relationship between sequence and the sequencing of corresponding fingerprint typing.
In conjunction with the first possible embodiment of the third aspect, in second of possible embodiment of the third aspect
In, it is identical or all identical or different that used Encryption Algorithm part is encrypted to the x fingerprint.
In conjunction with the first possible embodiment of the third aspect or second of possible embodiment of the third aspect,
In the third possible embodiment of the third aspect, arrangement of the x cryptographic fingerprint in the fingerprint sequence i is successively suitable
Sequence and the sequencing of corresponding fingerprint typing are identical or opposite.
Second in conjunction with the possible embodiment of the first of the third aspect or the third aspect or the third aspect is possible
The possible embodiment of the third of embodiment or the third aspect, in the 4th kind of possible embodiment of the third aspect,
The user terminal is also used to, and is receiving the instruction remote fingerprint authentication failed of the authentication server transmission
In the case where remote fingerprint auth response, the prompt letter for prompting the execution permission authentication failed of the user instruction i is popped up
Breath.
Second in conjunction with the possible embodiment of the first of the third aspect or the third aspect or the third aspect is possible
4th kind of possible embodiment of embodiment or the third aspect, in the 5th kind of possible embodiment of the third aspect,
The remote fingerprint checking request carries the terminal iidentification of user terminal, between terminal iidentification and decipherment algorithm there is binding to close
System.
As can be seen that user terminal needs to refer to receiving the user terminal in the technical solution of the embodiment of the present invention
In the case where the user instruction i that line could execute after being verified, acquisition user is grasped within setting duration by x touch
Make x fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server
Checking request;The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that authentication server is sent is proved to be successful
It is lower to execute the user instruction i.Since the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by the verifying
Server is successful by fingerprint sequence j and one of standard fingerprint sequences match in y standard fingerprint sequence prestoring
In the case of send, it is seen that above-mentioned technical proposal be equivalent to provides it is a kind of long-range carry out finger print authentication mechanism, user terminal can be with
Remotely to complete fingerprint authentication by authentication server and then determine whether to execute user instruction, the local of such user terminal is
Make not stored standard fingerprint sequence that can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the application of extending user fingerprint
Scene, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered
It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible
It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all
Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's
Using bringing more convenience.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, below by embodiment it is required use it is attached
Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this field
For those of ordinary skill, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1-a is a kind of schematic diagram of the network architecture provided in an embodiment of the present invention;
Fig. 1-b is a kind of flow diagram of remote fingerprint verification method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram for another remote fingerprint verification method that the embodiment of the present invention provides;
Fig. 3 is the flow diagram for another remote fingerprint verification method that the embodiment of the present invention provides;
Fig. 4 is the flow diagram for another remote fingerprint verification method that the embodiment of the present invention provides;
Fig. 5 is a kind of schematic diagram of user terminal provided in an embodiment of the present invention;
Fig. 6 is the schematic diagram for another user terminal that the embodiment of the present invention supplies;
Fig. 7 is a kind of schematic diagram of fingerprint verification system provided in an embodiment of the present invention.
Specific embodiment
The embodiment of the present invention provides remote fingerprint verification method and relevant apparatus and fingerprint verification system, is referred to extending user
The application scenarios of line, and then brought convenience to the use of user.
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical solution in the embodiment of the present invention are explicitly described, it is clear that described embodiment is only the present invention
The embodiment of a part, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not having
Every other embodiment obtained under the premise of creative work is made, should fall within the scope of the present invention.
The term " first " that occurs in description of the invention, claims and attached drawing, " second " and " third " etc. are to use
In the different object of difference, and it is not intended to describe specific sequence.In addition, term " includes " and " having " and they are any
Deformation, it is intended that cover and non-exclusive include.Such as contain the process, method, system, product of a series of steps or units
Or equipment is not limited to listed step or unit, but optionally further comprising the step of not listing or unit, or can
Selection of land further includes the other step or units intrinsic for these process, methods, product or equipment.
Referring to Fig. 1-a, Fig. 1-a is a kind of schematic diagram of the network architecture provided in an embodiment of the present invention, network shown in Fig. 1-a
In framework, several user terminals can be connect by network with authentication server.The technical solution of the embodiment of the present invention can be based on
The network architecture shown in 1-a is embodied.
One embodiment of remote fingerprint verification method of the invention.A kind of remote fingerprint verification method, may include: use
Family terminal have received the user terminal need fingerprint authentication by after could execute user instruction i in the case where,
The x fingerprint that user passes through the typing of x touch operation institute within setting duration is acquired, the x is just whole more than or equal to 2
Number;The remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint, institute are sent to authentication server
Stating has corresponding relationship between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in fingerprint sequence i;?
It is executed in the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful
The user instruction i, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful are being incited somebody to action by the authentication server
It is sent in fingerprint sequence j and wherein 1 successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Fig. 1-b is please referred to, Fig. 1-b is a kind of process for remote fingerprint verification method that one embodiment of the present of invention provides
Schematic diagram.Wherein, as shown in Fig. 1-b, a kind of remote fingerprint verification method that one embodiment of the present of invention provides may include
The following contents:
101, user terminal needs the fingerprint authentication user that could execute after to refer to receiving the user terminal
In the case where enabling i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1
Integer.
Wherein, user terminal may be, for example, mobile phone, tablet computer, laptop, palm PC, mobile internet device
Or other users terminal.
Wherein, the x is the integer more than or equal to 2.
For example, x for example can be equal to 2,3,5,7,8,10,21,29,36,50,100 or other values.
Wherein, the value of above-mentioned setting duration is flexibly set according to specific needs, such as setting duration
Value range can be between 3 seconds~30 seconds or other ranges.Specifically for example, setting duration can be equal to 10 seconds, 20 seconds, 30
Second, 3 seconds, 7 seconds, 100 seconds or other durations.
It can be finger finger and/or toe finger that the finger of touch input is executed in the embodiment of the present invention.That is, this
It invents and user is not only supported to carry out touch input using finger in each embodiment, also support user touch using toe defeated
Enter, this individuals with disabilities for using finger manipulation inconvenience, it will become it is very convenient effectively.
102, user terminal carries the remote of the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission
The request of journey fingerprint authentication.
Wherein, between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i
With corresponding relationship.Such as arrangement sequencing and the x of the cryptographic fingerprint of x fingerprint or x fingerprint in fingerprint sequence j
The typing sequencing of a fingerprint is identical, that is to say, that the row of the fingerprint of more first typing or its cryptographic fingerprint in fingerprint sequence i
More forward, the fingerprint of rear typing or its cryptographic fingerprint the putting in order more rearward in fingerprint sequence i of column sequence.In another example x
The typing of arrangement sequencing and the x fingerprint of the cryptographic fingerprint of a fingerprint or x fingerprint in fingerprint sequence j is successively suitable
Sequence is opposite, that is to say, that the fingerprint of more first typing or its cryptographic fingerprint putting in order more rearward in fingerprint sequence i, more after
The fingerprint of typing or its cryptographic fingerprint putting in order in fingerprint sequence i are more forward.Certainly, the finger in the fingerprint sequence i
The corresponding relationship having between the arrangement sequencing of line and the sequencing of corresponding fingerprint typing is also not necessarily limited to the example above.
103, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
The user instruction i is executed in the case where line auth response.
Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful will referred to by the authentication server
It is sent in line sequence j and wherein 1 successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Wherein, the y is the integer more than or equal to 1.
For example, y for example can be equal to 1,2,3,5,7,8,10,21,29,36,50,100 or other values.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent
In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.Its
In, the remote fingerprint auth response of the instruction remote fingerprint authentication failed can be by the authentication server by fingerprint sequence j
It is sent in the case where any 1 standard fingerprint sequences match failure in y standard fingerprint sequence prestoring.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment
In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration
X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested
Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful
Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying
Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring
It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed
It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal
Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint
Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered
It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible
It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all
Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's
Using bringing more convenience.
As an example it is assumed that x=3, it is assumed that x fingerprint is led to by 3 different fingers among 10 fingers of user
The typing of execution touch input institute is crossed, in that way it is possible to which the quantity of the fingerprint sequence formed may reach
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu
The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity,
It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
Wherein, application program for example may include short message application, photo browse application, mail applications, text editing application, i.e.
When communication applications (such as QQ, wechat, footpath between fields footpath between fields etc.) video playing application and/or other application.
Optionally, in some possible embodiments of the invention, it may further be user instruction and certain power be set
Limit grade, wherein Permission Levels are higher, and expression jurisdictions mandate is higher.For example, Permission Levels point can be A grades, B grades and C grades,
In, A grades are higher than B grades, and B grades are higher than C grades.The Permission Levels of user instruction i may be A grades, B grades or C grades.
It optionally, has been more than to set in the Permission Levels of the user instruction i in some possible embodiments of the present invention
In the case where determining threshold value, before the execution user instruction i further include: the vocal print w for receiving user's typing, by the vocal print
W is matched with the vocal print in standard vocal print library.Executing the user instruction i includes: in the vocal print w and standard vocal print library
The successful situation of certain voice print matching under, execute the user instruction i.
Such as it can be true in the case that the similarity of the vocal print w and certain vocal print in standard vocal print library are greater than second threshold
Certain voice print matching success in the fixed vocal print w and standard vocal print library.
For example, second threshold for example can be 50%, 80%, 85%, 88%, 91%, 95% or other values.
It is understood that introducing Permission Levels characteristic to user instruction, jointly controlled using vocal print and fingerprint sequence
The execution of the user instruction of high Permission Levels is conducive to the safely controllable property for further increasing user instruction execution.
It optionally, has been more than to set in the Permission Levels of the user instruction i in some possible embodiments of the present invention
In the case where determining threshold value, before the execution user instruction i further include: the iris Q for receiving user's typing, by the iris
Q is matched with the iris in standard iris library.Executing the user instruction i includes: in the iris Q and standard iris library
In the case where certain iris successful match, the user instruction i is executed.
Such as it can be true in the case that the similarity of the iris Q and certain iris in standard iris library are greater than third threshold value
Certain iris successful match in the fixed iris Q and standard iris library.
For example, third threshold value for example can be 80%, 82%, 85%, 88%, 91%, 95% or other values.
It is understood that introducing Permission Levels characteristic to user instruction, jointly controlled using iris and fingerprint sequence
The execution of the user instruction of high Permission Levels is conducive to the safely controllable property for further increasing user instruction execution.
Optionally, in some possible embodiments of the present invention, whether the method may also include that detection user terminal
Occur first and get rid of action event, if the user terminal, which occurs first, gets rid of action event, detects what the user terminal was specified
Whether wearable device, which occurs second, is got rid of action event, if wearable device, which occurs second, gets rid of action event, judges first whipping
Make event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action, judge institute
It states first and gets rid of action event and the second whipping and make whether initial time is respectively positioned in preset duration as the whipping that event includes, judge
Described first, which gets rid of action event and second whipping, makees whether duration is respectively positioned on described preset as the whipping that event includes
In duration, if described first get rid of the whipping that action event and second whipping include as event be respectively positioned on as initial time it is pre-
If in duration, and described first gets rid of action event and second whipping is respectively positioned on as the whipping that event includes as duration
Within the preset duration, judge that first gets rid of action event and second whipping and make initial time as the whipping that event includes
Whether difference is less than third predetermined threshold value, if described first gets rid of the whipping that action event includes as event with second whipping
The difference for making initial time is less than third predetermined threshold value, judge that described first gets rid of action event and second whipping and make event package
The whipping included makees the difference of duration whether less than the 4th preset threshold, if described first gets rid of action event and described second
Whipping makees the difference of duration less than the 4th preset threshold as the whipping that event includes, and determines the user terminal and described wears
It wears equipment and same action event occurs in the preset duration.
Optionally, in some possible embodiments of the invention, the initial time of above-mentioned setting duration can be to determine
At the time of in the preset duration same action event occurs for the user terminal and the wearable device.Alternatively, to testing
The remote fingerprint checking request that card server transmission carries the fingerprint sequence j obtained based on the x fingerprint comprises determining that institute
User terminal is stated and in the case that in the preset duration same action event occurs for the wearable device, to the service for checking credentials
Device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
Optionally, in some possible embodiments of the present invention, the fingerprint sequence j is by adding the x fingerprint
Close processing is combined to obtain with x obtained cryptographic fingerprint.Wherein, the x cryptographic fingerprint is in the fingerprint sequence i
Arranging has corresponding relationship between sequencing and the sequencing of corresponding fingerprint typing.
Optionally, in some possible embodiments of the present invention is encrypted to the x fingerprint used add
Close algorithm part is identical or all identical or different.
Optionally, in some possible embodiments of the present invention, remote fingerprint checking request carries the terminal of user terminal
It identifies (terminal iidentification of user terminal may be, for example, device identification or cell-phone number etc.), has between terminal iidentification and decipherment algorithm
Binding relationship.Therefore, authentication server can be based on the binding relationship between terminal iidentification and decipherment algorithm, determining and remote fingerprint
The decipherment algorithm of the terminal iidentification binding for the user terminal that checking request carries, based on the decipherment algorithm in fingerprint sequence j
X cryptographic fingerprint be decrypted to obtain decryption fingerprint sequence j, fingerprint sequence j and y standard fingerprint sequence prestoring will be decrypted
Wherein 1 standard fingerprint sequences match in column.Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful
By wherein 1 standard fingerprint sequence of the authentication server in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore
It is sent in the case where column successful match.The remote fingerprint auth response of the instruction remote fingerprint authentication failed can be by the verifying
Any 1 standard fingerprint sequences match of the server in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore fails
In the case where send.
For the technical solution convenient for better understanding and implementing the embodiment of the present invention, below with reference to some specific applied fields
Scape is illustrated.
Referring to Fig. 2, Fig. 2 be another embodiment of the present invention provides another remote fingerprint verification method process
Schematic diagram.Wherein, as shown in Fig. 2, another embodiment of the present invention provides another remote fingerprint verification method can wrap
Include the following contents:
201, user terminal receives user instructions i.
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu
The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity,
It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
202, the user terminal is if it is determined that the user that the user terminal needs fingerprint authentication that could execute after
I is instructed, the user terminal acquisition user passes through x fingerprint of x touch operation institute typing, the x within setting duration
For the integer greater than 1.
Wherein, user terminal may be, for example, mobile phone, tablet computer, laptop, palm PC, mobile internet device
Or other users terminal.
Wherein, the x is the integer more than or equal to 2.
For example, x for example can be equal to 2,3,5,7,8,10,21,29,36,50,100 or other values.
203, user terminal carries the remote of the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission
The request of journey fingerprint authentication.
Wherein, the fingerprint sequence j to the x fingerprint by being combined to obtain.
Wherein, between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i
With corresponding relationship.
Optionally, in some possible embodiments of the present invention, the method may also include that user terminal detects user
Whether terminal, which occurs first, is got rid of action event, if the user terminal, which occurs first, gets rid of action event, it is whole to detect the user
Whether the specified wearable device in end, which occurs second, is got rid of action event, if wearable device, which occurs second, gets rid of action event, described in judgement
First get rid of action event and second whipping as event include whether get rid of direction of action identical, if getting rid of direction of action phase
Together, judge described first when getting rid of action event and the second whipping and making initial time as the whipping that event includes and whether be respectively positioned on default
In length, judge that described first gets rid of action event and second whipping and make whether duration is respectively positioned on as the whipping that event includes
In the preset duration, if described first gets rid of action event and second whipping and makees initial time as the whipping that event includes
It is respectively positioned in preset duration, and described first gets rid of action event and when second whipping continues as the whipping that event includes
Length is respectively positioned within the preset duration, judge that first gets rid of action event and second whipping and rise as the whipping that event includes
Whether the difference of time of beginning is less than third predetermined threshold value, if described first gets rid of action event and second whipping makees event package
The difference that the whipping included makees initial time is less than third predetermined threshold value, judges that described first gets rid of action event and second whipping
Whether the whipping for including as event makees the difference of duration less than the 4th preset threshold, if described first get rid of action event with
The difference that second whipping makees duration as the whipping that event includes determines the user terminal less than the 4th preset threshold
Same action event occurs in the preset duration with the wearable device.
Optionally, in some possible embodiments of the present invention, user terminal is carried to authentication server transmission and is based on
The remote fingerprint checking request for the fingerprint sequence j that the x fingerprint obtains include: user terminal determine the user terminal and
In the case that in the preset duration same action event occurs for the wearable device, carried to authentication server transmission
Remote fingerprint checking request based on the fingerprint sequence j that the x fingerprint obtains.
Optionally, first duration can be 10 seconds, 20 seconds, 30 seconds, 50 seconds, 70 seconds, 100 seconds or other time.
Optionally, third predetermined threshold value can be 3 seconds, 5 seconds, 10 seconds, 20 seconds, 50 seconds, 80 seconds or other time.
Optionally, the 4th preset threshold can be 13 seconds, 15 seconds, 22 seconds, 20 seconds, 50 seconds, 81 seconds or other time.
204, authentication server receives remote fingerprint checking request, by fingerprint sequence j and the y standard fingerprint sequence prestored
In standard fingerprint sequence matched.
205, the authentication server is by fingerprint sequence j and wherein 1 standard in y standard fingerprint sequence prestoring
In the case where fingerprint sequence successful match, the remote fingerprint verifying that instruction remote fingerprint is proved to be successful is sent to user terminal and is rung
It answers.
Wherein, the y is the integer more than or equal to 1.
For example, y for example can be equal to 1,2,3,5,7,8,10,21,29,36,50,100 or other values.
In addition, the authentication server can also be by fingerprint sequence j and any 1 in y standard fingerprint sequence prestoring
A standard fingerprint sequence sends the remote fingerprint of instruction remote fingerprint authentication failed to user terminal in the case that it fails to match
Auth response.
206, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
The user instruction i is executed in the case where line auth response.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent
In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment
In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration
X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested
Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful
Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying
Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring
It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed
It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal
Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint
Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered
It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible
It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all
Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's
Using bringing more convenience.
Referring to Fig. 3, Fig. 3 be another embodiment of the present invention provides another remote fingerprint verification method process
Schematic diagram.Wherein, as shown in figure 3, another embodiment of the present invention provides another remote fingerprint verification method can wrap
Include the following contents:
301, user terminal receives user instructions i.
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu
The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity,
It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
302, the user terminal is if it is determined that the user that the user terminal needs fingerprint authentication that could execute after
I is instructed, the user terminal acquisition user passes through x fingerprint of x touch operation institute typing, the x within setting duration
For the integer greater than 1.
Wherein, the x is the integer more than or equal to 2.
In addition, the user terminal is if it is determined that the user terminal passes through the user instruction that can be executed without fingerprint authentication
I, then the user terminal also can directly execute user instruction i.Need fingerprint authentication logical with the user terminal in the present embodiment
In case where the user instruction i that could be executed after crossing.
303, the x fingerprint is encrypted to obtain x cryptographic fingerprint in user terminal.
Wherein, it is identical or complete that used Encryption Algorithm part is encrypted to the x fingerprint in user terminal
Portion is identical or different.
304, user terminal sends the remote fingerprint checking request for carrying fingerprint sequence j to authentication server.
Wherein, the x cryptographic fingerprint that the fingerprint sequence j is obtained by the x fingerprint is encrypted carries out
Combination obtains.Arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing
There is corresponding relationship between sequence.
305, authentication server receives remote fingerprint checking request, and authentication server refers to x encryption in fingerprint sequence j
Line is decrypted to obtain decryption fingerprint sequence j, will decrypt the standard in fingerprint sequence j and the y standard fingerprint sequence prestored
Fingerprint sequence matching.
306, the authentication server will decrypt fingerprint sequence j and wherein 1 in y standard fingerprint sequence prestoring
In the successful situation of standard fingerprint sequences match, the remote fingerprint verifying that instruction remote fingerprint is proved to be successful is sent to user terminal
Response.
Wherein, the y is the integer more than or equal to 1.
In addition, the authentication server can also appoint in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore
It anticipates in the case where 1 standard fingerprint sequences match failure, the long-range finger of instruction remote fingerprint authentication failed is sent to user terminal
Line auth response.
307, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
The user instruction i is executed in the case where line auth response.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent
In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment
In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration
X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested
Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful
Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying
Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring
It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed
It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal
Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint
Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered
It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible
It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all
Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's
Using bringing more convenience.
Also, it is introduced into the mechanism encrypted to the fingerprint in fingerprint sequence, is conducive to improve user terminal and verifying clothes
Fingerprint sequence interaction safety between business device.
Referring to Fig. 4, Fig. 4 be another embodiment of the present invention provides another remote fingerprint verification method process
Schematic diagram.Wherein, as shown in figure 4, another embodiment of the present invention provides another remote fingerprint verification method can wrap
Include the following contents:
401, user terminal receives user instructions i.
It is appreciated that user instruction i can be the user instruction for starting application program, it is also possible to be turned over for menu
The user instruction of page, it is also possible to the user instruction of amplification of volume, it is also possible to for adjusting the user instruction of screen intensity,
It may be the user instruction for zooming in or out picture, it is also possible to other user instructions.
402, the user terminal is if it is determined that the user that the user terminal needs fingerprint authentication that could execute after
I is instructed, the user terminal acquisition user passes through x fingerprint of x touch operation institute typing within setting duration.
Wherein, the x is the integer more than or equal to 2.
403, the x fingerprint is encrypted to obtain x cryptographic fingerprint in user terminal.
Wherein, it is identical or complete that used Encryption Algorithm part is encrypted to the x fingerprint in user terminal
Portion is identical or different.
404, user terminal sends the remote fingerprint checking request for carrying fingerprint sequence j to authentication server.
Wherein, the x cryptographic fingerprint that the fingerprint sequence j is obtained by the x fingerprint is encrypted carries out
Combination obtains.Arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing
There is corresponding relationship between sequence.
405, authentication server receives remote fingerprint checking request, and authentication server refers to x encryption in fingerprint sequence j
Line is decrypted to obtain decryption fingerprint sequence j, will decrypt the standard in fingerprint sequence j and the y standard fingerprint sequence prestored
Fingerprint sequence matching.
406, the authentication server will decrypt fingerprint sequence j and wherein 1 in y standard fingerprint sequence prestoring
In the successful situation of standard fingerprint sequences match, the remote fingerprint verifying that instruction remote fingerprint is proved to be successful is sent to user terminal
Response.
Wherein, the y is the integer more than or equal to 1.
In addition, the authentication server can also appoint in the y standard fingerprint sequence that will be decrypted fingerprint sequence j and prestore
It anticipates in the case where 1 standard fingerprint sequences match failure, the long-range finger of instruction remote fingerprint authentication failed is sent to user terminal
Line auth response.
407, the long-range finger that user terminal is proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
In the case where line auth response, judge whether the Permission Levels of the user instruction i have been more than given threshold.
If so, thening follow the steps 408.If it is not, thening follow the steps 410.
408, user terminal pops up the prompt information for prompting typing vocal print on a display screen, monitors the sound of user's typing
Line.
Wherein, the vocal print of device monitors user's typing such as microphone can be passed through.
If 409, user terminal receives the vocal print w of user's typing, by the vocal print in the vocal print w and standard vocal print library into
Row matching.If certain voice print matching success in the vocal print w and standard vocal print library, executes step 410.
In addition, if any one voice print matching in the vocal print w and standard vocal print library fails, user terminal for example can be
The prompt information for prompting current typing vocal print triggering to execute user instruction failure is popped up on display screen.
410, the user instruction i is executed.
In addition, user terminal is in the long-range finger for receiving the instruction remote fingerprint authentication failed that the authentication server is sent
In the case where line auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i can be popped up.
As can be seen that user terminal needs fingerprint receiving the user terminal among the technical solution of the present embodiment
In the case where the user instruction i that could be executed after being verified, acquisition user passes through x touch operation within setting duration
X fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint to authentication server transmission is tested
Card request;In the case where the remote fingerprint auth response that the instruction remote fingerprint for receiving authentication server transmission is proved to be successful
Execute the user instruction i.Since the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful is taken by the verifying
Business device is by fingerprint sequence j and one of successful feelings of standard fingerprint sequences match in y standard fingerprint sequence prestoring
It is sent under condition, it is seen that above-mentioned technical proposal, which is equivalent to, provides a kind of long-range progress finger print authentication mechanism, and user terminal can be borrowed
It helps authentication server remotely to complete fingerprint authentication and then determines whether to execute user instruction, even if the local of such user terminal
Not stored standard fingerprint sequence can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the applied field of extending user fingerprint
Scape, and then brought convenience to the use of user.
Also, fingerprint sequence j is based on x fingerprint and obtains, and each fingerprint putting in order in fingerprint sequence j is also considered
It is interior, therefore, with the increase of x, it is possible to create fingerprint sequence quantity can gradually become very it is more, this allows for possible
It generally refers to line sequence and can bind the quantity of associated user instruction to become very more, and then many operations may be made all
Execution may be triggered by touch input, be conducive to the manipulation convenience for further enhancing touch control operation in this way, to user's
Using bringing more convenience.
Further, it is introduced into the mechanism encrypted to the fingerprint in fingerprint sequence, be conducive to improve user terminal and is tested
Demonstrate,prove the fingerprint sequence interaction safety between server.
Further, Permission Levels characteristic is introduced to user instruction, jointly controls height using vocal print and fingerprint sequence etc.
The execution of the user instruction of Permission Levels is conducive to the safety controllability for further increasing user instruction execution.
Referring to Fig. 5, the embodiment of the present invention also provides a kind of user terminal 500, it may include:
Acquisition unit 510, the user for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through
In the case where instructing i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is big
In 1 integer.
Transmission unit 520, for carrying the fingerprint sequence j obtained based on the x fingerprint to authentication server transmission
Remote fingerprint checking request, the arrangement sequencing of the fingerprint in the fingerprint sequence i is successive suitable with corresponding fingerprint typing
There is corresponding relationship between sequence.
Control unit 530 is executed, for being proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
Remote fingerprint auth response in the case where execute the user instruction i.
Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful will referred to by the authentication server
It is sent in line sequence j and one of successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Optionally, in some possible embodiments of the invention,
The user terminal further include: encryption unit is added for the x fingerprint to be encrypted with obtaining x
Close fingerprint;Wherein, the fingerprint sequence j carries out group by the x fingerprint is encrypted with x obtained cryptographic fingerprint
Conjunction obtains.The sequencing of arrangement sequencing and corresponding fingerprint typing of the x cryptographic fingerprint in the fingerprint sequence i
Between have corresponding relationship.
Optionally, in some possible embodiments of the invention, the encryption unit encrypts the x fingerprint
Encryption Algorithm part used in handling is identical or all identical or different.
Optionally, in some possible embodiments of the invention, the x cryptographic fingerprint is in the fingerprint sequence i
Arrangement sequencing and the sequencing of corresponding fingerprint typing it is identical or opposite.
Optionally, in some possible embodiments of the invention,
The control unit 530 that executes can also be used in: in the instruction remote fingerprint for receiving the authentication server transmission
In the case where the remote fingerprint auth response of authentication failed, pop up for prompting the execution Authority Verification of the user instruction i to lose
The prompt information lost.
Optionally, in some possible embodiments of the invention, the user terminal 500 can also further comprise:
Whether monitoring unit occurs first for detecting user terminal and gets rid of action event, if the first whipping occurs for the user terminal
Make event, detects the specified wearable device of the user terminal and whether occur second and get rid of action event, if the wearable device is sent out
Raw second gets rid of action event, judges that described first gets rid of action event and second whipping as the direction of action of getting rid of that event includes and be
No identical, if got rid of, direction of action is identical, judges that described first gets rid of action event and second whipping is got rid of as what event included
Whether movement initial time is respectively positioned in preset duration, judges that described first gets rid of action event and second whipping makees event package
The whipping included makees whether duration is respectively positioned in the preset duration, if described first gets rid of action event and described second and get rid of
The whipping that action event includes is respectively positioned in preset duration as initial time, and described first gets rid of action event and described second
Whipping is respectively positioned within the preset duration as the whipping that event includes as duration, judge described first get rid of action event with
Whether second whipping is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time, if described first
It gets rid of action event and second whipping and is less than third predetermined threshold value, judgement as the difference that the whipping that event includes makees initial time
Whether described first gets rid of action event and second whipping makees the difference of duration less than the 4th as the whipping that event includes
Preset threshold, if described first gets rid of action event and second whipping makees the difference of duration as the whipping that event includes
Less than the 4th preset threshold, determine that same movement occurs in the preset duration for the user terminal and the wearable device
Event.
Optionally, among some possible embodiments of the invention, transmission unit 520 is specifically used for described in the determination
In the case that in the preset duration same action event occurs for user terminal and the wearable device, to authentication server
Send the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
It is understood that the function of each functional module of the user terminal 500 of the present embodiment can be according to above method reality
The method specific implementation in example is applied, specific implementation process is referred to the associated description of above method embodiment, herein no longer
It repeats.
As can be seen that user terminal 500 needs to refer to receiving the user terminal among the technical solution of the present embodiment
In the case where the user instruction i that line could execute after being verified, acquisition user is grasped within setting duration by x touch
Make x fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server
Checking request;The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that authentication server is sent is proved to be successful
It is lower to execute the user instruction i.Since the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by the verifying
Server is successful by fingerprint sequence j and one of standard fingerprint sequences match in y standard fingerprint sequence prestoring
In the case of send, it is seen that above-mentioned technical proposal be equivalent to provides it is a kind of long-range carry out finger print authentication mechanism, user terminal can be with
Remotely to complete fingerprint authentication by authentication server and then determine whether to execute user instruction, the local of such user terminal is
Make not stored standard fingerprint sequence that can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the application of extending user fingerprint
Scene, and then brought convenience to the use of user.
Referring to Fig. 6, Fig. 6 is the schematic diagram of user terminal 600 provided in an embodiment of the present invention, and user terminal 600 may include
At least one bus 601, at least one processor 602 being connected with bus 601 and at least one being connected with bus 601 storage
Device 603.
Wherein, processor 602 can call the code stored in memory 603 or instruction to be used for by bus 601
In the case where receiving the user instruction i that could be executed after the user terminal needs fingerprint authentication to pass through, acquisition user is being set
Pass through x fingerprint of x touch operation institute typing within timing is long, the x is the integer more than or equal to 2;It is taken to verifying
Business device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint, the fingerprint sequence i
In fingerprint arrangement sequencing and the sequencing of corresponding fingerprint typing between have corresponding relationship;Receiving described test
The user instruction is executed in the case where the remote fingerprint auth response that the instruction remote fingerprint that card server is sent is proved to be successful
i。
Wherein, the remote fingerprint auth response that the instruction remote fingerprint is proved to be successful will referred to by the authentication server
It is sent in line sequence j and one of successful situation of standard fingerprint sequences match in the y standard fingerprint sequence prestored.
Optionally, in some possible embodiments of the invention, processor 602 is also used to carry out the x fingerprint
Encryption is to obtain x cryptographic fingerprint;Wherein, the fingerprint sequence j is by being encrypted to obtain the x fingerprint
X cryptographic fingerprint be combined to obtain.Arrangement sequencing and phase of the x cryptographic fingerprint in the fingerprint sequence i
Answering has corresponding relationship between the sequencing of fingerprint typing.
Optionally, in some possible embodiments of the invention, processor 602 carries out at encryption the x fingerprint
Encryption Algorithm part used in managing is identical or all identical or different.
Optionally, in some possible embodiments of the invention, processor 602 can also be used in, and receive described test
In the case where the remote fingerprint auth response for demonstrate,proving the instruction remote fingerprint authentication failed that server is sent, pop-up is described for prompting
The prompt information of the execution permission authentication failed of user instruction i.
Optionally, in some possible embodiments of the invention, the x cryptographic fingerprint is in the fingerprint sequence i
Arrangement sequencing and the sequencing of corresponding fingerprint typing it is identical or opposite.
Optionally, in some possible embodiments of the invention, processor 602 is also used to whether detect user terminal
Occur first and get rid of action event, if the user terminal, which occurs first, gets rid of action event, detects what the user terminal was specified
Whether wearable device, which occurs second, is got rid of action event, if the wearable device, which occurs second, gets rid of action event, judges described first
Get rid of action event and second whipping as event include whether get rid of direction of action identical, if it is identical to get rid of direction of action, sentence
Break and described first gets rid of action event and when second whipping makees initial time as the whipping that event includes and whether is respectively positioned on default
In length, judge that described first gets rid of action event and second whipping and make whether duration is respectively positioned on as the whipping that event includes
In the preset duration, if described first gets rid of action event and second whipping and makees initial time as the whipping that event includes
It is respectively positioned in preset duration, and described first gets rid of action event and when second whipping continues as the whipping that event includes
Length is respectively positioned within the preset duration, judges that described first gets rid of the whipping that action event includes as event with second whipping
Whether the difference for making initial time is less than third predetermined threshold value, if described first gets rid of action event and second whipping makees thing
The difference that the whipping that part includes makees initial time is less than third predetermined threshold value, judges that described first gets rid of action event and described second
Whipping makees the difference of duration whether less than the 4th preset threshold, if first whipping makees thing as the whipping that event includes
The difference that part and second whipping make duration as the whipping that event includes determines the user less than the 4th preset threshold
Same action event occurs in the preset duration for terminal and the wearable device.
Optionally, it among some possible embodiments of the invention, is based on being carried to authentication server transmission
The aspect of the remote fingerprint checking request for the fingerprint sequence j that the x fingerprint obtains, processor 602 is specifically used for, determining
User terminal is stated and in the case that in the preset duration same action event occurs for the wearable device, to the service for checking credentials
Device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
It is understood that the function of each functional module of the user terminal 600 of the present embodiment can be according to above method reality
The method specific implementation in example is applied, specific implementation process is referred to the associated description of above method embodiment, herein no longer
It repeats.
As can be seen that user terminal 600 needs to refer to receiving the user terminal among the technical solution of the present embodiment
In the case where the user instruction i that line could execute after being verified, acquisition user is grasped within setting duration by x touch
Make x fingerprint of institute's typing;The remote fingerprint for carrying the fingerprint sequence j obtained based on x fingerprint is sent to authentication server
Checking request;The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that authentication server is sent is proved to be successful
It is lower to execute the user instruction i.Since the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint is by the verifying
Server is successful by fingerprint sequence j and one of standard fingerprint sequences match in y standard fingerprint sequence prestoring
In the case of send, it is seen that above-mentioned technical proposal be equivalent to provides it is a kind of long-range carry out finger print authentication mechanism, user terminal can be with
Remotely to complete fingerprint authentication by authentication server and then determine whether to execute user instruction, the local of such user terminal is
Make not stored standard fingerprint sequence that can also realize fingerprint authentication, it is seen that above-mentioned technical proposal is conducive to the application of extending user fingerprint
Scene, and then brought convenience to the use of user.
Further, fingerprint sequence j is based on x fingerprint and obtains, therefore with the increase of x, it is possible to create fingerprint sequence
Quantity can gradually become very it is more, this, which allows for the possible line sequence that generally refers to, can bind the number of associated user instruction
Amount can become very more, and then may make many operations that may all trigger execution by touch input, be conducive in this way
The manipulation convenience for further enhancing touch control operation brings more convenience to the use of user.
Referring to Fig. 7, the embodiment of the present invention also provides a kind of fingerprint verification system 700, comprising: user terminal 710 and verifying
Server 720.
User terminal 710, the use for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through
In the case that family instructs i, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is
Integer greater than 1;The long-range finger for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint is sent to authentication server
Line checking request has between the arrangement sequencing of fingerprint and the sequencing of corresponding fingerprint typing in the fingerprint sequence i
There is corresponding relationship;In the remote fingerprint auth response that the instruction remote fingerprint for receiving the authentication server transmission is proved to be successful
In the case where execute the user instruction i;
Authentication server 720, for receiving the remote fingerprint checking request, by the fingerprint sequence j and the y prestored
Standard fingerprint sequence is matched, and is referred in the fingerprint sequence j and one of standard in y standard fingerprint sequence prestoring
In the successful situation of line sequences match, Xiang Suoshu user terminal sends the remote fingerprint verifying that instruction remote fingerprint is proved to be successful and rings
It answers.
Optionally, in some possible embodiments of the invention, user terminal is also used to add the x fingerprint
Close processing is to obtain x cryptographic fingerprint, wherein what the fingerprint sequence j was obtained by the x fingerprint is encrypted
X cryptographic fingerprint is combined to obtain, wherein arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i with
There is corresponding relationship between the sequencing of corresponding fingerprint typing.
Optionally, in some possible embodiments of the invention, the x fingerprint is encrypted used
Encryption Algorithm part is identical or all identical or different.
Optionally, in some possible embodiments of the invention, user terminal 710 encrypts the x fingerprint
Encryption Algorithm part used in handling is identical or all identical or different.
Optionally, in some possible embodiments of the invention, user terminal 710 can also be used to detect user terminal
Whether 710, which occur first, is got rid of action event, if the user terminal 710, which occurs first, gets rid of action event, detects the user
Whether the specified wearable device of terminal, which occurs second, is got rid of action event, if the wearable device, which occurs second, gets rid of action event, is sentenced
Break described first get rid of action event and second whipping as event include whether get rid of direction of action identical, if whipping work side
To identical, judge that described first gets rid of action event and second whipping and make the whether equal position of initial time as the whipping that event includes
In in preset duration, judging that described first gets rid of action event and second whipping as the whipping that event includes and be as duration
It is no to be respectively positioned in the preset duration, if described first gets rid of the whipping work that action event and second whipping include as event
Initial time is respectively positioned in preset duration, and described first gets rid of action event and whipping that second whipping includes as event
It is respectively positioned within the preset duration as duration, judges that described first gets rid of action event and second whipping makees event package
Whether the difference that the whipping included makees initial time is less than third predetermined threshold value, if described first gets rid of action event and described second
Whipping as the whipping that event includes make initial time difference be less than third predetermined threshold value, judge described first get rid of action event and
Whether second whipping makees the difference of duration less than the 4th preset threshold as the whipping that event includes, if described first
It gets rid of action event and second whipping and makees the difference of duration less than the 4th preset threshold, determination as the whipping that event includes
Same action event occurs in the preset duration for the user terminal and the wearable device.
Optionally, it among some possible embodiments of the invention, is based on being carried to authentication server transmission
The aspect of the remote fingerprint checking request for the fingerprint sequence j that the x fingerprint obtains, user terminal 710 is specifically used for, in determination
In the case that in the preset duration same action event occurs for user terminal 710 and the wearable device, taken to verifying
Business device sends the remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint.
It is understood that the user terminal 710 of the present embodiment and the function of authentication server 720 can be according to the above methods
Method specific implementation in embodiment, specific implementation process are referred to the associated description of above method embodiment, herein not
It repeats again.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit,
It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can for personal computer, server or network equipment etc.) execute each embodiment the method for the present invention whole or
Part steps.And storage medium above-mentioned includes: that USB flash disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic or disk etc. be various to can store program code
Medium.
Claims (10)
1. a kind of remote fingerprint verification method characterized by comprising
User terminal is in the feelings for having received the user instruction i that the user terminal needs fingerprint authentication that could execute after
Under condition, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is the integer greater than 1;
The remote fingerprint checking request for carrying the fingerprint sequence j obtained based on the x fingerprint, institute are sent to authentication server
Stating has corresponding relationship between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in fingerprint sequence i;
The case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful
Under, judge whether the Permission Levels of the user instruction have been more than given threshold;
In the case where the Permission Levels of the user instruction have been more than given threshold, determine that the user terminal and a wearing are set
It is standby whether same action event to occur in preset duration, and in the user terminal and the wearable device in preset duration
In the case where same action event occurs, the user instruction i is executed, wherein the instruction remote fingerprint is proved to be successful remote
The response of journey fingerprint authentication is by the authentication server by fingerprint sequence j and wherein 1 in y standard fingerprint sequence prestoring
It is sent in the successful situation of standard fingerprint sequences match;Wherein it is determined that whether the user terminal and a wearable device are default
Occur same action event includes: whether detection user terminal occurs first and get rid of action event in duration, if the user is whole
End occurs first to get rid of action event, detects the specified wearable device of the user terminal and whether occurs second and gets rid of action event, if
Wearable device occurs second to get rid of action event, judges that described first gets rid of action event and second whipping is got rid of as what event included
Whether direction of action is identical, if it is identical to get rid of direction of action, judges that described first gets rid of action event and the second whipping makees event package
The whipping included makees whether initial time is respectively positioned in preset duration, judges that described first gets rid of action event and second whipping work
The whipping that event includes makees whether duration is respectively positioned in the preset duration, if described first gets rid of action event and described
Second whipping is respectively positioned in preset duration as the whipping that event includes as initial time, and described first gets rid of action event and institute
It states the second whipping and is respectively positioned within the preset duration as the whipping that event includes as duration, judge that first gets rid of action event
Whether it is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time with second whipping, if described
One, which gets rid of action event and second whipping, is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time, sentences
Break and described first gets rid of action event and second whipping and whether make the difference of duration less than the as the whipping that event includes
Four preset thresholds, if described first gets rid of action event and second whipping makees the difference of duration as the whipping that event includes
It is same dynamic to determine that the user terminal and the wearable device occur in the preset duration less than the 4th preset threshold for value
Make event.
2. the method according to claim 1, wherein
The method also includes: in the remote fingerprint for receiving the instruction remote fingerprint authentication failed that the authentication server is sent
In the case where auth response, the prompt information for prompting the execution permission authentication failed of the user instruction i is popped up.
3. method according to claim 1 or 2, which is characterized in that
The fingerprint sequence j is combined to obtain by the x fingerprint is encrypted with x obtained cryptographic fingerprint,
The x cryptographic fingerprint has between the sequencing of arrangement sequencing and corresponding fingerprint typing in the fingerprint sequence i
There is corresponding relationship.
4. according to the method described in claim 3, it is characterized in that,
The sequencing phase of arrangement sequencing and corresponding fingerprint typing of the x cryptographic fingerprint in the fingerprint sequence i
It is same or opposite.
5. a kind of user terminal characterized by comprising
Acquisition unit, user instruction i's for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through
In the case of, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is whole greater than 1
Number;
Transmission unit, for sending the long-range finger for carrying the fingerprint sequence j obtained based on the x fingerprint to authentication server
Line checking request has between the arrangement sequencing of fingerprint and the sequencing of corresponding fingerprint typing in the fingerprint sequence i
There is corresponding relationship;
Control unit is executed, the long-range finger for being proved to be successful in the instruction remote fingerprint for receiving the authentication server transmission
In the case where line auth response, judge whether the Permission Levels of the user instruction have been more than given threshold, are referred in the user
In the case that the Permission Levels of order have been more than given threshold, determine the user terminal and a wearable device whether in preset duration
It is interior that same action event occurs, and same action event occurs in preset duration in the user terminal and the wearable device
In the case where, execute the user instruction i, wherein the remote fingerprint auth response that is proved to be successful of instruction remote fingerprint by
The authentication server is by fingerprint sequence j and one of standard fingerprint sequence in y standard fingerprint sequence prestoring
It is sent in the case where with success;Wherein it is determined that the user terminal and a wearable device whether occur in preset duration it is same
Action event includes: whether detection user terminal occurs first and get rid of action event, if the first whipping occurs for the user terminal
Make event, detect the specified wearable device of the user terminal and whether occur second and get rid of action event, if wearable device occurs the
Two get rid of action event, judge described first get rid of action event and second whipping as event include get rid of direction of action whether phase
Together, if got rid of, direction of action is identical, judges that described first gets rid of action event and the second whipping is originated as the whipping that event includes
Whether the time is respectively positioned in preset duration, judges that described first gets rid of action event and whipping that second whipping includes as event
Make whether duration is respectively positioned in the preset duration, if described first gets rid of action event and described second and get rid of action event
Including whipping be respectively positioned in preset duration as initial time, and described first gets rid of action event and second whipping makees thing
The whipping that part includes is respectively positioned within the preset duration as duration, judges that first gets rid of action event and second whipping
Whether the difference that the whipping for including as event makees initial time is less than third predetermined threshold value, if described first get rid of action event with
Second whipping is less than third predetermined threshold value as the difference that the whipping that event includes makees initial time, judges first whipping
Make event and second whipping and whether makees the difference of duration less than the 4th preset threshold as the whipping that event includes, if
Described first, which gets rid of action event and second whipping, presets as the difference that the whipping that event includes makees duration less than the 4th
Threshold value determines that same action event occurs in the preset duration for the user terminal and the wearable device.
6. user terminal according to claim 5, which is characterized in that
The user terminal further include: encryption unit is for being encrypted the x fingerprint to obtain x encryption and refer to
Line;Wherein, the fingerprint sequence j is combined by the x fingerprint is encrypted with x obtained cryptographic fingerprint
It arrives, the x cryptographic fingerprint is between arrangement sequencing and the sequencing of corresponding fingerprint typing in the fingerprint sequence i
With corresponding relationship.
7. user terminal according to claim 6, which is characterized in that
The sequencing phase of arrangement sequencing and corresponding fingerprint typing of the x cryptographic fingerprint in the fingerprint sequence i
It is same or opposite.
8. according to the described in any item user terminals of claim 5 to 7, which is characterized in that the execution control unit is also used to:
In the case where receiving the remote fingerprint auth response for the instruction remote fingerprint authentication failed that the authentication server is sent, bullet
Out for prompting the prompt information of the execution permission authentication failed of the user instruction i.
9. a kind of fingerprint verification system characterized by comprising
User terminal, the user instruction i for that could be executed after receiving the user terminal and fingerprint authentication is needed to pass through
In the case where, acquisition user passes through x fingerprint of x touch operation institute typing within setting duration, and the x is greater than 1
Integer;The remote fingerprint verifying for carrying the fingerprint sequence j obtained based on the x cryptographic fingerprint to authentication server transmission is asked
It asks, there is corresponding close between arrangement sequencing and the sequencing of corresponding fingerprint typing of the fingerprint in the fingerprint sequence i
System;In the case where receiving the remote fingerprint auth response that the instruction remote fingerprint that the authentication server is sent is proved to be successful
Whether the Permission Levels for judging the user instruction have been more than given threshold, have been more than to set in the Permission Levels of the user instruction
In the case where determining threshold value, determine whether the user terminal and a wearable device occur same action event in preset duration,
And in the case where in preset duration same action event occurs for the user terminal and the wearable device, the use is executed
Family instructs i;
The authentication server, for receiving the remote fingerprint checking request, by the fingerprint sequence j and the y mark prestored
Quasi- fingerprint sequence is matched, one of standard fingerprint in the fingerprint sequence j and the y standard fingerprint sequence prestored
In the successful situation of sequences match, Xiang Suoshu user terminal sends the remote fingerprint verifying that instruction remote fingerprint is proved to be successful and rings
It answers;Wherein it is determined that it includes: detection that whether the user terminal and a wearable device occur same action event in preset duration
Whether user terminal, which occurs first, is got rid of action event, if the user terminal, which occurs first, gets rid of action event, detects the use
Whether terminal specified wearable device in family, which occurs second, is got rid of action event, if wearable device, which occurs second, gets rid of action event, is judged
Described first get rid of action event and second whipping as event include whether get rid of direction of action identical, if getting rid of direction of action
It is identical, judge described first get rid of action event and the second whipping as the whipping that event includes make initial time whether be respectively positioned on it is default
In duration, judge that described first gets rid of action event and second whipping and make the whether equal position of duration as the whipping that event includes
In in the preset duration, if described first gets rid of action event and when second whipping is originated as the whipping that event includes
Between be respectively positioned in preset duration, and described first gets rid of action event and second whipping continues as the whipping that event includes
Duration is respectively positioned within the preset duration, judges that first gets rid of the whipping work that action event and second whipping include as event
Whether the difference of initial time is less than third predetermined threshold value, if described first gets rid of action event and described second and get rid of action event
Including whipping make the difference of initial time and be less than third predetermined threshold value, judge that described first gets rid of action event and get rid of with described second
The whipping that action event includes makees the difference of duration whether less than the 4th preset threshold, if described first gets rid of action event
Make the difference of duration less than the 4th preset threshold as the whipping that event includes with second whipping, determines that the user is whole
Same action event occurs in the preset duration for end and the wearable device.
10. fingerprint verification system according to claim 9, which is characterized in that the user terminal is also used to the x
Fingerprint is encrypted to obtain x cryptographic fingerprint, the fingerprint sequence j by the x fingerprint be encrypted with
X obtained cryptographic fingerprint is combined to obtain, arrangement sequencing of the x cryptographic fingerprint in the fingerprint sequence i
There is corresponding relationship between the sequencing of corresponding fingerprint typing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510540526.3A CN105160227B (en) | 2015-08-28 | 2015-08-28 | Remote fingerprint verification method and user terminal and fingerprint verification system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510540526.3A CN105160227B (en) | 2015-08-28 | 2015-08-28 | Remote fingerprint verification method and user terminal and fingerprint verification system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105160227A CN105160227A (en) | 2015-12-16 |
CN105160227B true CN105160227B (en) | 2019-03-15 |
Family
ID=54801083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510540526.3A Expired - Fee Related CN105160227B (en) | 2015-08-28 | 2015-08-28 | Remote fingerprint verification method and user terminal and fingerprint verification system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105160227B (en) |
Families Citing this family (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105472348A (en) * | 2015-12-30 | 2016-04-06 | 广州励丰文化科技股份有限公司 | Method and system for monitoring prison based on fingerprint and touch pressure control |
CN105530483A (en) * | 2015-12-30 | 2016-04-27 | 广州励丰文化科技股份有限公司 | Method and system for controlling monitoring under multi-camera scene with fingerprint and touch surface as reference |
CN106937082A (en) * | 2015-12-30 | 2017-07-07 | 广州励丰文化科技股份有限公司 | With reference to the method and system of touch-control area control monitoring under multi-cam scene |
CN105681742A (en) * | 2015-12-30 | 2016-06-15 | 广州励丰文化科技股份有限公司 | Method and system for performing intelligent monitoring according to fingerprints and duration in multi-camera scene |
CN105530487A (en) * | 2015-12-30 | 2016-04-27 | 广州励丰文化科技股份有限公司 | Method and system for carrying out intelligent monitoring under multi-camera scene according to pressure change and fingerprint |
CN105681740A (en) * | 2015-12-30 | 2016-06-15 | 广州励丰文化科技股份有限公司 | Method and system for monitoring detention room based on touch duration control |
CN105530482A (en) * | 2015-12-30 | 2016-04-27 | 广州励丰文化科技股份有限公司 | Method and system for controlling monitoring under multi-camera scene with pressure change and fingerprint as reference |
CN105554467A (en) * | 2015-12-30 | 2016-05-04 | 广州励丰文化科技股份有限公司 | Intelligent monitoring method and system according to touch duration in multi-camera scene |
CN105491342A (en) * | 2015-12-30 | 2016-04-13 | 广州励丰文化科技股份有限公司 | Intelligent monitoring method and system based on fingerprint and pressure under multi-camera condition |
CN105516678A (en) * | 2015-12-30 | 2016-04-20 | 广州励丰文化科技股份有限公司 | Method and system for intelligent monitoring according to contact surface and fingerprints in multi-camera scene |
CN105530489A (en) * | 2015-12-30 | 2016-04-27 | 广州励丰文化科技股份有限公司 | Method and system for intelligently monitoring according to touch pressure in multi-camera scene |
CN107133550B (en) * | 2016-02-29 | 2019-12-03 | 北京小米移动软件有限公司 | Fingerprint authentication method and device |
CN106055949A (en) * | 2016-05-26 | 2016-10-26 | 宇龙计算机通信科技(深圳)有限公司 | System access and authorization method and device |
CN106786903A (en) * | 2016-12-26 | 2017-05-31 | 广东欧珀移动通信有限公司 | Information Authentication method, device, wireless charging device and mobile terminal |
CN109214232A (en) * | 2017-06-29 | 2019-01-15 | 中国电信股份有限公司 | Utilize the method and terminal of fingerprint sequence triggering application |
CN107679385A (en) * | 2017-10-20 | 2018-02-09 | 珠海市魅族科技有限公司 | A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing |
CN109543383B (en) * | 2018-11-23 | 2022-02-11 | Oppo广东移动通信有限公司 | Information sharing method and related product |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523556A (en) * | 2011-12-15 | 2012-06-27 | 百度在线网络技术(北京)有限公司 | Matching method and system of mobile terminal as well as mobile terminal and server |
CN104541282A (en) * | 2014-05-14 | 2015-04-22 | 华为技术有限公司 | Unlocking method, apparatus and device |
CN104574073A (en) * | 2013-10-18 | 2015-04-29 | 阿里巴巴集团控股有限公司 | Matching method and system for electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101549558B1 (en) * | 2009-03-18 | 2015-09-03 | 엘지전자 주식회사 | Mobile terminal and control method thereof |
CN103902861A (en) * | 2012-12-28 | 2014-07-02 | 联想(北京)有限公司 | Status switching method and electronic device |
US9189612B2 (en) * | 2013-05-13 | 2015-11-17 | Ira Konvalinka | Biometric verification with improved privacy and network performance in client-server networks |
CN104751038A (en) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system |
-
2015
- 2015-08-28 CN CN201510540526.3A patent/CN105160227B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102523556A (en) * | 2011-12-15 | 2012-06-27 | 百度在线网络技术(北京)有限公司 | Matching method and system of mobile terminal as well as mobile terminal and server |
CN104574073A (en) * | 2013-10-18 | 2015-04-29 | 阿里巴巴集团控股有限公司 | Matching method and system for electronic equipment |
CN104541282A (en) * | 2014-05-14 | 2015-04-22 | 华为技术有限公司 | Unlocking method, apparatus and device |
Also Published As
Publication number | Publication date |
---|---|
CN105160227A (en) | 2015-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105160227B (en) | Remote fingerprint verification method and user terminal and fingerprint verification system | |
US11272362B2 (en) | System and method for implicit authentication | |
Khamis et al. | GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication | |
US9788203B2 (en) | System and method for implicit authentication | |
WO2017032008A1 (en) | Method for starting application, and mobile terminal | |
US8752146B1 (en) | Providing authentication codes which include token codes and biometric factors | |
CN105117663B (en) | The encrypted object display methods and device of a kind of application | |
Li et al. | T2pair: Secure and usable pairing for heterogeneous iot devices | |
US9660995B2 (en) | Methods, systems, and computer readable media for combating device theft with user notarization | |
US20050010768A1 (en) | Information hiding through time synchronization | |
CN106648583B (en) | Information processing method and terminal | |
US10789372B2 (en) | Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device | |
EP2182457A1 (en) | Dynamic PIN verification for insecure environment | |
US20170169213A1 (en) | Electronic device and method for running applications in different security environments | |
Mayrhofer et al. | Adversary models for mobile device authentication | |
CN108964920A (en) | Authentication method, user terminal and non-face-to-face authentication service server | |
Guerar et al. | A completely automatic public physical test to tell computers and humans apart: A way to enhance authentication schemes in mobile devices | |
CN110765470A (en) | Method and device for realizing safety keyboard, computer equipment and storage medium | |
CN105141609B (en) | Fingerprint authentication method and relevant apparatus and fingerprint verification system | |
CN105471884B (en) | A kind of authentication method, server | |
CN109086624A (en) | login method and device | |
CN103020509B (en) | A kind of terminal device encryption and decryption method, device and terminal device | |
CN109104759B (en) | Interaction method of electronic equipment, electronic equipment and computer readable medium | |
CN105915696B (en) | A kind of communication connection method for building up and terminal | |
CN105045513B (en) | Touch operation method and handheld device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190315 |
|
CF01 | Termination of patent right due to non-payment of annual fee |