CN105631291B - A kind of fingerprint authentication method and electronic equipment - Google Patents
A kind of fingerprint authentication method and electronic equipment Download PDFInfo
- Publication number
- CN105631291B CN105631291B CN201510965315.4A CN201510965315A CN105631291B CN 105631291 B CN105631291 B CN 105631291B CN 201510965315 A CN201510965315 A CN 201510965315A CN 105631291 B CN105631291 B CN 105631291B
- Authority
- CN
- China
- Prior art keywords
- information
- preset fingerprint
- fingerprint information
- authorized
- preset
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of fingerprint verification methods, the lower technical problem of the safety for solving finger print identifying.The described method includes: obtaining preset fingerprint information;Judge whether the preset fingerprint information has been authorized to be the information for carrying out finger print identifying;If the preset fingerprint information has been authorized to, it is determined that the preset fingerprint information can be used in authenticating the finger print information of user's input.The invention also discloses corresponding electronic equipments.
Description
Technical field
The present invention relates to field of computer technology, in particular to a kind of fingerprint authentication method and electronic equipment.
Background technique
Currently, fingerprint identification technology is very widely used, such as mobile phone, tablet computer (Portable Android
Device, PAD) etc. electronic equipments used a large amount of fingerprint technique, for example, using fingerprint technique unlock electronic equipment,
Or mobile payment etc. is carried out using fingerprint technique.
In the prior art, in the fingerprint of change setting, generally pass through " setting " function in electronic equipment (such as mobile phone)
It carries out, most electronic equipment is safer for the change of fingerprint, other certain safety are arranged when changing fingerprint
Verifying, such as numerical ciphers, image password etc..However, if other users can crack above-mentioned safety verification, it can arbitrarily more
Change finger print information set by user, and by the finger print information after change, completes the functions such as mobile payment.Due to number
The safety verifications such as password or image password mode is lower compared to fingerprint authentication safety, and criminal can be by cracking use
Finger print information, is changed to the fingerprint of oneself by the other kinds of password (such as image password, numerical ciphers) of family setting, thus
The fingerprint authentication of user is cracked, easily to obtain undue profits.Obviously, there are certain safety for current fingerprint authentication process
Hidden danger.
As it can be seen that the technical problem that the safety that fingerprint authentication exists in the prior art is lower.
Summary of the invention
The application provides a kind of fingerprint authentication method and electronic equipment, the lower skill of safety for solving fingerprint authentication
Art problem.
In a first aspect, providing a kind of fingerprint authentication method, comprising:
Obtain preset fingerprint information;
Judge whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;
If the preset fingerprint information has been authorized to, it is determined that the preset fingerprint information can be used in verifying user's input
Finger print information.
Optionally, judge whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, comprising:
Whether earlier than predetermined time at the time of judging to acquire the preset fingerprint information;
Wherein, if earlier than the predetermined time at the time of acquiring the preset fingerprint information, it is determined that the preset fingerprint
Information has been authorized to be the information for carrying out fingerprint authentication.
Optionally, judge whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, comprising:
According to the preset fingerprint information, the first coding is generated;Wherein, first coding is for identifying the default finger
Line information;
Judge whether first coding is identical as pre-arranged code;Wherein, the pre-arranged code is awarded for identifying to have passed through
The finger print information of power;
Wherein, if first coding is identical as the pre-arranged code, it is determined that the preset fingerprint information has been authorized to
For the information for carrying out fingerprint authentication.
Optionally, judge the preset fingerprint information whether be authorized to be information for carrying out fingerprint authentication it
Afterwards, further includes:
If the preset fingerprint information is uncommitted, prompt information is exported;Wherein, the prompt information is used for prompting
Family authorizes the preset fingerprint information again.
Optionally, it after determining that the preset fingerprint information can be used in the finger print information for verifying user's input, also wraps
It includes:
Obtain the first finger print information;
First finger print information is compared with the preset fingerprint information;
If first finger print information is identical as the preset fingerprint information, execute corresponding with the preset fingerprint information
Instruction.
Second aspect provides a kind of electronic equipment, comprising:
Acquisition unit obtains preset fingerprint information;
Processing unit, judges whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;If
The preset fingerprint information has been authorized to, it is determined that the preset fingerprint information can be used in verifying the fingerprint letter of user's input
Breath.
Optionally, the processing unit is used for:
Whether earlier than predetermined time at the time of judging to acquire the preset fingerprint information;Wherein, if the acquisition default finger
Earlier than the predetermined time at the time of line information, it is determined that the preset fingerprint information has been authorized to be for carrying out fingerprint authentication
Information.
Optionally, the processing unit is used for:
According to the preset fingerprint information, the first coding is generated;Wherein, first coding is for identifying the default finger
Line information;Judge whether first coding is identical as pre-arranged code;Wherein, the pre-arranged code has passed through authorization for identifying
Finger print information;Wherein, if first coding is identical as the pre-arranged code, it is determined that the preset fingerprint information is awarded
Power is the information for carrying out fingerprint authentication.
Optionally, the processing unit is also used to:
After judging whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, if described
Preset fingerprint information is uncommitted, then exports prompt information;Wherein, the prompt information is for prompting described in user authorizes again
Preset fingerprint information.
Optionally,
The acquisition unit, for determine the preset fingerprint information can be used in verify user input finger print information
Later, the first finger print information is obtained;
The processing unit, for first finger print information to be compared with the preset fingerprint information;If described
First finger print information is identical as the preset fingerprint information, executes instruction corresponding with the preset fingerprint information.
The third aspect provides a kind of electronic equipment, comprising:
Module is obtained, for obtaining preset fingerprint information;
Judgment module, for judging whether the preset fingerprint information has been authorized to be the letter for carrying out fingerprint authentication
Breath;
Determining module, if being authorized to for the preset fingerprint information, it is determined that the preset fingerprint information can be used
In the finger print information of verifying user's input.
Said one or multiple technical solutions in the application at least have following one or more technical effects and excellent
Point:
In the application, even if other users have changed preset fingerprint information (as the aforementioned by cracking by certain modes
Numerical ciphers, the preset fingerprint information that change user acquires before), since the preset fingerprint information after change is not authorized to,
It then can determine that the finger print information after change cannot be used for carrying out fingerprint authentication by judgement, therefore, effectively improve entire
The safety of fingerprint authentication process.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the flow chart of fingerprint authentication method in the embodiment of the present invention;
Fig. 2 is the schematic diagram of electronic equipment in the embodiment of the present invention;
Fig. 3 is the first structural block diagram of electronic equipment in the embodiment of the present invention;
Fig. 4 is second of structural block diagram of electronic equipment in the embodiment of the present invention;
Fig. 5 is the third structural block diagram of electronic equipment in the embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
It is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill people
Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.?
In the case where not conflicting, the feature in embodiment and embodiment in the present invention can mutual any combination.Although also, flowing
Logical order is shown in journey figure, but in some cases, it can be to be different from shown or described by sequence execution herein
The step of.
Optionally, in the embodiment of the present invention, electronic equipment can be personal computer (Personal Computer, PC),
The different electronic equipment of PAD, mobile phone etc., the embodiment of the present invention to this with no restriction.
The preferred embodiment of the present invention is described in detail with reference to the accompanying drawing.
Referring to Figure 1, the embodiment of the present invention provides a kind of fingerprint authentication method, and the process of this method is described as follows.
S101: preset fingerprint information is obtained.
Preset fingerprint information can be user and finger print information in the electronic device is stored in advance, for example, when user for the first time
When using electronic equipment, the finger print information of user can be acquired, and is stored in the storage device of electronic equipment, the storage device
It is general more special, it is different from common storage device (such as hard disk), a kind of common application (such as Alipay application (quick branch
Pay software)) data stored in the storage device can not be edited.For example, the storage device can be ARM (Advanced
RISC Machines) one piece of special safety zone in processor, for storing the higher information of security level, such as this
Preset fingerprint information of user in inventive embodiments etc..In this way, the preset fingerprint information being stored in the safety zone will more
Add safety, is not easy illegally to be obtained by other application.
S102: judge whether preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication.
Optionally, authorization may include that user licenses to third company and (is such as mounted on answering on the electronic equipment of user
Developer etc.) right of preset fingerprint information is directly used, or may include that user licenses to third company's use
The right of the service of fingerprint authentication in the electronic equipment is authorized to such as after electronic equipment determines the result of fingerprint authentication
Side allows to obtain the definitive result and using the definitive result etc..Above-mentioned is only to illustrate, and is not the limit to inventive embodiments
Fixed, one of ordinary skill in the art can be according to actual demand, using different embodiments.
Moreover, it is judged that the mode whether preset fingerprint information has been authorized to the information for carrying out fingerprint authentication has very much
Kind, it is described separately below.
First way:
Whether earlier than predetermined time at the time of may determine that acquisition preset fingerprint information, if acquisition preset fingerprint information when
It carves earlier than predetermined time, it is determined that preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, otherwise, it determines in advance
If the uncommitted information for for carrying out fingerprint authentication of finger print information.
Optionally, it is determined at the time of predetermined time can input preset fingerprint information for the first time according to user.For example, working as user
It inputs after preset fingerprint information, is determined as predetermined time at the time of when user can be completed to input by electronic equipment.At this point, pre-
If the moment can be sometime (23 divide 44 seconds when such as 15) in life, it is also possible to some of the record of system Timer
Moment, the embodiment of the present invention are not construed as limiting this.
Optionally, at the time of predetermined time is also possible to user's sets itself.For example, when user inputs preset fingerprint for the first time
After information, at the time of when user can be with reference to completion input preset fingerprint information (22 divide 45 seconds when such as 18), sets itself
One moment is as predetermined time (22 divide 50 seconds when being such as set as 18).
Above-mentioned is only to illustrate, and one of ordinary skill in the art can use different embodiments according to the actual situation, this
Inventive embodiments are not construed as limiting this.
If electronic equipment can determine the preset fingerprint information earlier than predetermined time at the time of acquiring preset fingerprint information
Be it is authorized, which can be used for fingerprint authentication, correspondingly, if acquisition preset fingerprint information at the time of not
Earlier than predetermined time, then electronic equipment can be assumed that the preset fingerprint information be it is uncommitted, can not be by the preset fingerprint
Information is used for fingerprint authentication.
In order to which the embodiment of the present invention is more clearly illustrated, an example is enumerated.
It is assumed that user A has set the preset fingerprint information A for belonging to A before two days, and set predetermined time
(before such as two days), user B want the preset fingerprint information that the preset fingerprint information that user A is inputted is changed to user B oneself,
And using the finger print information of preset fingerprint Information Authentication oneself input after change, to achieve the purpose that steal the data of user A,
User B may need to open " setting " in electronic equipment and change operation to preset fingerprint information A at this time, that is, re-enter
One belongs to the preset fingerprint information B of B.
Obviously, although user B has re-typed a new preset fingerprint information (in advance by " setting " in electronic equipment
If finger print information B), but due to being later than predetermined time (at the time of before two days) at the time of input preset fingerprint information B, electronics is set
Standby identification preset fingerprint information B is simultaneously unauthorized, can not be used for fingerprint authentication.Correspondingly, when user A oneself wants verifying
When fingerprint, since the acquisition moment of preset fingerprint information A is earlier than predetermined time, then electronic equipment assert preset fingerprint information A
Allow to be used for fingerprint authentication.In this way, the information security of user A will be effectively protected.
The second way:
According to preset fingerprint information, the first coding is generated, judges whether the first coding is identical as pre-arranged code, if first compiles
Code is identical as pre-arranged code, then can determine that preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication.
Wherein, the first coding can be used for identifying preset fingerprint information, and pre-arranged code, which can be used for identifying, has passed through authorization
Finger print information.
Optionally, pre-arranged code may include that user inputs the coding generated when preset fingerprint information for the first time, in addition, default
Coding can also be the unique corresponding coding of preset fingerprint information with input, i.e., in the electronic device, different preset fingerprints are believed
Corresponding coding is ceased all to be different.
Optionally, the mode that the preset fingerprint information inputted for the first time according to user generates pre-arranged code has plants very much, with following
As an example: for example, can prove that (User Identification, UID) algorithm generates pre-arranged code, leads to using user identity
Cross UID algorithm, can according to user input preset fingerprint information when electronic equipment chip in system time and it is some its
He generates pre-arranged code at parameter (such as chip model), can guarantee that the coding generated every time is all different in this way.
Optionally, other than UID algorithm can be used to generate pre-arranged code, the encoding list can also be obtained using random
In the mode of coding obtain pre-arranged code.For example, electronic equipment automatically generates random coded list, in the random coded list
Including each coding be different, after user has input preset fingerprint information, system will be from the random coded list
One coding of middle random selection, and the coding of selection is corresponding with the preset fingerprint information of the secondary input, and later, system will be from this
Used coding is deleted in random coded list, to guarantee coding corresponding to the preset fingerprint information inputted later therewith
Coding corresponding to the preset fingerprint information of preceding input is different.
Optionally, pre-arranged code can also be by user's sets itself.For example, user input for the first time preset fingerprint information it
Afterwards, coding that can be corresponding with self-setting, if the coding of this setting of user and the coding of setting before repeat, electricity
Prompt information can be generated in sub- equipment, to prompt user to re-enter coding, to guarantee the uniqueness of coding.
Above-mentioned is only to illustrate, and one of ordinary skill in the art can use different embodiments according to the actual situation, this
Inventive embodiments are not construed as limiting this.
If the first coding generated according to preset fingerprint information is identical as pre-arranged code, electronic equipment can determine that this is pre-
If finger print information be it is authorized, which can be used to carry out fingerprint authentication, correspondingly, if according to default
The first coding that finger print information generates is not identical as pre-arranged code, then electronic equipment can determine that the preset fingerprint information is not
Authorized, which can not be used for fingerprint authentication.
For the apparent description embodiment of the present invention, an example is enumerated.
It is assumed that having set the preset fingerprint information A for belonging to A before user A, electronic equipment is generated according to UID algorithm
Coding corresponding with preset fingerprint information A, such as this is encoded to 1789654.User B wants the preset fingerprint for inputting user A
Information is changed to the preset fingerprint information B of user B oneself, and the finger print information of oneself input is verified using preset fingerprint information B,
To achieve the purpose that steal the data of user A, user B may need to open " setting " in electronic equipment to preset fingerprint at this time
Information A changes operation, that is, the preset fingerprint information B for belonging to B is re-entered, at this point, electronic equipment is equally by basis
UID algorithm is that preset fingerprint information B generates a coding, such as this is encoded to 4568092.
Obviously, although user B has re-typed a new preset fingerprint information (in advance by " setting " in electronic equipment
If finger print information B), but due to the corresponding coding (4568092) of preset fingerprint information B and pre-arranged code (1789654) not phase
Together, electronic equipment will assert preset fingerprint information B and unauthorized at this time, can not be used for fingerprint authentication.Correspondingly, when using
When family A oneself wants verifying fingerprint, due to the coding of preset fingerprint information A with pre-arranged code be it is identical, then electronic equipment is recognized
Fixed preset fingerprint information A allows to be used for fingerprint authentication.In this way, preset fingerprint letter can be effectively avoided by pre-arranged code
Breath change leads to fingerprint authentication unsafe condition, increases the safety of fingerprint authentication.
S103: if preset fingerprint information has been authorized to, it is determined that preset fingerprint information can be used in verifying user's input
Finger print information.
If preset fingerprint information has been authorized to, electronic equipment can be assumed that the preset fingerprint information can be used in verifying user
Finger print information, it can the preset fingerprint information is used for fingerprint authentication.
Optionally, if preset fingerprint information is uncommitted, prompt information can be exported, prompt information is for prompting user
Again preset fingerprint information is authorized.
If judging, preset fingerprint information is uncommitted, i.e., the preset fingerprint information can not be used for fingerprint authentication, at this point,
Electronic equipment can export prompt information.Optionally, the modes such as the light of voice, text or transmitting different colours can be passed through
In any one or a few mode export prompt information, the embodiment of the present invention is not construed as limiting this.
Optionally, electronic equipment can also be directly entered the process for authorizing the preset fingerprint information again.Such as, however, it is determined that
Preset fingerprint information is uncommitted, then enters licensing process again.Wherein, the mode authorized again is more, enumerates an example herein:
For example electronic equipment (such as mobile phone) can send the solicited message authorized again, clothes to server (such as server of bank)
Business device is in the rear identification information sent when being used to indicate electronic equipment input just sub-authorization to electronic equipment for being connected to solicited message
The instruction of (identifying code set by user oneself of storage in the server when for example including first sub-authorization), when server obtains
After the identification information of user's input, comparing the identification information of input, whether at the beginning of with user storage is in the server when sub-authorization
Identification information is consistent, if comparison result is consistent, the preset fingerprint information flag that server inputs this is to have authorized, accordingly
, if comparison result is inconsistent, server can execute the instruction such as Frozen Account, to guarantee the account safety of user.
Optionally, available after determining that preset fingerprint information can be used in the finger print information for verifying user's input
First finger print information is compared first finger print information with preset fingerprint information, if the first finger print information and preset fingerprint are believed
Manner of breathing is same, then executes instruction corresponding with preset fingerprint information.
After determining that preset fingerprint information can be used in the finger print information for verifying user's input, electronic equipment be can be used
The preset fingerprint information carries out fingerprint authentication.For example, user wants to carry out mobile payment by fingerprint authentication.User will input certainly
Oneself finger print information (i.e. the first finger print information), and the first finger print information and preset fingerprint information are compared, if first refers to
Line information is identical as preset fingerprint information, then the operation that electronic equipment will allow user to carry out mobile payment, correspondingly, if first
Finger print information is different from preset fingerprint information, then electronic equipment would not allow for the operation of user's progress mobile payment, to protect use
The safety of payment at family.
Optionally, there are many kinds of the embodiments of the first finger print information of comparison and preset fingerprint information, for example, the first fingerprint
Information and preset fingerprint information are saved with image format, then the first finger print information and pre- can be compared by image recognition technology
If the similarity between finger print information, when similarity reaches higher threshold value (such as 99.99%), then the first fingerprint is confirmed
Information is identical as preset fingerprint information.Instruction corresponding with preset fingerprint information, such as mobile payment instruction will be executed later.On
It states and only illustrates, one of ordinary skill in the art can use different embodiments, the embodiment of the present invention according to the actual situation
This is not construed as limiting.
Fig. 2 is referred to, based on the same inventive concept, the embodiment of the present invention provides a kind of electronic equipment, comprising:
Acquisition unit 201 obtains preset fingerprint information;
Processing unit 202, judges whether preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;If pre-
If finger print information has been authorized to, it is determined that preset fingerprint information can be used in verifying the finger print information of user's input.
Optionally, processing unit 202 is used for:
Whether earlier than predetermined time at the time of judging to acquire preset fingerprint information;Wherein, if acquiring preset fingerprint information
Moment is earlier than predetermined time, it is determined that preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication.
Optionally, processing unit 202 is used for:
According to preset fingerprint information, the first coding is generated;Wherein, the first coding is for identifying preset fingerprint information;Judgement
Whether the first coding is identical as pre-arranged code;Wherein, pre-arranged code is used to identify the finger print information for having passed through authorization;Wherein, if
First coding is identical as pre-arranged code, it is determined that preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication.
Optionally, processing unit 202 is also used to:
After judging whether preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, if preset fingerprint
Information is uncommitted, then exports prompt information;Wherein, prompt information is for prompting user to authorize preset fingerprint information again.
Optionally,
Acquisition unit 201, for determine preset fingerprint information can be used in verify user input finger print information after,
Obtain the first finger print information;
Processing unit 202, for the first finger print information to be compared with preset fingerprint information;If the first finger print information with
Preset fingerprint information is identical, executes instruction corresponding with preset fingerprint information.
Fig. 3 is referred to, based on the same inventive concept, the embodiment of the present invention also provides another electronic equipment, comprising:
Module 301 is obtained, for obtaining preset fingerprint information;
Judgment module 302, for judging whether preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;
Determining module 303, if being authorized to for preset fingerprint information, it is determined that preset fingerprint information can be used in verifying
The finger print information of user's input.
Optionally, judgment module 302, comprising:
Whether earlier than predetermined time at the time of judging to acquire preset fingerprint information;Wherein, if acquiring preset fingerprint information
Moment is earlier than predetermined time, it is determined that preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication.
Optionally, judgment module 302, comprising:
According to preset fingerprint information, the first coding is generated;Wherein, the first coding is for identifying preset fingerprint information;
Judge whether the first coding is identical as pre-arranged code;Wherein, pre-arranged code is used to identify the fingerprint for having passed through authorization
Information;
Wherein, if the first coding is identical as pre-arranged code, it is determined that preset fingerprint information has been authorized to be for being referred to
The information of line verifying.
Optionally, Fig. 4 is referred to, the electronic equipment further include: cue module 304, wherein
Cue module 304, for judging whether preset fingerprint information has been authorized to be the letter for carrying out fingerprint authentication
After breath, if preset fingerprint information is uncommitted, prompt information is exported;Wherein, prompt information is for prompting user to award again
Weigh preset fingerprint information.
Optionally, Fig. 5 is referred to, the electronic equipment further include: execution module 305, wherein
Obtain module 301, for determine preset fingerprint information can be used in verify user input finger print information after,
Obtain the first finger print information;
Judgment module 302, for the first finger print information to be compared with preset fingerprint information;
Execution module 305 executes and preset fingerprint information pair if identical as preset fingerprint information for the first finger print information
The instruction answered.
It should be noted that in the embodiment of the present invention, a kind of fingerprint described in electronic equipment described in Fig. 5-Fig. 2 and Fig. 1
Verification method is corresponding, and embodiment can be referred to mutually, thus when describing fingerprint authentication method for duplicate content part not
It repeats more.
Said one or multiple technical solutions in the embodiment of the present invention at least have following one or more technical effects
And advantage:
In the embodiment of the present invention, (lead to as the aforementioned even if other users have changed preset fingerprint information by certain modes
Cross and crack numerical ciphers, change user before acquire preset fingerprint information), due to change after preset fingerprint information not by
Authorization then can determine that the finger print information after change cannot be used for progress fingerprint authentication and therefore effectively improve by judgement
The safety of entire fingerprint authentication process.
It is apparent to those skilled in the art that for convenience and simplicity of description, only with above-mentioned each function
The division progress of module can according to need and for example, in practical application by above-mentioned function distribution by different function lists
Member is completed, i.e., the internal structure of device is divided into different functional units, to complete all or part of function described above
Energy.The specific work process of the system, apparatus, and unit of foregoing description, can be with reference to corresponding in preceding method embodiment
Journey, details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the module or
The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, device or unit
Indirect coupling or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The all or part of the steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory
(Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk
Etc. the various media that can store program code.
Specifically, the corresponding computer program instructions of one of embodiment of the present invention fingerprint authentication method can be deposited
It stores up on CD, hard disk, the storage mediums such as USB flash disk, when the computer journey corresponding with a kind of fingerprint authentication method in storage medium
Sequence instruction is read or is performed by an electronic equipment, includes the following steps:
Obtain preset fingerprint information;
Judge whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;
If the preset fingerprint information has been authorized to, it is determined that the preset fingerprint information can be used in verifying user's input
Finger print information.
Optionally, store in the storage medium and step: judge whether the preset fingerprint information has been authorized to be
For carrying out the information of fingerprint authentication, corresponding computer instruction includes the following steps: during being performed
Whether earlier than predetermined time at the time of judging to acquire the preset fingerprint information;
Wherein, if earlier than the predetermined time at the time of acquiring the preset fingerprint information, it is determined that the preset fingerprint
Information has been authorized to be the information for carrying out fingerprint authentication.
Optionally, store in the storage medium and step: judge whether the preset fingerprint information has been authorized to be
For carrying out the information of fingerprint authentication, corresponding computer instruction includes the following steps: during being performed
According to the preset fingerprint information, the first coding is generated;Wherein, first coding is for identifying the default finger
Line information;
Judge whether first coding is identical as pre-arranged code;Wherein, the pre-arranged code is awarded for identifying to have passed through
The finger print information of power;
Wherein, if first coding is identical as the pre-arranged code, it is determined that the preset fingerprint information has been authorized to
For the information for carrying out fingerprint authentication.
Optionally, store in the storage medium and step: judge whether the preset fingerprint information has been authorized to be
For carrying out the information of fingerprint authentication, corresponding computer instruction includes the following steps: after being performed process
If the preset fingerprint information is uncommitted, prompt information is exported;Wherein, the prompt information is used for prompting
Family authorizes the preset fingerprint information again.
Optionally, store in the storage medium and step: determine that the preset fingerprint information can be used in verifying and use
The finger print information of family input, corresponding computer instruction include the following steps: after being performed process
Obtain the first finger print information;
First finger print information is compared with the preset fingerprint information;
If first finger print information is identical as the preset fingerprint information, execute corresponding with the preset fingerprint information
Instruction.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art
Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to include these modifications and variations.
Claims (9)
1. a kind of fingerprint verification method, comprising:
Obtain preset fingerprint information;
Judge whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;
If the preset fingerprint information has been authorized to, it is determined that the preset fingerprint information can be used in verifying the finger of user's input
Line information,
Judge whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, comprising:
Whether earlier than predetermined time at the time of judging to acquire the preset fingerprint information;
Wherein, if earlier than the predetermined time at the time of acquiring the preset fingerprint information, it is determined that the preset fingerprint information
It has been authorized to be the information for carrying out fingerprint authentication.
2. the method as described in claim 1, which is characterized in that judge whether the preset fingerprint information has been authorized to be and be used for
Carry out the information of fingerprint authentication, comprising:
According to the preset fingerprint information, the first coding is generated;Wherein, first coding is for identifying the preset fingerprint letter
Breath;
Judge whether first coding is identical as pre-arranged code;Wherein, the pre-arranged code, which is used to identify, has passed through authorization
Finger print information;
Wherein, if first coding is identical as the pre-arranged code, it is determined that the preset fingerprint information has been authorized to be use
In the information for carrying out fingerprint authentication.
3. the method as described in claim 1-2 is any, which is characterized in that judging whether the preset fingerprint information has been awarded
After power is the information for carrying out fingerprint authentication, further includes:
If the preset fingerprint information is uncommitted, prompt information is exported;Wherein, the prompt information is for prompting user's weight
Newly authorize the preset fingerprint information.
4. the method as described in claim 1, which is characterized in that determine the preset fingerprint information can be used in verify user
After the finger print information of input, further includes:
Obtain the first finger print information;
First finger print information is compared with the preset fingerprint information;
If first finger print information is identical as the preset fingerprint information, finger corresponding with the preset fingerprint information is executed
It enables.
5. a kind of electronic equipment, comprising:
Acquisition unit, for obtaining preset fingerprint information;
Processing unit, for judging whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;If
The preset fingerprint information has been authorized to, it is determined that the preset fingerprint information can be used in verifying the fingerprint letter of user's input
Breath,
The processing unit is used for:
Whether earlier than predetermined time at the time of judging to acquire the preset fingerprint information;Wherein, if acquiring the preset fingerprint letter
Earlier than the predetermined time at the time of breath, it is determined that the preset fingerprint information has been authorized to be the letter for carrying out fingerprint authentication
Breath.
6. electronic equipment as claimed in claim 5, which is characterized in that the processing unit is used for:
According to the preset fingerprint information, the first coding is generated;Wherein, first coding is for identifying the preset fingerprint letter
Breath;Judge whether first coding is identical as pre-arranged code;Wherein, the pre-arranged code is used to identify the finger for having passed through authorization
Line information;Wherein, if first coding is identical as the pre-arranged code, it is determined that the preset fingerprint information has been authorized to be
For carrying out the information of fingerprint authentication.
7. the electronic equipment as described in claim 5-6 is any, which is characterized in that the processing unit is also used to:
After judging whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication, if described default
Finger print information is uncommitted, then exports prompt information;Wherein, the prompt information is described default for prompting user to authorize again
Finger print information.
8. electronic equipment as claimed in claim 5, which is characterized in that
The acquisition unit is also used to: determining that the preset fingerprint information can be used in verifying user's input in the processing unit
Finger print information after, obtain the first finger print information;
The processing unit is also used to: first finger print information is compared with the preset fingerprint information;If described
One finger print information is identical as the preset fingerprint information, executes instruction corresponding with the preset fingerprint information.
9. a kind of electronic equipment, comprising:
Module is obtained, for obtaining preset fingerprint information;
Judgment module is wrapped for judging whether the preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication
It includes: whether earlier than predetermined time at the time of judging to acquire preset fingerprint information;Wherein, if it is early at the time of acquiring preset fingerprint information
In predetermined time, it is determined that preset fingerprint information has been authorized to be the information for carrying out fingerprint authentication;
Determining module, if being authorized to for the preset fingerprint information, it is determined that the preset fingerprint information can be used in testing
Demonstrate,prove the finger print information of user's input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510965315.4A CN105631291B (en) | 2015-12-21 | 2015-12-21 | A kind of fingerprint authentication method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510965315.4A CN105631291B (en) | 2015-12-21 | 2015-12-21 | A kind of fingerprint authentication method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105631291A CN105631291A (en) | 2016-06-01 |
CN105631291B true CN105631291B (en) | 2019-09-24 |
Family
ID=56046217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510965315.4A Active CN105631291B (en) | 2015-12-21 | 2015-12-21 | A kind of fingerprint authentication method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105631291B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106170007A (en) * | 2016-09-30 | 2016-11-30 | 北京小米移动软件有限公司 | Auth method and device |
CN107122647A (en) * | 2017-04-27 | 2017-09-01 | 奇酷互联网络科技(深圳)有限公司 | Finger print data processing method, device and electronic equipment |
CN107292157A (en) * | 2017-07-25 | 2017-10-24 | 合肥红铭网络科技有限公司 | A kind of personal computer Sign-On authentication method and apparatus |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634328A (en) * | 2013-12-19 | 2014-03-12 | 青岛海尔软件有限公司 | Authentication method, device and system for network platform authentication server |
CN104038509A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Fingerprint authentication cloud system |
EP2854077A1 (en) * | 2013-08-01 | 2015-04-01 | Huawei Technologies Co., Ltd. | Authentication method for wearable device, and wearable device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182275A (en) * | 2014-08-26 | 2014-12-03 | 上海斐讯数据通信技术有限公司 | Mobile equipment fast in application starting and application starting method thereof |
-
2015
- 2015-12-21 CN CN201510965315.4A patent/CN105631291B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2854077A1 (en) * | 2013-08-01 | 2015-04-01 | Huawei Technologies Co., Ltd. | Authentication method for wearable device, and wearable device |
CN103634328A (en) * | 2013-12-19 | 2014-03-12 | 青岛海尔软件有限公司 | Authentication method, device and system for network platform authentication server |
CN104038509A (en) * | 2014-07-03 | 2014-09-10 | 南昌欧菲生物识别技术有限公司 | Fingerprint authentication cloud system |
Also Published As
Publication number | Publication date |
---|---|
CN105631291A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101335619B (en) | Authorized using method of disposal dynamic cipher telephone or short message | |
US20150058220A1 (en) | Payment pre-authorization | |
CN106375326B (en) | A kind of mobile phone bi-directional verification terminal and method | |
CN105184567B (en) | Processing method, processing unit and the mobile terminal of information | |
CN107645482A (en) | A kind of risk control method and device for business operation | |
CN102930436A (en) | Mobile payment method and device | |
CN103258270A (en) | Bank paying method and device | |
CN104346550B (en) | A kind of information processing method and a kind of electronic equipment | |
CN104919779A (en) | Method for authenticating a user with respect to a machine | |
CN104268756B (en) | Method of mobile payment and system | |
CN105631291B (en) | A kind of fingerprint authentication method and electronic equipment | |
CN110807624A (en) | Digital currency hardware cold wallet system and transaction method thereof | |
CN103905191A (en) | Verification method applied to mobile terminal, mobile terminal and system | |
CN100444184C (en) | Method and system of software identify identification | |
CN109886662A (en) | Block chain wallet application method and system, terminal and computer readable storage medium | |
CN102413146B (en) | Client authorized logon method based on dynamic codes | |
CN109617703B (en) | Key management method and device, electronic equipment and storage medium | |
CN107995227A (en) | The authentication method and device of movable storage device | |
CN105069361A (en) | Safety access method and system for privacy space | |
CN106156549B (en) | application program authorization processing method and device | |
CN101854357B (en) | Method and system for monitoring network authentication | |
CN110516427B (en) | Terminal user identity authentication method and device, storage medium and computer equipment | |
GB2508173A (en) | Identity verification systems and methods | |
CN105678149B (en) | A kind of unlocking method and terminal | |
CN105719130A (en) | Payment verification method, payment verification device and payment verification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |