CN106067002B - A kind of finger print information processing method and user terminal - Google Patents
A kind of finger print information processing method and user terminal Download PDFInfo
- Publication number
- CN106067002B CN106067002B CN201610367263.5A CN201610367263A CN106067002B CN 106067002 B CN106067002 B CN 106067002B CN 201610367263 A CN201610367263 A CN 201610367263A CN 106067002 B CN106067002 B CN 106067002B
- Authority
- CN
- China
- Prior art keywords
- terminal
- user
- fingerprint
- fingerprint information
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 15
- 238000003672 processing method Methods 0.000 title claims abstract description 15
- 238000000034 method Methods 0.000 claims abstract description 27
- 238000012795 verification Methods 0.000 claims description 46
- 230000004044 response Effects 0.000 claims description 22
- 238000001514 detection method Methods 0.000 claims description 13
- 230000015654 memory Effects 0.000 claims description 13
- 238000012217 deletion Methods 0.000 claims description 7
- 230000037430 deletion Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims 1
- 238000013461 design Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the invention discloses a kind of finger print information processing method and user terminals, wherein method includes: after first terminal detects the distance between the fingerprint input area of user's finger away from first terminal, to judge whether the distance is less than preset value;If the distance is less than preset value, then first terminal sends the decoding request for carrying identification information to second terminal, the identification information is the mark of first terminal or the mark of user, the decoding request is for requesting second terminal that the encrypted finger print information corresponding with identification information of storage is decrypted, the finger print information decrypted, the finger print information that the finger print information of decryption is used to send first terminal verify.As it can be seen that first terminal can make in advance second terminal that the finger print information of encryption be decrypted by implementing the embodiment of the present invention, to save the time of finger print information decryption, and then the time of finger-mark check is shortened, improve the efficiency of finger-mark check.
Description
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a fingerprint information processing method and a user terminal.
Background
At present, in order to improve the security and convenience of user terminals (such as mobile phones, tablet computers and the like), a fingerprint verification function is widely used.
In practical applications, the user terminal often performs fingerprint verification through other terminals, and if the verification is passed, the user terminal performs corresponding operations (for example, unlocking a screen or performing payment and the like). For example, the user terminal often performs fingerprint verification through the server, the server stores registered fingerprint information, and the user terminal sends fingerprint information input by the user to the server for verification; the server informs the user terminal of the verification result; and if the verification result is that the verification is passed, the user terminal executes corresponding operation. In general, in order to improve security of the registered fingerprint information, the registered fingerprint information stored in the server is encrypted. When the server receives the fingerprint information sent by the user terminal, the server needs to decrypt the registered fingerprint information and then compares the decrypted registered fingerprint information with the fingerprint information sent by the user terminal to verify the fingerprint information sent by the user terminal.
However, in practice, such fingerprint verification is found to be inefficient and often takes a long time to verify.
Disclosure of Invention
The embodiment of the invention discloses a fingerprint information processing method and a user terminal, which are beneficial to improving the efficiency of fingerprint information verification.
The first aspect of the embodiment of the invention discloses a fingerprint information processing method, which comprises the following steps:
the method comprises the steps that a first terminal detects the distance between a finger of a user and a fingerprint input area of the first terminal;
the first terminal judges whether the distance is smaller than a preset value;
if the distance is smaller than the preset value, the first terminal sends a decryption request carrying identification information to a second terminal, wherein the identification information is an identification of the first terminal or an identification of a user, the decryption request is used for requesting the second terminal to decrypt the stored encrypted fingerprint information corresponding to the identification information to obtain decrypted fingerprint information, and the decrypted fingerprint information is used for verifying the fingerprint information sent by the first terminal.
In one possible design, after the first terminal sends a decryption request carrying identification information to the second terminal, the method further includes:
the first terminal receives first fingerprint information input by a user through the fingerprint input area;
the first terminal sends a verification request comprising the first fingerprint information to the second terminal;
the first terminal receives first response information which is sent by the second terminal and used for indicating that the first fingerprint information passes the verification, wherein the first response information is sent by the second terminal when the first fingerprint information is verified to be matched with the decrypted fingerprint information;
the first terminal executes target operation, wherein the target operation comprises any one or combination of multiple kinds of payment operation, screen unlocking operation, application login operation and application unlocking operation.
In one possible design, when the target operation includes a screen unlock operation, the first terminal detects a distance between a user's finger and a fingerprint input area of the first terminal, including:
in a screen locking state, the first terminal detects the distance between a finger of a user and a fingerprint input area of the first terminal;
when the target operation comprises a payment operation, an application login operation or an application unlocking operation, the first terminal detects the distance between a user finger and a fingerprint input area of the first terminal, and the method comprises the following steps:
and under an interface requiring a user to input fingerprint information for verification, the first terminal detects the distance between the finger of the user and a fingerprint input area of the first terminal.
In one possible design, after the first terminal receives first response information sent by the second terminal and indicating that the first fingerprint information is verified, the method further includes:
and the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
In one possible design, the first terminal detecting a distance between a user's finger and a fingerprint input area of the first terminal includes:
the first terminal detects the distance between a user's finger, which is located above the plane of the fingerprint input area of the first terminal, and the fingerprint input area of the first terminal.
In one possible design, after the first terminal sends a decryption request carrying identification information to the second terminal, the method further includes:
and if the fingerprint information input by the user through the fingerprint input area is not received within a preset time period, the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
In one possible design, the method further includes:
when the first terminal is detected to be in a screen locking state, the first terminal is connected with the second terminal; or,
and when the first terminal enters an interface which needs a user to input fingerprint information for verification, the first terminal is connected with the second terminal.
A second aspect of the embodiments of the present invention discloses a user terminal, where the user terminal includes:
the detection module is used for detecting the distance between a finger of a user and a fingerprint input area of the user terminal;
the judging module is used for judging whether the distance is smaller than a preset value or not;
and the sending module is used for sending a decryption request carrying identification information to a second terminal when the judging module judges that the distance is smaller than the preset value, wherein the identification information is an identification of the user terminal or an identification of a user, the decryption request is used for requesting the second terminal to decrypt the stored encrypted fingerprint information corresponding to the identification information to obtain decrypted fingerprint information, and the decrypted fingerprint information is used for verifying the fingerprint information sent by the user terminal.
In one possible design, the user terminal further includes:
the receiving module is used for receiving first fingerprint information input by a user through the fingerprint input area after the sending module sends a decryption request carrying identification information to a second terminal;
the sending module is further configured to send a verification request including the first fingerprint information to the second terminal;
the receiving module is further configured to receive first response information, which is sent by the second terminal and used to indicate that the first fingerprint information passes verification, where the first response information is sent by the second terminal when the first fingerprint information is verified to be matched with the decrypted fingerprint information;
and the execution module is used for executing target operation, and the target operation comprises any one or combination of more than one of payment operation, screen unlocking operation, application login operation and application unlocking operation.
In a possible design, when the target operation includes a screen unlocking operation, the detection module is specifically configured to:
detecting the distance between a finger of a user and a fingerprint input area of the user terminal in a screen locking state;
when the target operation includes a payment operation, an application login operation, or an application unlocking operation, the detection module is specifically configured to:
and detecting the distance between the finger of the user and the fingerprint input area of the user terminal under an interface which requires the user to input fingerprint information for verification.
In a possible design, the sending module is further configured to send, to the second terminal, a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information after the receiving module receives the first response information sent by the second terminal and used for instructing the second terminal to verify that the first fingerprint information passes.
In one possible design, the detection module is specifically configured to:
detecting a distance between a user's finger, which is located above a plane in which a fingerprint input area of the user terminal is located, and the fingerprint input area of the user terminal.
In a possible design, the sending module is further configured to send, after the sending module sends the decryption request carrying the identification information to the second terminal, a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal if the fingerprint information input by the user through the fingerprint input area is not received within a preset time period.
In one possible design, the user terminal further includes:
the connection module is used for establishing connection with the second terminal when the screen locking state is detected; or,
and the connection module is used for establishing connection with the second terminal when entering an interface which needs the user to input fingerprint information for verification.
A third aspect of the embodiments of the present invention discloses a user terminal, including: a processor and a memory, wherein the processor is for use in the first aspect or a possible design of the first aspect.
In the embodiment of the invention, after detecting the distance between the finger of the user and the fingerprint input area of the first terminal, the first terminal judges whether the distance is smaller than a preset value; if the distance is smaller than the preset value, the first terminal sends a decryption request carrying identification information to the second terminal, the identification information is an identification of the first terminal or an identification of a user, the decryption request is used for requesting the second terminal to decrypt the stored encrypted fingerprint information corresponding to the identification information to obtain decrypted fingerprint information, and the decrypted fingerprint information is used for verifying the fingerprint information sent by the first terminal. Therefore, by implementing the embodiment of the invention, the first terminal can enable the second terminal to decrypt the encrypted fingerprint information in advance, so that the time for decrypting the fingerprint information is saved, the time for verifying the fingerprint is further shortened, and the efficiency for verifying the fingerprint is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic flowchart of a fingerprint information processing method according to an embodiment of the present invention;
FIG. 2 is a schematic flowchart of another fingerprint information processing method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a user terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of another user terminal disclosed in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of another user terminal disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention discloses a fingerprint information processing method and a user terminal, which are beneficial to improving the efficiency of fingerprint information verification. The following are detailed below.
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating a fingerprint information processing method according to an embodiment of the present invention. As shown in FIG. 1, the fingerprint information processing method can comprise 101-103 parts.
101. The first terminal detects a distance between a user's finger and a fingerprint input area of the first terminal.
In the embodiment of the present invention, the first terminal may include, but is not limited to, a user terminal having a fingerprint input area, such as a smart phone, a tablet computer, a notebook computer, and a desktop computer. The operating system of the user terminal may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Black Berry operating system, a Windows operating system, and the like, and the embodiment of the present invention is not limited thereto. Wherein the fingerprint input area may be located in a Home key or other area of the touch screen or the first terminal. Alternatively, the first terminal may detect a distance between the user's finger and the fingerprint input area of the first terminal through a distance sensor.
As an alternative implementation, the specific implementation of the first terminal detecting the distance between the user's finger and the fingerprint input area of the first terminal may be:
the first terminal detects a distance between a user's finger, which is above a plane in which the fingerprint input area of the first terminal is located, and the fingerprint input area of the first terminal.
In this embodiment, the finger is above the plane of the fingerprint input area of the first terminal and not in the same plane as the fingerprint input area of the first terminal. In practical applications, when the distance from the user's finger above the plane of the fingerprint input area of the first terminal to the fingerprint input area is small, the user's finger is likely to input a fingerprint in the fingerprint input area. Thus, it is possible to predict whether the user intends to input a fingerprint at the fingerprint input area by detecting the distance between the user's finger, which is above the plane in which the fingerprint input area of the first terminal is located, and the fingerprint input area of the first terminal.
102. The first terminal judges whether the distance is smaller than a preset value.
In the embodiment of the invention, after the first terminal detects the distance between the finger of the user and the fingerprint input area of the first terminal, whether the distance is smaller than a preset value is judged. If the distance is smaller than the preset value, step 103 is executed. Optionally, if the distance is greater than or equal to the preset value, the distance between the finger of the first terminal and the fingerprint input area of the first terminal is continuously detected.
103. The first terminal sends a decryption request carrying the identification information to the second terminal.
In the embodiment of the present invention, the second terminal may be a wearable device, a smart phone, a tablet computer, a server, or the like, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, the identification information is the identification of the first terminal or the identification of the user. The identifier of the first terminal is identity information of the first terminal, and the identifier of the user may be an application account. For example, if the first terminal and the second terminal interact through a certain application, the identifier of the user may be account information of the application.
In the embodiment of the present invention, the decryption request is used to request the second terminal to decrypt the stored fingerprint information corresponding to the identification information, so as to obtain decrypted fingerprint information.
In the embodiment of the invention, the first terminal verifies the fingerprint input by the user through the second terminal. The second terminal stores encrypted fingerprint information. After receiving the fingerprint information input by the user, the first terminal sends the fingerprint information to the second terminal. The second terminal can use the decrypted fingerprint information obtained before to verify the fingerprint information sent by the first terminal, namely the second terminal compares the fingerprint information sent by the first terminal with the decrypted fingerprint information and judges whether the fingerprint information and the decrypted fingerprint information are matched or not so as to verify the fingerprint information sent by the first terminal.
Therefore, by implementing the embodiment of the invention, the first terminal can predict whether the user needs to input the fingerprint for verification, so that the second terminal can decrypt the encrypted fingerprint information in advance. After the second terminal receives the fingerprint information sent by the first terminal, the fingerprint information sent by the first terminal can be verified by directly using the decrypted fingerprint information before the second terminal receives the fingerprint information sent by the first terminal, and the fingerprint information is not required to be decrypted when the fingerprint information sent by the first terminal is received, so that the time for decrypting the fingerprint information is saved, the time for verifying the fingerprint is further shortened, and the efficiency for verifying the fingerprint is improved.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating another fingerprint information processing method according to an embodiment of the present invention. As shown in FIG. 2, the fingerprint information processing method can comprise 201-209 parts.
201. The first terminal detects a distance between a user's finger and a fingerprint input area of the first terminal.
In the embodiment of the present invention, the specific implementation of the portion 201 can refer to the portion 101 shown in fig. 1, which is not described herein again.
202. The first terminal judges whether the distance is smaller than a preset value.
In the embodiment of the invention, after the first terminal detects the distance between the finger of the user and the fingerprint input area of the first terminal, whether the distance is smaller than a preset value is judged. If the distance is smaller than the preset value, step 203 is executed. Optionally, if the distance is greater than or equal to the preset value, the distance between the finger of the first terminal and the fingerprint input area of the first terminal is continuously detected.
203. The first terminal sends a decryption request carrying the identification information to the second terminal.
In the embodiment of the present invention, the identification information is an identification of the first terminal or an identification of the user, the decryption request is used to request the second terminal to decrypt the stored fingerprint information corresponding to the identification information, so as to obtain decrypted fingerprint information, and the decrypted fingerprint information is used to verify the fingerprint information sent by the first terminal.
204. And if the fingerprint information input by the user through the fingerprint input area is not received within the preset time period, the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
In the embodiment of the invention, after the first terminal sends the decryption request carrying the identification information to the second terminal, the time when the first terminal finishes sending the decryption request to the second terminal is taken as the starting time, and whether the fingerprint information input by a user through the fingerprint input area in the preset time period is detected. And if the fingerprint information input by the user through the fingerprint input area is not detected within the preset time period, the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
The second terminal stores the encrypted fingerprint information in order to improve the security of the fingerprint information. After the second terminal decrypts the fingerprint information, if the decrypted fingerprint information is stored for a long time, the decrypted fingerprint information is easy to be unsafe. Therefore, if the user does not need to perform fingerprint verification through the second terminal for a long period of time, the second terminal can delete the decrypted fingerprint information to ensure the security of the fingerprint information.
205. The first terminal receives first fingerprint information input by a user through a fingerprint input area.
In this embodiment of the present invention, the first fingerprint information may be a fingerprint image or fingerprint feature information, and the embodiment of the present invention is not limited.
206. The first terminal sends a verification request including the first fingerprint information to the second terminal.
In the embodiment of the present invention, after receiving the verification request, the second terminal verifies whether the first fingerprint information matches with the decrypted fingerprint information obtained before. And if so, sending the first response information to the first terminal. If not, optionally, the second terminal sends, to the first terminal, second response information for indicating that the first fingerprint information check fails.
207. The first terminal receives first response information which is sent by the second terminal and used for indicating that the first fingerprint information passes the verification.
208. The first terminal performs a target operation.
In the embodiment of the invention, if the first terminal receives the first response message, the first terminal executes the target operation. The target operation comprises any one or combination of more of a payment operation, a screen unlocking operation, an application login operation and an application unlocking operation.
By executing the parts 205-208, the first terminal can enable the second terminal to verify the fingerprint information sent by the first terminal by using the decrypted fingerprint information, thereby improving the efficiency of fingerprint verification. And the corresponding operation is executed after the fingerprint verification is successful, so that the safety of the first terminal is improved.
209. And the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
In the embodiment of the invention, after receiving the first response message, the first terminal sends a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal. So that the second terminal can delete the decrypted fingerprint information in time to ensure the safety of the fingerprint information.
As an optional implementation, the first terminal may further perform the following operations:
when detecting that the first terminal is in a screen locking state, establishing connection between the first terminal and the second terminal; or when the first terminal enters an interface which needs the user to input the fingerprint information for verification, the first terminal is connected with the second terminal.
For example, when the target operation includes a screen unlocking operation, the first terminal establishes a connection with the second terminal when detecting that the first terminal is in a screen locking state. When the target operation comprises a payment operation, an application login operation or an application unlocking operation, when the first terminal enters an interface which needs a user to input fingerprint information for verification, the first terminal is connected with the second terminal.
By implementing the implementation mode, the first terminal can be connected with the second terminal in advance, and the first terminal does not need to be connected with the second terminal when the fact that the distance between the finger of the user and the fingerprint input area of the first terminal is smaller than the preset value is detected, so that the time for decrypting the fingerprint information is favorably shortened, and the efficiency of fingerprint verification is favorably improved.
As an optional implementation manner, when the target operation includes a screen unlocking operation, a specific implementation manner of the first terminal detecting a distance between the user finger and the fingerprint input area of the first terminal may be:
in the screen-locked state, the first terminal detects a distance between a finger of the user and a fingerprint input area of the first terminal.
By implementing the embodiment, the first terminal does not need to detect the distance between the finger of the user and the fingerprint input area of the first terminal at any time, thereby saving the CPU resource of the first terminal.
As an optional implementation manner, when the target operation includes a payment operation, an application login operation, or an application unlocking operation, a specific implementation manner of the first terminal detecting a distance between the user finger and the fingerprint input area of the first terminal may be:
under an interface requiring a user to input fingerprint information for verification, the first terminal detects the distance between a finger of the user and a fingerprint input area of the first terminal.
By implementing the embodiment, the first terminal does not need to detect the distance between the finger of the user and the fingerprint input area of the first terminal at any time, thereby saving the CPU resource of the first terminal.
In the embodiment of the present invention, the name node may be divided into functional units according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, the division of the modules in the embodiment of the present invention is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a user terminal according to an embodiment of the present invention. As shown in fig. 3, the user terminal may include a detection module 301, a determination module 302, and a transmission module 303. Wherein:
a detecting module 301 for detecting a distance between a finger of a user and a fingerprint input area of the user terminal.
The determining module 302 is configured to determine whether the distance is smaller than a preset value.
A sending module 303, configured to send a decryption request carrying the identification information to the second terminal when the determining module 302 determines that the distance is smaller than the preset value.
In the embodiment of the present invention, the identification information is an identification of a user terminal or an identification of a user, the decryption request is used to request the second terminal to decrypt the stored encrypted fingerprint information corresponding to the identification information to obtain decrypted fingerprint information, and the decrypted fingerprint information is used to verify the fingerprint information sent by the user terminal.
As an optional implementation manner, the detection module 301 is specifically configured to:
a distance between a user's finger, which is located above a plane in which a fingerprint input area of the user terminal is located, and the fingerprint input area of the user terminal is detected.
Referring to fig. 4, fig. 4 is a schematic structural diagram of another ue according to an embodiment of the present invention. The ue shown in fig. 4 is optimized by the ue shown in fig. 3. Compared to the user terminal shown in fig. 3, the user terminal shown in fig. 4 may include a receiving module 304, an executing module 305, and a connecting module 306, in addition to all the modules of the user terminal shown in fig. 3. Wherein:
a receiving module 304, configured to receive first fingerprint information input by a user through the fingerprint input area after the sending module 303 sends a decryption request carrying the identification information to the second terminal.
The sending module 303 is further configured to send a verification request including the first fingerprint information to the second terminal.
The receiving module 304 is further configured to receive first response information sent by the second terminal and used for indicating that the first fingerprint information passes the verification, where the first response information is sent by the second terminal when the first fingerprint information is verified to match the decrypted fingerprint information.
In this embodiment of the present invention, after the sending module 303 sends the verification request including the first fingerprint information to the second terminal, the trigger receiving module 304 receives the first response information, which is sent by the second terminal and used for indicating that the verification of the first fingerprint information is passed.
The execution module 305 is configured to execute a target operation, where the target operation includes any one or a combination of multiple kinds of payment operation, screen unlocking operation, application login operation, and application unlocking operation.
In this embodiment of the present invention, after the receiving module 304 receives the first response information sent by the second terminal and used for indicating that the first fingerprint information passes the verification, the executing module 305 is triggered to execute the target operation.
And the connection module 306 is configured to establish a connection with the second terminal when it is detected that the terminal is in the screen-locked state. Or, the connection module 306 is configured to establish a connection with the second terminal when entering an interface that requires the user to input fingerprint information for verification.
As an optional implementation manner, when the target operation includes a screen unlocking operation, the detection module 301 is specifically configured to:
in the screen-locked state, a distance between a user's finger and a fingerprint input area of the user terminal is detected.
When the target operation includes a payment operation, an application login operation, or an application unlocking operation, the detection module 301 is specifically configured to:
and under an interface which requires the user to input fingerprint information for verification, detecting the distance between the finger of the user and a fingerprint input area of the user terminal.
As an optional implementation manner, the sending module 303 is further configured to send, to the second terminal, a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information after the receiving module 304 receives the first response information sent by the second terminal and used for instructing the first fingerprint information to check.
As an optional implementation manner, the sending module 303 is further configured to send, after the sending module 303 sends the decryption request carrying the identification information to the second terminal, a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information if the fingerprint information input by the user through the fingerprint input area is not received within a preset time period.
Referring to fig. 5, fig. 5 is a schematic structural diagram of another ue disclosed in the embodiment of the present invention. As shown in fig. 5, for convenience of illustration, only the portion related to the embodiment of the present invention is shown, and details of the technique are not disclosed, please refer to the method portion of the embodiment of the present invention. The user terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal digital assistant), a POS (Point of Sales), a vehicle-mounted computer, and the like, taking the user terminal as the mobile phone as an example:
fig. 5 is a block diagram illustrating a partial structure of a mobile phone related to a user terminal according to an embodiment of the present invention. Referring to fig. 5, the handset includes: radio Frequency (RF) circuit 510, memory 520, input unit 530, display unit 540, sensor 550, audio circuit 560, wireless fidelity (WiFi) module 570, processor 580, and power supply 590. Those skilled in the art will appreciate that the handset configuration shown in fig. 5 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 5:
RF circuit 510 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, for processing downlink information of a base station after receiving the downlink information to processor 580; in addition, the data for designing uplink is transmitted to the base station. In general, RF circuit 510 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 510 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to global system for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 520 may be used to store software programs and modules, and the processor 580 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 520. The memory 520 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 520 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 530 may include a touch panel 531 and other input devices 532. The touch panel 531, also called a touch screen, can collect touch operations of a user on or near the touch panel 531 (for example, operations of the user on or near the touch panel 531 by using any suitable object or accessory such as a finger or a stylus pen), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 531 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 580, and can receive and execute commands sent by the processor 580. In addition, the touch panel 531 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 530 may include other input devices 532 in addition to the touch panel 531. In particular, other input devices 532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 540 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 540 may include a display panel 541, and optionally, the display panel 541 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 531 may cover the display panel 541, and when the touch panel 531 detects a touch operation on or near the touch panel 531, the touch panel is transmitted to the processor 580 to determine the type of the touch event, and then the processor 580 provides a corresponding visual output on the display panel 541 according to the type of the touch event. Although the touch panel 531 and the display panel 541 are shown as two separate components in fig. 5 to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 531 and the display panel 541 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 550, such as a fingerprint sensor, among other sensors. As for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 560, speaker 561, and microphone 562 may provide an audio interface between a user and a cell phone. The audio circuit 560 may transmit the electrical signal converted from the received audio data to the speaker 561, and convert the electrical signal into a sound signal by the speaker 561 for output; on the other hand, the microphone 562 converts the collected sound signals into electrical signals, which are received by the audio circuit 560 and converted into audio data, which are then processed by the audio data output processor 580, and then passed through the RF circuit 510 to be sent to, for example, another cellular phone, or output to the memory 520 for further processing.
WiFi belongs to short distance wireless transmission technology, and the mobile phone can help the user to send and receive e-mail, browse web pages, access streaming media, etc. through the WiFi module 570, which provides wireless broadband internet access for the user. Although fig. 5 shows the WiFi module 570, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 580 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 520 and calling data stored in the memory 520, thereby performing overall monitoring of the mobile phone. Alternatively, processor 580 may include one or more processing units; preferably, the processor 580 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 580.
The handset also includes a power supply 590 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 580 via a power management system, such that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In the foregoing embodiment, the method flows of the steps may be implemented based on the structure of the terminal device. Wherein, the fingerprint inputted by the user can be collected through the sensor 550 or the touch panel 531, so as to obtain the fingerprint information.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The modules in the user terminal of the embodiment of the invention can be merged, divided and deleted according to actual needs.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The fingerprint information processing method and the user terminal disclosed by the embodiment of the invention are described in detail, a specific example is applied in the text to explain the principle and the implementation of the invention, and the description of the embodiment is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.
Claims (14)
1. A fingerprint information processing method, characterized by comprising:
the method comprises the steps that a first terminal detects the distance between a finger of a user and a fingerprint input area of the first terminal;
the first terminal judges whether the distance is smaller than a preset value;
if the distance is smaller than the preset value, the first terminal sends a decryption request carrying identification information to a second terminal, wherein the identification information is an identification of the first terminal or an identification of a user, the decryption request is used for requesting the second terminal to decrypt the stored encrypted fingerprint information corresponding to the identification information to obtain decrypted fingerprint information, and the decrypted fingerprint information is used for verifying the fingerprint information sent by the first terminal;
after the first terminal sends a decryption request carrying identification information to the second terminal, the method further includes:
the first terminal receives first fingerprint information input by a user through the fingerprint input area;
the first terminal sends a verification request comprising the first fingerprint information to the second terminal;
the first terminal receives first response information which is sent by the second terminal and used for indicating that the first fingerprint information passes the verification, wherein the first response information is sent by the second terminal when the first fingerprint information is verified to be matched with the decrypted fingerprint information;
the first terminal executes target operation, wherein the target operation comprises any one or combination of multiple kinds of payment operation, screen unlocking operation, application login operation and application unlocking operation.
2. The method of claim 1, wherein when the target operation comprises a screen unlock operation, the first terminal detects a distance between a user's finger and a fingerprint input area of the first terminal, and comprises:
in a screen locking state, the first terminal detects the distance between a finger of a user and a fingerprint input area of the first terminal;
when the target operation comprises a payment operation, an application login operation or an application unlocking operation, the first terminal detects the distance between a user finger and a fingerprint input area of the first terminal, and the method comprises the following steps:
and under an interface requiring a user to input fingerprint information for verification, the first terminal detects the distance between the finger of the user and a fingerprint input area of the first terminal.
3. The method according to claim 1, wherein after the first terminal receives first response information sent by the second terminal and indicating that the first fingerprint information is verified, the method further comprises:
and the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
4. The method of claim 1, wherein the first terminal detects a distance between a user's finger and a fingerprint input area of the first terminal, comprising:
the first terminal detects the distance between a user's finger, which is located above the plane of the fingerprint input area of the first terminal, and the fingerprint input area of the first terminal.
5. The method according to any one of claims 1 to 4, wherein after the first terminal sends a decryption request carrying identification information to the second terminal, the method further comprises:
and if the fingerprint information input by the user through the fingerprint input area is not received within a preset time period, the first terminal sends a deleting instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal.
6. The method according to any one of claims 1 to 4, further comprising:
when the first terminal is detected to be in a screen locking state, the first terminal is connected with the second terminal; or,
and when the first terminal enters an interface which needs a user to input fingerprint information for verification, the first terminal is connected with the second terminal.
7. A user terminal, characterized in that the user terminal comprises:
the detection module is used for detecting the distance between a finger of a user and a fingerprint input area of the user terminal;
the judging module is used for judging whether the distance is smaller than a preset value or not;
a sending module, configured to send, when the judging module judges that the distance is smaller than the preset value, a decryption request carrying identification information to a second terminal, where the identification information is an identification of the user terminal or an identification of a user, the decryption request is used to request the second terminal to decrypt encrypted fingerprint information corresponding to the stored identification information, so as to obtain decrypted fingerprint information, and the decrypted fingerprint information is used to verify the fingerprint information sent by the user terminal;
wherein the user terminal further comprises:
the receiving module is used for receiving first fingerprint information input by a user through the fingerprint input area after the sending module sends a decryption request carrying identification information to a second terminal;
the sending module is further configured to send a verification request including the first fingerprint information to the second terminal;
the receiving module is further configured to receive first response information, which is sent by the second terminal and used to indicate that the first fingerprint information passes verification, where the first response information is sent by the second terminal when the first fingerprint information is verified to be matched with the decrypted fingerprint information;
and the execution module is used for executing target operation, and the target operation comprises any one or combination of more than one of payment operation, screen unlocking operation, application login operation and application unlocking operation.
8. The user terminal according to claim 7, wherein when the target operation includes a screen unlock operation, the detection module is specifically configured to:
detecting the distance between a finger of a user and a fingerprint input area of the user terminal in a screen locking state;
when the target operation includes a payment operation, an application login operation, or an application unlocking operation, the detection module is specifically configured to:
and detecting the distance between the finger of the user and the fingerprint input area of the user terminal under an interface which requires the user to input fingerprint information for verification.
9. The user terminal of claim 7,
the sending module is further configured to send, to the second terminal, a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information after the receiving module receives the first response information, which is sent by the second terminal and used to instruct the first fingerprint information to pass the verification.
10. The ue of claim 7, wherein the detecting module is specifically configured to:
detecting a distance between a user's finger, which is located above a plane in which a fingerprint input area of the user terminal is located, and the fingerprint input area of the user terminal.
11. The user terminal according to any of claims 7-10,
the sending module is further configured to send, after the sending module sends the decryption request carrying the identification information to the second terminal, a deletion instruction for instructing the second terminal to delete the decrypted fingerprint information to the second terminal if the fingerprint information input by the user through the fingerprint input area is not received within a preset time period.
12. The user terminal according to any of claims 7-10, wherein the user terminal further comprises:
the connection module is used for establishing connection with the second terminal when the screen locking state is detected; or,
and the connection module is used for establishing connection with the second terminal when entering an interface which needs the user to input fingerprint information for verification.
13. A user terminal, comprising: a processor and a memory, wherein the processor is configured to perform the method of any of claims 1 to 6.
14. A computer-readable storage medium, characterized in that it stores a computer program for instructing terminal device related hardware to perform the method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610367263.5A CN106067002B (en) | 2016-05-27 | 2016-05-27 | A kind of finger print information processing method and user terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610367263.5A CN106067002B (en) | 2016-05-27 | 2016-05-27 | A kind of finger print information processing method and user terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106067002A CN106067002A (en) | 2016-11-02 |
CN106067002B true CN106067002B (en) | 2019-06-11 |
Family
ID=57420859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610367263.5A Active CN106067002B (en) | 2016-05-27 | 2016-05-27 | A kind of finger print information processing method and user terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106067002B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106803068A (en) * | 2016-12-28 | 2017-06-06 | 珠海市魅族科技有限公司 | Fingerprint operating method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203746088U (en) * | 2013-12-30 | 2014-07-30 | 比亚迪股份有限公司 | Fingerprint sensor |
CN104751154A (en) * | 2014-07-25 | 2015-07-01 | 北京智膜科技有限公司 | Fingerprint safe encryption method based on intelligent mobile information device |
CN104992092A (en) * | 2015-06-16 | 2015-10-21 | 小米科技有限责任公司 | Method, device and system for fingerprint information verification |
CN105426087A (en) * | 2015-12-30 | 2016-03-23 | 上海摩软通讯技术有限公司 | Mobile terminal and slide instruction generation method thereof |
CN105488464A (en) * | 2015-11-26 | 2016-04-13 | 小米科技有限责任公司 | Fingerprint identification method and fingerprint identification apparatus |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060093192A1 (en) * | 2004-11-03 | 2006-05-04 | Bechtel J S | Finger guide device |
US20130023234A1 (en) * | 2011-07-19 | 2013-01-24 | Tai Cheung Poon | Systems and methods for providing mislead information to intruders when intrusion occur |
-
2016
- 2016-05-27 CN CN201610367263.5A patent/CN106067002B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN203746088U (en) * | 2013-12-30 | 2014-07-30 | 比亚迪股份有限公司 | Fingerprint sensor |
CN104751154A (en) * | 2014-07-25 | 2015-07-01 | 北京智膜科技有限公司 | Fingerprint safe encryption method based on intelligent mobile information device |
CN104992092A (en) * | 2015-06-16 | 2015-10-21 | 小米科技有限责任公司 | Method, device and system for fingerprint information verification |
CN105488464A (en) * | 2015-11-26 | 2016-04-13 | 小米科技有限责任公司 | Fingerprint identification method and fingerprint identification apparatus |
CN105426087A (en) * | 2015-12-30 | 2016-03-23 | 上海摩软通讯技术有限公司 | Mobile terminal and slide instruction generation method thereof |
Non-Patent Citations (4)
Title |
---|
An Automated Matching Technique for Fingerprint Identification;Dinesh P Mital 等;《1997 First International Conference on Knowledge-Based Intelligent Electronic Systems》;19970523;第150-153页 |
An Efficient Hybrid Fingerprint Matching Algorithm;Priyanka Das 等;《2011 Third National Conference on Computer Vision, Pattern Recognition, Image Processing and Graphics》;20111217;第142-147页 |
指纹识别方法的综述;杨宏林 等;《华东船舶工业学院学报》;20030630;第17卷(第3期);第37-42页 |
更高效的指纹生物特征加密;高莹 等;《密码学报》;20160415;第3卷(第2期);第157-170页 |
Also Published As
Publication number | Publication date |
---|---|
CN106067002A (en) | 2016-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12041165B2 (en) | Key updating method, apparatus, and system | |
US11488234B2 (en) | Method, apparatus, and system for processing order information | |
JP6576555B2 (en) | Service processing method, device and system | |
WO2015101273A1 (en) | Security verification method, and related device and system | |
CN110417543B (en) | Data encryption method, device and storage medium | |
CN107483213B (en) | Security authentication method, related device and system | |
CN104518875B (en) | A kind of method that authentication and account obtain, mobile terminal | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
WO2017084288A1 (en) | Method and device for verifying identity | |
CN108881103B (en) | Network access method and device | |
CN107493378B (en) | Method and device for logging in application program, computer equipment and readable storage medium | |
CN106550361B (en) | Data transmission method, equipment and computer readable storage medium | |
CN107911818B (en) | Method and device for data transmission between mobile terminals and mobile terminal | |
CN108475304A (en) | A kind of method, apparatus and mobile terminal of affiliate application and biological characteristic | |
WO2016192511A1 (en) | Method and apparatus for remotely deleting information | |
CN110213765A (en) | APN information acquisition methods, terminal, server and storage medium | |
CN106599698A (en) | Method and device for picture encryption, and method and device for picture decryption | |
CN106713319B (en) | Remote control method, device and system between terminals and mobile terminal | |
CN106447325B (en) | NFC communication-based processing method and device and mobile terminal | |
WO2017000495A1 (en) | Method and device for adding contacts | |
CN107577933B (en) | Application login method and device, computer equipment and computer readable storage medium | |
CN107092819B (en) | Fingerprint input inspection method and device | |
CN106815510B (en) | Data processing method and terminal | |
CN106067002B (en) | A kind of finger print information processing method and user terminal | |
CN113923005B (en) | Method and system for writing data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |