CN106648125A - Fingerprint keyboard, verification system and method based on fingerprint keyboard - Google Patents
Fingerprint keyboard, verification system and method based on fingerprint keyboard Download PDFInfo
- Publication number
- CN106648125A CN106648125A CN201611085334.9A CN201611085334A CN106648125A CN 106648125 A CN106648125 A CN 106648125A CN 201611085334 A CN201611085334 A CN 201611085334A CN 106648125 A CN106648125 A CN 106648125A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- application program
- user
- keyboard
- finger print
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/0202—Constructional details or processes of manufacture of the input device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Collating Specific Patterns (AREA)
Abstract
The application provides a fingerprint keyboard, a verification system and method based on the fingerprint keyboard. The fingerprint identification function is organically combined with keyboard keys so that user fingerprint information can be collected when users input information. According to the verification system based on the fingerprint keyboard of the application, user input information and fingerprint information of a user are collected through the fingerprint keyboard and a login verification code is generated according to the information and the login verification code is associated with an application program; when starting the application program, it is only required to collect correct input information and fingerprint; if only the verification is passed through, corresponding application program can be started. The application also provides a verification method based on the fingerprint keyboard. By means of the technical scheme of the invention, hacker attacks on user computers or system servers can be effectively prevented; the difficulty of breaking passwords is increased to ensure the security of user passwords; user experience is increased and unnecessary loss of users is reduced.
Description
Technical field
The application is related to field of computer technology, more particularly to a kind of fingerprint keyboard, the checking system based on fingerprint keyboard
And method.
Background technology
With the development of Internet information technique, people for the security of some essential informations of oneself be increasingly difficult to
Ensured, such as, some hackers can using Internet technology from the computer that user is remotely had access to by hacking technique, from
And user's confidential information is obtained, due to hacker for the password cracking of computer or some large scale systems is typically with cruelly
Power cracks mode, is rapidly performed by calculating access password automatically by using computer program, and so as to reach user's calculating is accessed
Machine or system service and then obtain the purpose of user's confidential information, during being cracked due to here, password typically by letter,
The composition of numeral and spcial character, this is the password of higher level.
In the technical scheme of existing solution, generally inform that user needs to regularly replace password, but due to the number of times changed
Excessively, it is easily caused user oneself itself and can also there is password and does not remember, or reason causes password urgency because account is too many etc.
The reason such as random, is not enough to ensure the security of password.
Therefore need at this stage to provide a kind of brand-new technical scheme, without the need for user password is regularly replaced, and can also improve
The technical scheme of cipher safety.
It should be noted that the introduction of technical background is intended merely to above the convenient technical scheme to the application carry out it is clear,
Complete explanation, and facilitate the understanding of those skilled in the art and illustrate.Can not be merely because these schemes be the application's
Background section is set forth and thinks that above-mentioned technical proposal is known to those skilled in the art.
The content of the invention
The purpose of the embodiment of the present application is to provide an a kind of fingerprint keyboard, the checking system based on fingerprint keyboard and side
Method, by the password of user input and fingerprint will be combined into realization and generate application program or calculating using fingerprint keyboard
The login authentication code of machine itself, when using every time, needs collection login authentication code and finger print information simultaneously to complete to step on
Record checking.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method that the embodiment of the present application is provided is realized in
's:
A kind of fingerprint keyboard, including:Fingerprint identification device, wherein fingerprint identification device are placed in the button of keyboard, are used for
User gathers the finger print information of user when key-press input is carried out.
Further, the fingerprint keyboard also includes a switch module, for controlling the unlatching of the fingerprint identification device
Close.
The embodiment of the present application additionally provides a kind of checking system based on fingerprint keyboard, including:
Fingerprint keyboard, for obtaining the input information of user, while obtaining the finger print information of user;
Setup module, the input information and the finger print information for being obtained according to the fingerprint keyboard is set to answer
With the login authentication code of program, and application program and the login authentication code are formed into relation mapping table;
Memory module, for preserving the relation mapping table;
Authentication module, when application program is started, by the relation mapping table of memory module preservation to the fingerprint keyboard
The input information and finger print information of acquisition is verified;
Starting module, according to the result of authentication module the application program is started.
Further, the application program includes:Webpage, APP.
Further, the setup module, including:
Identifying code unit, for generating the login authentication code of application program according to the input information of user and finger print information;
Mapping table unit, for forming relation mapping table with corresponding login authentication code information according to application information.
The embodiment of the present application additionally provides a kind of verification method based on fingerprint keyboard, including:
S1, the identifying code that application program login is set;
Login authentication is carried out when S2, startup application program, startup application program is verified.
Further, the S1 arranges the identifying code that application program is logged in, and specifically includes:
S11, by fingerprint keyboard obtain user input information while gather user finger print information;
S12, by the input information and finger print information carry out it is corresponding generation login authentication code;
S13, the login authentication code and application program are carried out into corresponding production Methods mapping table.
Further, the fingerprint letter of user is gathered while the S11 obtains the input information of user by fingerprint keyboard
Breath, specifically includes:
S111, judge whether fingerprint identification device is opened, be then execution step S112, otherwise execution step S113;
Gather finger print information and be associated while S112, input character;
Finger print information is not gathered while S113, input character.
Further, the login authentication code and application program are carried out corresponding production Methods mapping table by the S13, specifically
Including:
S131, the login authentication code and application program are generated into incidence relation;
S132, by the incidence relation travel relationships mapping table of all login authentication codes and application program.
Further, login authentication is carried out when the S2 starts application program, is specifically included:
S21, startup application program, gather the input information of user and gather the finger print information of user;
S22, the corresponding login authentication code of the application program is searched from relation mapping table in table;
S23, the input information and finger print information and identifying code of collection are compared, compare successfully then to start and apply journey
Sequence.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method provided by the present invention, by being input into
Character information and finger print information be associated production as login authentication code during application program launching, while stepping on all of
The corresponding relation relations of production mapping table of record identifying code and application program, then when will work as user and be again started up application program, then lead to
The character for crossing collection user input and the user fingerprints information for collecting, then contrasted by the lookup of relation mapping table, carry out
Judge whether to start application program, by the technical program, can effectively prevent subscriber computer or system server from suffering
Hacker's amounts to, and due to when carrying out calculating access password, the finger print information for gathering user being needed, so as to the password for being breaks
Peace is built in the difficulty hardly possible of solution, to guarantee the tight security of user cipher, it is possible to increase the Experience Degree of user, reducing user need not
The loss wanted.
With reference to explanation hereinafter and accompanying drawing, the particular implementation of the application is disclose in detail, specify the original of the application
Reason can be in adopted mode.It should be understood that presently filed embodiment is not so limited in scope.In appended power
In the range of the spirit and terms that profit is required, presently filed embodiment includes many changes, modifications and equivalent.
The feature for describing for a kind of embodiment and/or illustrating can be in same or similar mode one or more
It is combined with the feature in other embodiment used in individual other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when using herein, but and
It is not excluded for the presence of one or more further features, one integral piece, step or component or additional.
Description of the drawings
Included accompanying drawing is used for providing being further understood from the embodiment of the present application, which constitutes of specification
Point, for illustrating presently filed embodiment, and come together to explain the principle of the application with word description.It should be evident that under
Accompanying drawing in the description of face is only some embodiments of the present application, for those of ordinary skill in the art, is not paying wound
On the premise of the property made is laborious, can be with according to these other accompanying drawings of accompanying drawings acquisition.In the accompanying drawings:
A kind of checking system modular structure schematic diagram based on fingerprint keyboard that Fig. 1 is provided for the embodiment of the present application;
A kind of verification method schematic flow sheet based on fingerprint keyboard that Fig. 2 is provided for the embodiment of the present application;
The method flow schematic diagram of the setting application program login authentication code that Fig. 3 is provided for the embodiment of the present application;
The method flow schematic diagram of the collection user fingerprints information that Fig. 4 is provided for the embodiment of the present application;
The method flow by login authentication code and application program production Methods mapping table that Fig. 5 is provided for the embodiment of the present application
Schematic diagram;
Fig. 6 carries out the method flow schematic diagram of login authentication for the startup application program that the embodiment of the present application is provided.
Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with the application reality
The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described enforcement
Example is only some embodiments of the present application, rather than the embodiment of whole.Based on the embodiment in the application, this area is common
All other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection
Scope.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method that the embodiment of the present application is provided is realized in
's:
A kind of fingerprint keyboard, including:Fingerprint identification device, wherein fingerprint identification device are placed in the button of keyboard, are used for
User gathers the finger print information of user when key-press input is carried out.
In the embodiment of the present application, among fingerprint identification device is installed as keyboard, wherein, for the symbol commonly used
Button can be provided with fingerprint identification device, therefore the other device of multiple fingerprints, the application reality are generally had in fingerprint keyboard
In applying example, for convenience user avoids in use by mistake collection fingerprint, therefore is also provided with one to the fingerprint keyboard and opens
Module is closed, by the switch module, user can be turned on or off fingerprint recognition, on the one hand can reduce maloperation, another
Aspect, then for the collection and encryption of fingerprint improve security.
Refering to a kind of checking system modular structure schematic diagram based on fingerprint keyboard that Fig. 1 is provided for the embodiment of the present application,
As illustrated, having specifically included in the checking system:Fingerprint keyboard 1, setup module 2, memory module 3, authentication module 4 and
Starting module 5, is provided with module 2 and is connected with fingerprint keyboard 1 and memory module 3 respectively, authentication module 4 respectively with fingerprint keyboard
1st, memory module 3 and starting module 5 connect.Wherein, user is being arranged for application program such as by fingerprint keyboard 1:Webpage,
APP, client and computer system from tape program etc. arrange login authentication code when, then first by fingerprint keyboard 1 input step on
Record encrypted message, while during input, can be by switch open fingerprint identification device in user input login password
During information, the finger print information of user is gathered, or close fingerprint identification device, cancel the finger print information of collection user, Yi Zhongshi
In the case of applying example, user can be directed to each character of the login password of input and gather a fingerprint or do not gather and refer to
Line, for login password, user can gather multiple finger print informations, wherein, finger print information is one with login password character information
One corresponding relation, after login password and finger print information has been gathered, then the login password information that will be gathered by setup module 2
The login authentication code of application program that needs to carry out safe encryption is set to finger print information, and generates login authentication code and application
The relation mapping table of program, is then stored in the mapping table in memory module 3, after completing the setting of login authentication code,
When starting application program, then the login password and finger print information of user is gathered by fingerprint keyboard 1, then by authentication module 4,
The relation mapping table that the login password that fingerprint keyboard 1 is gathered and finger print information and memory module 3 are preserved carries out checking startup should
With the login authentication code of program, then corresponding application program is started by starting module 5 after being proved to be successful.
In the embodiment of the present application, when login password and finger print information that setup module 2 receives the input of fingerprint keyboard 1 are,
Carry out integrating the login authentication for generating application program according to the input information and finger print information of 1 user according to identifying code unit first
Code;Then by mapping table unit 22 according to login authentication code and the relation mapping table of relation stroke one of application program.
Refering to a kind of verification method schematic flow sheet based on fingerprint keyboard that Fig. 2 the embodiment of the present application is provided, as schemed institute
Show, the verification method includes:
S1, the identifying code that application program login is set;
Login authentication is carried out when S2, startup application program, startup application program is verified.
In the embodiment of the present application, before the checking that user realizes to logging program by fingerprint keyboard, it is necessary first to set
The identifying code of logging program is put, the method flow of the setting application program login authentication code provided refering to Fig. 3 the embodiment of the present application
Schematic diagram, as illustrated, step S1 arranges the identifying code that application program is logged in, specifically includes:
S11, by fingerprint keyboard obtain user input information while gather user finger print information;
In the embodiment of the present application, user in the login password that user input is gathered by fingerprint keyboard and during finger print information,
The method flow schematic diagram of the collection user fingerprints information provided referring particularly to such as Fig. 4 the embodiment of the present application, as illustrated, in tool
The gatherer process of body includes:
S111, judge whether fingerprint identification device is opened, be then execution step S112, otherwise execution step S113;
Gather finger print information and be associated while S112, input character;
Finger print information is not gathered while S113, input character.
In the case of the embodiment of the present application, user can be directed to the kinds of characters of the login password of input can be by opening
The fingerprint identification device of fingerprint keyboard, is acquired the finger print information of respective symbols, wherein, user can be directed to different logins
Code characters arrange same finger print information, it is also possible to different finger print informations are arranged for each different primary and secondary, by referring to
The switch of line identifying device, can control whether that the code characters to being input into gather corresponding finger print information.For example, setting is close
Code is 12345, corresponding fingerprint, can be to obtain any fingerprint of user when obtaining 1 simultaneously, or is obtained simultaneously when obtaining 2
The particular fingerprint of user;Can also be to be required for fingerprint for each numeral, or fingerprint authentication is provided at random.
S12, by the input information and finger print information carry out it is corresponding generation login authentication code;
S13, the login authentication code and application program are carried out into corresponding production Methods mapping table.
In the embodiment of the present application, after login authentication code is generated according to login password and finger print information, then need to step on
Record identifying code and application program are associated, and give birth to login authentication code and application program refering to what Fig. 5 the embodiment of the present application was provided
Into the method flow schematic diagram of relation mapping table, as illustrated, the login authentication code and application program are carried out in step S13
Correspondence production Methods mapping table, specifically includes:
S131, the login authentication code and application program are generated into incidence relation;
S132, by the incidence relation travel relationships mapping table of all login authentication codes and application program.
Under a kind of scene of the embodiment of the present application, started for safety because user generally has various application programs
For the sake of, different application programs can be directed to different login authentication codes are set, these login authentication codes are managed for convenience
Reason, then form these login authentication codes and application program after incidence relation, by all relevant login authentication codes
Stored with application program production Methods mapping table.
The method flow schematic diagram of the acute login authentication of startup application program provided refering to such as Fig. 6 the embodiment of the present application,
Login authentication is carried out when as shown in the figure step S2 starts application program, is specifically included:
S21, startup application program, gather the input information of user and gather the finger print information of user;
S22, the corresponding login authentication code of the application program is searched from relation mapping table in table;
S23, the input information and finger print information and identifying code of collection are compared, compare successfully then to start and apply journey
Sequence.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method provided by the present invention, by being input into
Character information and finger print information be associated production as login authentication code during application program launching, while stepping on all of
The corresponding relation relations of production mapping table of record identifying code and application program, then when will work as user and be again started up application program, then lead to
The character for crossing collection user input and the user fingerprints information for collecting, then contrasted by the lookup of relation mapping table, carry out
Judge whether to start application program, by the technical program, can effectively prevent subscriber computer or system server from suffering
Hacker's amounts to, and due to when carrying out calculating access password, the finger print information for gathering user being needed, so as to the password for being breaks
Peace is built in the difficulty hardly possible of solution, to guarantee the tight security of user cipher, it is possible to increase the Experience Degree of user, reducing user need not
The loss wanted.
Description to the various embodiments of the application above is supplied to those skilled in the art with the purpose for describing.It is not
Be intended to exhaustion or be not intended to limit the invention to single disclosed embodiment.As described above, the application's is various
Substitute and change will be apparent for above-mentioned technology one of ordinary skill in the art.Therefore, although specifically beg for
The embodiment of some alternatives has been discussed, but other embodiment will be apparent, or those skilled in the art are relative
Easily draw.The application is intended to be included in this all replacement of the invention for having discussed, modification and change, and falls
Other embodiment in the spirit and scope of above-mentioned application.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment
Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for system reality
For applying example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method
Part explanation.
The application can be used in numerous general or special purpose computing system environments or configuration.For example:Personal computer, clothes
Business device computer, handheld device or portable set, laptop device, multicomputer system, based on the system of microprocessor, put
Top box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, including any of the above system or equipment
DCE etc..
The application can be described in the general context of computer executable instructions, such as program
Module.Usually, program module includes execution particular task or realizes routine, program, object, the group of particular abstract data type
Part, data structure etc..The application can also be in a distributed computing environment put into practice, in these DCEs, by
The remote processing devices connected by communication network are performing task.In a distributed computing environment, program module can be with
In local and remote computer-readable storage medium including including storage device.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application have it is many deformation and
Change is without deviating from spirit herein, it is desirable to which appended claim includes these deformations and changes without deviating from the application's
Spirit.
Claims (10)
1. a kind of fingerprint keyboard, it is characterised in that the fingerprint keyboard includes:
Fingerprint identification device, the fingerprint identification device is placed in the button of the keyboard, and for user key-press input is being carried out
When gather user finger print information.
2. fingerprint keyboard according to claim 1, it is characterised in that the fingerprint keyboard also includes a switch module, uses
In the open and close for controlling the fingerprint identification device.
3. a kind of checking system based on fingerprint keyboard, it is characterised in that the system includes:
Fingerprint keyboard, for obtaining the input information of user, while obtaining the finger print information of user;
Setup module, the input information and the finger print information for being obtained according to the fingerprint keyboard is set to apply journey
The login authentication code of sequence, and application program is formed into relation mapping table with the login authentication code;
Memory module, for preserving the relation mapping table;
Authentication module, when application program is started, the relation mapping table preserved by memory module is obtained to the fingerprint keyboard
Input information and finger print information verified;
Starting module, according to the result of authentication module the application program is started.
4. the checking system based on fingerprint keyboard according to claim 3, it is characterised in that the application program includes:
Webpage, APP.
5. the checking system based on fingerprint keyboard according to claim 3, it is characterised in that the setup module, including:
Identifying code unit, for generating the login authentication code of application program according to the input information of user and finger print information;
Mapping table unit, for forming relation mapping table with corresponding login authentication code information according to application information.
6. a kind of verification method based on fingerprint keyboard, it is characterised in that the verification method includes:
S1, the identifying code that application program login is set;
Login authentication is carried out when S2, startup application program, startup application program is verified.
7. the verification method based on fingerprint keyboard according to claim 6, it is characterised in that the S1 arranges application program
The identifying code of login, specifically includes:
S11, by fingerprint keyboard obtain user input information while gather user finger print information;
S12, by the input information and finger print information carry out it is corresponding generation login authentication code;
S13, the login authentication code and application program are carried out into corresponding production Methods mapping table.
8. the verification method of fingerprint keyboard is based on according to claim 7, it is characterised in that the S11 passes through fingerprint keyboard
The finger print information of user is gathered while obtaining the input information of user, is specifically included:
S111, judge whether fingerprint identification device is opened, be then execution step S112, otherwise execution step S113;
Gather finger print information and be associated while S112, input character;
Finger print information is not gathered while S113, input character.
9. the verification method based on fingerprint keyboard according to claim 7, it is characterised in that the S13 is by the login
Identifying code carries out corresponding production Methods mapping table with application program, specifically includes:
S131, the login authentication code and application program are generated into incidence relation;
S132, by the incidence relation travel relationships mapping table of all login authentication codes and application program.
10. the verification method based on fingerprint keyboard according to claim 6, it is characterised in that the S2 starts and applies journey
Login authentication is carried out during sequence, is specifically included:
S21, startup application program, gather the input information of user and gather the finger print information of user;
S22, the corresponding login authentication code of the application program is searched from relation mapping table in table;
S23, the input information and finger print information and identifying code of collection are compared, compare and successfully then start application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085334.9A CN106648125A (en) | 2016-11-30 | 2016-11-30 | Fingerprint keyboard, verification system and method based on fingerprint keyboard |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611085334.9A CN106648125A (en) | 2016-11-30 | 2016-11-30 | Fingerprint keyboard, verification system and method based on fingerprint keyboard |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106648125A true CN106648125A (en) | 2017-05-10 |
Family
ID=58813723
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611085334.9A Pending CN106648125A (en) | 2016-11-30 | 2016-11-30 | Fingerprint keyboard, verification system and method based on fingerprint keyboard |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106648125A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107861632A (en) * | 2017-11-23 | 2018-03-30 | 中国电子科技集团公司第二十八研究所 | A kind of networking with backlight function logs in fingerprint recognition key board unit |
CN108073835A (en) * | 2018-01-03 | 2018-05-25 | 北京知道创宇信息技术有限公司 | Password mapping method, system and keyboard |
CN110035247A (en) * | 2019-04-04 | 2019-07-19 | 旭辉卓越健康信息科技有限公司 | A kind of video and audio recording system of AI medical treatment all-in-one machine |
CN110363898A (en) * | 2019-07-28 | 2019-10-22 | 刘兴丹 | A kind of device of fingerprint recognition by pressing keys, method |
CN110443081A (en) * | 2018-05-04 | 2019-11-12 | 拉萨经济技术开发区凯航科技开发有限公司 | It is a kind of for protecting the keyboard system of input message safety |
CN111600994A (en) * | 2020-05-14 | 2020-08-28 | Oppo(重庆)智能科技有限公司 | Shortcut operation method and device and computer readable storage medium |
CN111985913A (en) * | 2019-05-24 | 2020-11-24 | 上海箩箕技术有限公司 | Card-free transaction method and device and server |
CN112581656A (en) * | 2020-11-27 | 2021-03-30 | 山东浪潮通软信息科技有限公司 | Identity verification method, mobile phone and intelligent door lock |
CN114465818A (en) * | 2022-03-23 | 2022-05-10 | 平安普惠企业管理有限公司 | APP fingerprint login method based on artificial intelligence and related equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1263324A (en) * | 2000-03-20 | 2000-08-16 | 后健慈 | Fingerprint identification keyboard device and its identification method |
EP2439613A1 (en) * | 2010-10-05 | 2012-04-11 | Research In Motion Limited | Keyboard having key with integral biometric input device |
CN104951159A (en) * | 2015-06-12 | 2015-09-30 | 小米科技有限责任公司 | Touch key and fingerprint identification method |
CN105989259A (en) * | 2015-03-06 | 2016-10-05 | 阿里巴巴集团控股有限公司 | User identity authentication method and device as well as system |
-
2016
- 2016-11-30 CN CN201611085334.9A patent/CN106648125A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1263324A (en) * | 2000-03-20 | 2000-08-16 | 后健慈 | Fingerprint identification keyboard device and its identification method |
EP2439613A1 (en) * | 2010-10-05 | 2012-04-11 | Research In Motion Limited | Keyboard having key with integral biometric input device |
CN105989259A (en) * | 2015-03-06 | 2016-10-05 | 阿里巴巴集团控股有限公司 | User identity authentication method and device as well as system |
CN104951159A (en) * | 2015-06-12 | 2015-09-30 | 小米科技有限责任公司 | Touch key and fingerprint identification method |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107861632A (en) * | 2017-11-23 | 2018-03-30 | 中国电子科技集团公司第二十八研究所 | A kind of networking with backlight function logs in fingerprint recognition key board unit |
CN108073835A (en) * | 2018-01-03 | 2018-05-25 | 北京知道创宇信息技术有限公司 | Password mapping method, system and keyboard |
CN108073835B (en) * | 2018-01-03 | 2020-11-06 | 北京知道创宇信息技术股份有限公司 | Password mapping method, system and keyboard |
CN110443081A (en) * | 2018-05-04 | 2019-11-12 | 拉萨经济技术开发区凯航科技开发有限公司 | It is a kind of for protecting the keyboard system of input message safety |
CN110035247A (en) * | 2019-04-04 | 2019-07-19 | 旭辉卓越健康信息科技有限公司 | A kind of video and audio recording system of AI medical treatment all-in-one machine |
CN111985913A (en) * | 2019-05-24 | 2020-11-24 | 上海箩箕技术有限公司 | Card-free transaction method and device and server |
CN110363898A (en) * | 2019-07-28 | 2019-10-22 | 刘兴丹 | A kind of device of fingerprint recognition by pressing keys, method |
CN111600994A (en) * | 2020-05-14 | 2020-08-28 | Oppo(重庆)智能科技有限公司 | Shortcut operation method and device and computer readable storage medium |
CN111600994B (en) * | 2020-05-14 | 2022-05-31 | Oppo(重庆)智能科技有限公司 | Shortcut operation method and device and computer readable storage medium |
CN112581656A (en) * | 2020-11-27 | 2021-03-30 | 山东浪潮通软信息科技有限公司 | Identity verification method, mobile phone and intelligent door lock |
CN114465818A (en) * | 2022-03-23 | 2022-05-10 | 平安普惠企业管理有限公司 | APP fingerprint login method based on artificial intelligence and related equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106648125A (en) | Fingerprint keyboard, verification system and method based on fingerprint keyboard | |
US20200295940A1 (en) | System and method for device registration and authentication | |
US10516698B2 (en) | Honeypot computing services that include simulated computing resources | |
CN108989346B (en) | Third-party valid identity escrow agile authentication access method based on account hiding | |
Bojinov et al. | Kamouflage: Loss-resistant password management | |
US9473493B2 (en) | Secure data communication | |
Andress | Foundations of information security: a straightforward introduction | |
Scarfone et al. | Guide to enterprise password management (draft) | |
CN106453205B (en) | identity verification method and device | |
CN106384027A (en) | User identity recognition system and recognition method thereof | |
CN107809438A (en) | A kind of network authentication method, system and its user agent device used | |
CN107871081A (en) | A kind of computer information safe system | |
CN106161710B (en) | A kind of user account safety management system based on smart phone | |
CN103944877A (en) | Method and system for safely logging on bank website based on two-dimension code | |
CN106850503A (en) | One kind is exempted to log in identity identifying method and device | |
CN107409129A (en) | Use the mandate in accesses control list and the distributed system of group | |
CN105005721A (en) | Computer authorization starting control system and method based on computer starting key | |
CN104468486B (en) | Information processing method, system and electronic equipment | |
Furnell | Securing information and communications systems: Principles, technologies, and applications | |
US20190108328A1 (en) | Method and system for secure password storage | |
JP2010061329A (en) | Authentication processing method and authentication processing system | |
Begou et al. | Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt | |
Shay et al. | Password policy simulation and analysis | |
JP2016062457A (en) | Authentication method and authentication apparatus | |
CN106529216B (en) | Software authorization system and software authorization method based on public storage platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170510 |