CN106648125A - Fingerprint keyboard, verification system and method based on fingerprint keyboard - Google Patents

Fingerprint keyboard, verification system and method based on fingerprint keyboard Download PDF

Info

Publication number
CN106648125A
CN106648125A CN201611085334.9A CN201611085334A CN106648125A CN 106648125 A CN106648125 A CN 106648125A CN 201611085334 A CN201611085334 A CN 201611085334A CN 106648125 A CN106648125 A CN 106648125A
Authority
CN
China
Prior art keywords
fingerprint
application program
user
keyboard
finger print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611085334.9A
Other languages
Chinese (zh)
Inventor
王二慢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201611085334.9A priority Critical patent/CN106648125A/en
Publication of CN106648125A publication Critical patent/CN106648125A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/0202Constructional details or processes of manufacture of the input device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The application provides a fingerprint keyboard, a verification system and method based on the fingerprint keyboard. The fingerprint identification function is organically combined with keyboard keys so that user fingerprint information can be collected when users input information. According to the verification system based on the fingerprint keyboard of the application, user input information and fingerprint information of a user are collected through the fingerprint keyboard and a login verification code is generated according to the information and the login verification code is associated with an application program; when starting the application program, it is only required to collect correct input information and fingerprint; if only the verification is passed through, corresponding application program can be started. The application also provides a verification method based on the fingerprint keyboard. By means of the technical scheme of the invention, hacker attacks on user computers or system servers can be effectively prevented; the difficulty of breaking passwords is increased to ensure the security of user passwords; user experience is increased and unnecessary loss of users is reduced.

Description

A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and method
Technical field
The application is related to field of computer technology, more particularly to a kind of fingerprint keyboard, the checking system based on fingerprint keyboard And method.
Background technology
With the development of Internet information technique, people for the security of some essential informations of oneself be increasingly difficult to Ensured, such as, some hackers can using Internet technology from the computer that user is remotely had access to by hacking technique, from And user's confidential information is obtained, due to hacker for the password cracking of computer or some large scale systems is typically with cruelly Power cracks mode, is rapidly performed by calculating access password automatically by using computer program, and so as to reach user's calculating is accessed Machine or system service and then obtain the purpose of user's confidential information, during being cracked due to here, password typically by letter, The composition of numeral and spcial character, this is the password of higher level.
In the technical scheme of existing solution, generally inform that user needs to regularly replace password, but due to the number of times changed Excessively, it is easily caused user oneself itself and can also there is password and does not remember, or reason causes password urgency because account is too many etc. The reason such as random, is not enough to ensure the security of password.
Therefore need at this stage to provide a kind of brand-new technical scheme, without the need for user password is regularly replaced, and can also improve The technical scheme of cipher safety.
It should be noted that the introduction of technical background is intended merely to above the convenient technical scheme to the application carry out it is clear, Complete explanation, and facilitate the understanding of those skilled in the art and illustrate.Can not be merely because these schemes be the application's Background section is set forth and thinks that above-mentioned technical proposal is known to those skilled in the art.
The content of the invention
The purpose of the embodiment of the present application is to provide an a kind of fingerprint keyboard, the checking system based on fingerprint keyboard and side Method, by the password of user input and fingerprint will be combined into realization and generate application program or calculating using fingerprint keyboard The login authentication code of machine itself, when using every time, needs collection login authentication code and finger print information simultaneously to complete to step on Record checking.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method that the embodiment of the present application is provided is realized in 's:
A kind of fingerprint keyboard, including:Fingerprint identification device, wherein fingerprint identification device are placed in the button of keyboard, are used for User gathers the finger print information of user when key-press input is carried out.
Further, the fingerprint keyboard also includes a switch module, for controlling the unlatching of the fingerprint identification device Close.
The embodiment of the present application additionally provides a kind of checking system based on fingerprint keyboard, including:
Fingerprint keyboard, for obtaining the input information of user, while obtaining the finger print information of user;
Setup module, the input information and the finger print information for being obtained according to the fingerprint keyboard is set to answer With the login authentication code of program, and application program and the login authentication code are formed into relation mapping table;
Memory module, for preserving the relation mapping table;
Authentication module, when application program is started, by the relation mapping table of memory module preservation to the fingerprint keyboard The input information and finger print information of acquisition is verified;
Starting module, according to the result of authentication module the application program is started.
Further, the application program includes:Webpage, APP.
Further, the setup module, including:
Identifying code unit, for generating the login authentication code of application program according to the input information of user and finger print information;
Mapping table unit, for forming relation mapping table with corresponding login authentication code information according to application information.
The embodiment of the present application additionally provides a kind of verification method based on fingerprint keyboard, including:
S1, the identifying code that application program login is set;
Login authentication is carried out when S2, startup application program, startup application program is verified.
Further, the S1 arranges the identifying code that application program is logged in, and specifically includes:
S11, by fingerprint keyboard obtain user input information while gather user finger print information;
S12, by the input information and finger print information carry out it is corresponding generation login authentication code;
S13, the login authentication code and application program are carried out into corresponding production Methods mapping table.
Further, the fingerprint letter of user is gathered while the S11 obtains the input information of user by fingerprint keyboard Breath, specifically includes:
S111, judge whether fingerprint identification device is opened, be then execution step S112, otherwise execution step S113;
Gather finger print information and be associated while S112, input character;
Finger print information is not gathered while S113, input character.
Further, the login authentication code and application program are carried out corresponding production Methods mapping table by the S13, specifically Including:
S131, the login authentication code and application program are generated into incidence relation;
S132, by the incidence relation travel relationships mapping table of all login authentication codes and application program.
Further, login authentication is carried out when the S2 starts application program, is specifically included:
S21, startup application program, gather the input information of user and gather the finger print information of user;
S22, the corresponding login authentication code of the application program is searched from relation mapping table in table;
S23, the input information and finger print information and identifying code of collection are compared, compare successfully then to start and apply journey Sequence.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method provided by the present invention, by being input into Character information and finger print information be associated production as login authentication code during application program launching, while stepping on all of The corresponding relation relations of production mapping table of record identifying code and application program, then when will work as user and be again started up application program, then lead to The character for crossing collection user input and the user fingerprints information for collecting, then contrasted by the lookup of relation mapping table, carry out Judge whether to start application program, by the technical program, can effectively prevent subscriber computer or system server from suffering Hacker's amounts to, and due to when carrying out calculating access password, the finger print information for gathering user being needed, so as to the password for being breaks Peace is built in the difficulty hardly possible of solution, to guarantee the tight security of user cipher, it is possible to increase the Experience Degree of user, reducing user need not The loss wanted.
With reference to explanation hereinafter and accompanying drawing, the particular implementation of the application is disclose in detail, specify the original of the application Reason can be in adopted mode.It should be understood that presently filed embodiment is not so limited in scope.In appended power In the range of the spirit and terms that profit is required, presently filed embodiment includes many changes, modifications and equivalent.
The feature for describing for a kind of embodiment and/or illustrating can be in same or similar mode one or more It is combined with the feature in other embodiment used in individual other embodiment, or substitute the feature in other embodiment.
It should be emphasized that term "comprises/comprising" refers to the presence of feature, one integral piece, step or component when using herein, but and It is not excluded for the presence of one or more further features, one integral piece, step or component or additional.
Description of the drawings
Included accompanying drawing is used for providing being further understood from the embodiment of the present application, which constitutes of specification Point, for illustrating presently filed embodiment, and come together to explain the principle of the application with word description.It should be evident that under Accompanying drawing in the description of face is only some embodiments of the present application, for those of ordinary skill in the art, is not paying wound On the premise of the property made is laborious, can be with according to these other accompanying drawings of accompanying drawings acquisition.In the accompanying drawings:
A kind of checking system modular structure schematic diagram based on fingerprint keyboard that Fig. 1 is provided for the embodiment of the present application;
A kind of verification method schematic flow sheet based on fingerprint keyboard that Fig. 2 is provided for the embodiment of the present application;
The method flow schematic diagram of the setting application program login authentication code that Fig. 3 is provided for the embodiment of the present application;
The method flow schematic diagram of the collection user fingerprints information that Fig. 4 is provided for the embodiment of the present application;
The method flow by login authentication code and application program production Methods mapping table that Fig. 5 is provided for the embodiment of the present application Schematic diagram;
Fig. 6 carries out the method flow schematic diagram of login authentication for the startup application program that the embodiment of the present application is provided.
Specific embodiment
In order that those skilled in the art more fully understand the technical scheme in the application, below in conjunction with the application reality The accompanying drawing in example is applied, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described enforcement Example is only some embodiments of the present application, rather than the embodiment of whole.Based on the embodiment in the application, this area is common All other embodiment that technical staff is obtained under the premise of creative work is not made, should all belong to the application protection Scope.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method that the embodiment of the present application is provided is realized in 's:
A kind of fingerprint keyboard, including:Fingerprint identification device, wherein fingerprint identification device are placed in the button of keyboard, are used for User gathers the finger print information of user when key-press input is carried out.
In the embodiment of the present application, among fingerprint identification device is installed as keyboard, wherein, for the symbol commonly used Button can be provided with fingerprint identification device, therefore the other device of multiple fingerprints, the application reality are generally had in fingerprint keyboard In applying example, for convenience user avoids in use by mistake collection fingerprint, therefore is also provided with one to the fingerprint keyboard and opens Module is closed, by the switch module, user can be turned on or off fingerprint recognition, on the one hand can reduce maloperation, another Aspect, then for the collection and encryption of fingerprint improve security.
Refering to a kind of checking system modular structure schematic diagram based on fingerprint keyboard that Fig. 1 is provided for the embodiment of the present application, As illustrated, having specifically included in the checking system:Fingerprint keyboard 1, setup module 2, memory module 3, authentication module 4 and Starting module 5, is provided with module 2 and is connected with fingerprint keyboard 1 and memory module 3 respectively, authentication module 4 respectively with fingerprint keyboard 1st, memory module 3 and starting module 5 connect.Wherein, user is being arranged for application program such as by fingerprint keyboard 1:Webpage, APP, client and computer system from tape program etc. arrange login authentication code when, then first by fingerprint keyboard 1 input step on Record encrypted message, while during input, can be by switch open fingerprint identification device in user input login password During information, the finger print information of user is gathered, or close fingerprint identification device, cancel the finger print information of collection user, Yi Zhongshi In the case of applying example, user can be directed to each character of the login password of input and gather a fingerprint or do not gather and refer to Line, for login password, user can gather multiple finger print informations, wherein, finger print information is one with login password character information One corresponding relation, after login password and finger print information has been gathered, then the login password information that will be gathered by setup module 2 The login authentication code of application program that needs to carry out safe encryption is set to finger print information, and generates login authentication code and application The relation mapping table of program, is then stored in the mapping table in memory module 3, after completing the setting of login authentication code, When starting application program, then the login password and finger print information of user is gathered by fingerprint keyboard 1, then by authentication module 4, The relation mapping table that the login password that fingerprint keyboard 1 is gathered and finger print information and memory module 3 are preserved carries out checking startup should With the login authentication code of program, then corresponding application program is started by starting module 5 after being proved to be successful.
In the embodiment of the present application, when login password and finger print information that setup module 2 receives the input of fingerprint keyboard 1 are, Carry out integrating the login authentication for generating application program according to the input information and finger print information of 1 user according to identifying code unit first Code;Then by mapping table unit 22 according to login authentication code and the relation mapping table of relation stroke one of application program.
Refering to a kind of verification method schematic flow sheet based on fingerprint keyboard that Fig. 2 the embodiment of the present application is provided, as schemed institute Show, the verification method includes:
S1, the identifying code that application program login is set;
Login authentication is carried out when S2, startup application program, startup application program is verified.
In the embodiment of the present application, before the checking that user realizes to logging program by fingerprint keyboard, it is necessary first to set The identifying code of logging program is put, the method flow of the setting application program login authentication code provided refering to Fig. 3 the embodiment of the present application Schematic diagram, as illustrated, step S1 arranges the identifying code that application program is logged in, specifically includes:
S11, by fingerprint keyboard obtain user input information while gather user finger print information;
In the embodiment of the present application, user in the login password that user input is gathered by fingerprint keyboard and during finger print information, The method flow schematic diagram of the collection user fingerprints information provided referring particularly to such as Fig. 4 the embodiment of the present application, as illustrated, in tool The gatherer process of body includes:
S111, judge whether fingerprint identification device is opened, be then execution step S112, otherwise execution step S113;
Gather finger print information and be associated while S112, input character;
Finger print information is not gathered while S113, input character.
In the case of the embodiment of the present application, user can be directed to the kinds of characters of the login password of input can be by opening The fingerprint identification device of fingerprint keyboard, is acquired the finger print information of respective symbols, wherein, user can be directed to different logins Code characters arrange same finger print information, it is also possible to different finger print informations are arranged for each different primary and secondary, by referring to The switch of line identifying device, can control whether that the code characters to being input into gather corresponding finger print information.For example, setting is close Code is 12345, corresponding fingerprint, can be to obtain any fingerprint of user when obtaining 1 simultaneously, or is obtained simultaneously when obtaining 2 The particular fingerprint of user;Can also be to be required for fingerprint for each numeral, or fingerprint authentication is provided at random.
S12, by the input information and finger print information carry out it is corresponding generation login authentication code;
S13, the login authentication code and application program are carried out into corresponding production Methods mapping table.
In the embodiment of the present application, after login authentication code is generated according to login password and finger print information, then need to step on Record identifying code and application program are associated, and give birth to login authentication code and application program refering to what Fig. 5 the embodiment of the present application was provided Into the method flow schematic diagram of relation mapping table, as illustrated, the login authentication code and application program are carried out in step S13 Correspondence production Methods mapping table, specifically includes:
S131, the login authentication code and application program are generated into incidence relation;
S132, by the incidence relation travel relationships mapping table of all login authentication codes and application program.
Under a kind of scene of the embodiment of the present application, started for safety because user generally has various application programs For the sake of, different application programs can be directed to different login authentication codes are set, these login authentication codes are managed for convenience Reason, then form these login authentication codes and application program after incidence relation, by all relevant login authentication codes Stored with application program production Methods mapping table.
The method flow schematic diagram of the acute login authentication of startup application program provided refering to such as Fig. 6 the embodiment of the present application, Login authentication is carried out when as shown in the figure step S2 starts application program, is specifically included:
S21, startup application program, gather the input information of user and gather the finger print information of user;
S22, the corresponding login authentication code of the application program is searched from relation mapping table in table;
S23, the input information and finger print information and identifying code of collection are compared, compare successfully then to start and apply journey Sequence.
A kind of fingerprint keyboard, the checking system based on fingerprint keyboard and the method provided by the present invention, by being input into Character information and finger print information be associated production as login authentication code during application program launching, while stepping on all of The corresponding relation relations of production mapping table of record identifying code and application program, then when will work as user and be again started up application program, then lead to The character for crossing collection user input and the user fingerprints information for collecting, then contrasted by the lookup of relation mapping table, carry out Judge whether to start application program, by the technical program, can effectively prevent subscriber computer or system server from suffering Hacker's amounts to, and due to when carrying out calculating access password, the finger print information for gathering user being needed, so as to the password for being breaks Peace is built in the difficulty hardly possible of solution, to guarantee the tight security of user cipher, it is possible to increase the Experience Degree of user, reducing user need not The loss wanted.
Description to the various embodiments of the application above is supplied to those skilled in the art with the purpose for describing.It is not Be intended to exhaustion or be not intended to limit the invention to single disclosed embodiment.As described above, the application's is various Substitute and change will be apparent for above-mentioned technology one of ordinary skill in the art.Therefore, although specifically beg for The embodiment of some alternatives has been discussed, but other embodiment will be apparent, or those skilled in the art are relative Easily draw.The application is intended to be included in this all replacement of the invention for having discussed, modification and change, and falls Other embodiment in the spirit and scope of above-mentioned application.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for system reality For applying example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
The application can be used in numerous general or special purpose computing system environments or configuration.For example:Personal computer, clothes Business device computer, handheld device or portable set, laptop device, multicomputer system, based on the system of microprocessor, put Top box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, including any of the above system or equipment DCE etc..
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes execution particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be in a distributed computing environment put into practice, in these DCEs, by The remote processing devices connected by communication network are performing task.In a distributed computing environment, program module can be with In local and remote computer-readable storage medium including including storage device.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application have it is many deformation and Change is without deviating from spirit herein, it is desirable to which appended claim includes these deformations and changes without deviating from the application's Spirit.

Claims (10)

1. a kind of fingerprint keyboard, it is characterised in that the fingerprint keyboard includes:
Fingerprint identification device, the fingerprint identification device is placed in the button of the keyboard, and for user key-press input is being carried out When gather user finger print information.
2. fingerprint keyboard according to claim 1, it is characterised in that the fingerprint keyboard also includes a switch module, uses In the open and close for controlling the fingerprint identification device.
3. a kind of checking system based on fingerprint keyboard, it is characterised in that the system includes:
Fingerprint keyboard, for obtaining the input information of user, while obtaining the finger print information of user;
Setup module, the input information and the finger print information for being obtained according to the fingerprint keyboard is set to apply journey The login authentication code of sequence, and application program is formed into relation mapping table with the login authentication code;
Memory module, for preserving the relation mapping table;
Authentication module, when application program is started, the relation mapping table preserved by memory module is obtained to the fingerprint keyboard Input information and finger print information verified;
Starting module, according to the result of authentication module the application program is started.
4. the checking system based on fingerprint keyboard according to claim 3, it is characterised in that the application program includes: Webpage, APP.
5. the checking system based on fingerprint keyboard according to claim 3, it is characterised in that the setup module, including:
Identifying code unit, for generating the login authentication code of application program according to the input information of user and finger print information;
Mapping table unit, for forming relation mapping table with corresponding login authentication code information according to application information.
6. a kind of verification method based on fingerprint keyboard, it is characterised in that the verification method includes:
S1, the identifying code that application program login is set;
Login authentication is carried out when S2, startup application program, startup application program is verified.
7. the verification method based on fingerprint keyboard according to claim 6, it is characterised in that the S1 arranges application program The identifying code of login, specifically includes:
S11, by fingerprint keyboard obtain user input information while gather user finger print information;
S12, by the input information and finger print information carry out it is corresponding generation login authentication code;
S13, the login authentication code and application program are carried out into corresponding production Methods mapping table.
8. the verification method of fingerprint keyboard is based on according to claim 7, it is characterised in that the S11 passes through fingerprint keyboard The finger print information of user is gathered while obtaining the input information of user, is specifically included:
S111, judge whether fingerprint identification device is opened, be then execution step S112, otherwise execution step S113;
Gather finger print information and be associated while S112, input character;
Finger print information is not gathered while S113, input character.
9. the verification method based on fingerprint keyboard according to claim 7, it is characterised in that the S13 is by the login Identifying code carries out corresponding production Methods mapping table with application program, specifically includes:
S131, the login authentication code and application program are generated into incidence relation;
S132, by the incidence relation travel relationships mapping table of all login authentication codes and application program.
10. the verification method based on fingerprint keyboard according to claim 6, it is characterised in that the S2 starts and applies journey Login authentication is carried out during sequence, is specifically included:
S21, startup application program, gather the input information of user and gather the finger print information of user;
S22, the corresponding login authentication code of the application program is searched from relation mapping table in table;
S23, the input information and finger print information and identifying code of collection are compared, compare and successfully then start application program.
CN201611085334.9A 2016-11-30 2016-11-30 Fingerprint keyboard, verification system and method based on fingerprint keyboard Pending CN106648125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611085334.9A CN106648125A (en) 2016-11-30 2016-11-30 Fingerprint keyboard, verification system and method based on fingerprint keyboard

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611085334.9A CN106648125A (en) 2016-11-30 2016-11-30 Fingerprint keyboard, verification system and method based on fingerprint keyboard

Publications (1)

Publication Number Publication Date
CN106648125A true CN106648125A (en) 2017-05-10

Family

ID=58813723

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611085334.9A Pending CN106648125A (en) 2016-11-30 2016-11-30 Fingerprint keyboard, verification system and method based on fingerprint keyboard

Country Status (1)

Country Link
CN (1) CN106648125A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107861632A (en) * 2017-11-23 2018-03-30 中国电子科技集团公司第二十八研究所 A kind of networking with backlight function logs in fingerprint recognition key board unit
CN108073835A (en) * 2018-01-03 2018-05-25 北京知道创宇信息技术有限公司 Password mapping method, system and keyboard
CN110035247A (en) * 2019-04-04 2019-07-19 旭辉卓越健康信息科技有限公司 A kind of video and audio recording system of AI medical treatment all-in-one machine
CN110363898A (en) * 2019-07-28 2019-10-22 刘兴丹 A kind of device of fingerprint recognition by pressing keys, method
CN110443081A (en) * 2018-05-04 2019-11-12 拉萨经济技术开发区凯航科技开发有限公司 It is a kind of for protecting the keyboard system of input message safety
CN111600994A (en) * 2020-05-14 2020-08-28 Oppo(重庆)智能科技有限公司 Shortcut operation method and device and computer readable storage medium
CN111985913A (en) * 2019-05-24 2020-11-24 上海箩箕技术有限公司 Card-free transaction method and device and server
CN112581656A (en) * 2020-11-27 2021-03-30 山东浪潮通软信息科技有限公司 Identity verification method, mobile phone and intelligent door lock
CN114465818A (en) * 2022-03-23 2022-05-10 平安普惠企业管理有限公司 APP fingerprint login method based on artificial intelligence and related equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1263324A (en) * 2000-03-20 2000-08-16 后健慈 Fingerprint identification keyboard device and its identification method
EP2439613A1 (en) * 2010-10-05 2012-04-11 Research In Motion Limited Keyboard having key with integral biometric input device
CN104951159A (en) * 2015-06-12 2015-09-30 小米科技有限责任公司 Touch key and fingerprint identification method
CN105989259A (en) * 2015-03-06 2016-10-05 阿里巴巴集团控股有限公司 User identity authentication method and device as well as system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1263324A (en) * 2000-03-20 2000-08-16 后健慈 Fingerprint identification keyboard device and its identification method
EP2439613A1 (en) * 2010-10-05 2012-04-11 Research In Motion Limited Keyboard having key with integral biometric input device
CN105989259A (en) * 2015-03-06 2016-10-05 阿里巴巴集团控股有限公司 User identity authentication method and device as well as system
CN104951159A (en) * 2015-06-12 2015-09-30 小米科技有限责任公司 Touch key and fingerprint identification method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107861632A (en) * 2017-11-23 2018-03-30 中国电子科技集团公司第二十八研究所 A kind of networking with backlight function logs in fingerprint recognition key board unit
CN108073835A (en) * 2018-01-03 2018-05-25 北京知道创宇信息技术有限公司 Password mapping method, system and keyboard
CN108073835B (en) * 2018-01-03 2020-11-06 北京知道创宇信息技术股份有限公司 Password mapping method, system and keyboard
CN110443081A (en) * 2018-05-04 2019-11-12 拉萨经济技术开发区凯航科技开发有限公司 It is a kind of for protecting the keyboard system of input message safety
CN110035247A (en) * 2019-04-04 2019-07-19 旭辉卓越健康信息科技有限公司 A kind of video and audio recording system of AI medical treatment all-in-one machine
CN111985913A (en) * 2019-05-24 2020-11-24 上海箩箕技术有限公司 Card-free transaction method and device and server
CN110363898A (en) * 2019-07-28 2019-10-22 刘兴丹 A kind of device of fingerprint recognition by pressing keys, method
CN111600994A (en) * 2020-05-14 2020-08-28 Oppo(重庆)智能科技有限公司 Shortcut operation method and device and computer readable storage medium
CN111600994B (en) * 2020-05-14 2022-05-31 Oppo(重庆)智能科技有限公司 Shortcut operation method and device and computer readable storage medium
CN112581656A (en) * 2020-11-27 2021-03-30 山东浪潮通软信息科技有限公司 Identity verification method, mobile phone and intelligent door lock
CN114465818A (en) * 2022-03-23 2022-05-10 平安普惠企业管理有限公司 APP fingerprint login method based on artificial intelligence and related equipment

Similar Documents

Publication Publication Date Title
CN106648125A (en) Fingerprint keyboard, verification system and method based on fingerprint keyboard
US20200295940A1 (en) System and method for device registration and authentication
US10516698B2 (en) Honeypot computing services that include simulated computing resources
CN108989346B (en) Third-party valid identity escrow agile authentication access method based on account hiding
Bojinov et al. Kamouflage: Loss-resistant password management
US9473493B2 (en) Secure data communication
Andress Foundations of information security: a straightforward introduction
Scarfone et al. Guide to enterprise password management (draft)
CN106453205B (en) identity verification method and device
CN106384027A (en) User identity recognition system and recognition method thereof
CN107809438A (en) A kind of network authentication method, system and its user agent device used
CN107871081A (en) A kind of computer information safe system
CN106161710B (en) A kind of user account safety management system based on smart phone
CN103944877A (en) Method and system for safely logging on bank website based on two-dimension code
CN106850503A (en) One kind is exempted to log in identity identifying method and device
CN107409129A (en) Use the mandate in accesses control list and the distributed system of group
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
CN104468486B (en) Information processing method, system and electronic equipment
Furnell Securing information and communications systems: Principles, technologies, and applications
US20190108328A1 (en) Method and system for secure password storage
JP2010061329A (en) Authentication processing method and authentication processing system
Begou et al. Exploring the dark side of ai: Advanced phishing attack design and deployment using chatgpt
Shay et al. Password policy simulation and analysis
JP2016062457A (en) Authentication method and authentication apparatus
CN106529216B (en) Software authorization system and software authorization method based on public storage platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170510