CN107679385A - A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing - Google Patents
A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing Download PDFInfo
- Publication number
- CN107679385A CN107679385A CN201710986722.2A CN201710986722A CN107679385A CN 107679385 A CN107679385 A CN 107679385A CN 201710986722 A CN201710986722 A CN 201710986722A CN 107679385 A CN107679385 A CN 107679385A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- user
- combination
- input
- fingerprints
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing, to improve the security of fingerprint authentication.The fingerprint authentication method, including:The finger print information to be verified of user's input of receiving terminal collection, wherein, the finger print information to be verified includes at least two fingerprints of user's input and user inputs the time interval of adjacent fingerprint at least two fingerprint;The time interval of adjacent fingerprint at least two fingerprint is inputted according to user, it is determined that the fingerprint combination that at least two fingerprints inputted by user are formed;Whether the fingerprint combination for judging to determine matches with the mandate fingerprint combination prestored;If it is, the response message being verified is returned to the user;Otherwise, the response message of authentication failed is returned to the user.
Description
Technical field
The present invention relates to fingerprint identification technology field, more particularly to a kind of fingerprint authentication method and device, terminal and readable
Storage medium.
Background technology
Fingerprint identification technology be using specific identifying system (such as be mounted with certain fingerprint identification software computer,
Terminal with fingerprint identification module etc.) finger print information of person to be identified is compared with the finger print information pre-saved, come
Verify the identity of person to be identified.
However, with the popularization of fingerprint verification device, the use of personal fingerprint becomes more and more frequent so that fingerprint holds very much
Easily it is copied illegally, in such cases, the fingerprint of bootlegging can easily pass through fingerprint verification system, so as to easily reveal
Personal information security, property loss can be even more seriously brought to user, is such as answered using what fingerprint authentication function was paid
With program etc..
Therefore, the security of fingerprint authentication how is improved, is one of prior art urgent problem to be solved.
The content of the invention
The invention discloses a kind of fingerprint authentication method, and to solve, fingerprint authentication security in the prior art is low to ask
Topic.
The embodiments of the invention provide a kind of fingerprint authentication method, including:
The finger print information to be verified of user's input of receiving terminal collection, wherein, the finger print information to be verified includes using
At least two fingerprints of family input and user input the time interval of adjacent fingerprint at least two fingerprint;
The time interval of adjacent fingerprint at least two fingerprint is inputted according to user, it is determined that by user's input at least
The fingerprint combination that two fingerprints are formed;
Whether the fingerprint combination for judging to determine matches with the mandate fingerprint combination prestored;
If it is, the response message being verified is returned to the user;
Otherwise, the response message of authentication failed is returned to the user.
Preferably, the time interval that adjacent fingerprint at least two fingerprint is inputted according to user, it is determined that by with
The fingerprint combination that at least two fingerprints of family input are formed, including:
The adjacent fingerprint that time interval at least two fingerprints of user's input is less than or equal to preset duration determines
For a fingerprint combination.
Alternatively, the finger print information to be verified also includes:
User inputs the time of at least two fingerprint;
The fingerprint combination for determining to be made up of at least two fingerprints of user's input, including:
It is determined that at least two fingerprint combinations that at least two fingerprints inputted by user are formed;
Methods described also includes:
The time of at least two fingerprint is inputted according to user, it is determined that what at least two fingerprints inputted by user were formed
The input sequence of at least two fingerprint combinations.
Preferably, whether the fingerprint combination for judging to determine matches with the mandate fingerprint combination prestored, including:
Whether at least two fingerprint combinations for judging to determine and at least two mandate fingerprint combinations prestored are identical,
And the input sequence at least two fingerprint combinations determined with described at least two authorize fingerprint combinations sequencing whether
It is identical.
Alternatively, the finger print information to be verified also includes:
User inputs pressing duration during each fingerprint at least two fingerprint;
It is described judge at least two fingerprint combinations determined and prestore at least two whether authorize fingerprint combinations
It is identical, including:
Judge the fingerprint for forming each fingerprint combination determined respectively is with the fingerprint for forming each mandate fingerprint combination
It is no matching and pressing duration it is identical.
The embodiments of the invention provide a kind of fingerprint verifying apparatus, including:
Receiving unit, for the finger print information to be verified of user's input of receiving terminal collection, wherein, the finger to be verified
Line information includes at least two fingerprints of user's input and user was inputted at least two fingerprint between the time of adjacent fingerprint
Every;
First determining unit, for inputting the time interval of adjacent fingerprint at least two fingerprint according to user, really
The fingerprint combination that fixed at least two fingerprints by user's input are formed;
Whether judging unit, the fingerprint combination for judging to determine match with the mandate fingerprint combination prestored;
Response unit, for when the judged result of the judging unit is is, returning to what is be verified to the user
Response message;Otherwise, the response message of authentication failed is returned to the user.
Preferably, first determining unit is small specifically for time interval at least two fingerprints that input user
It is defined as a fingerprint combination in or equal to the adjacent fingerprint of preset duration.
Alternatively, the finger print information to be verified also includes:
User inputs the time of at least two fingerprint;
First determining unit, at least two fingerprint groups for determining to be made up of at least two fingerprints of user's input
Close;
Described device also includes:
Second determining unit, for inputting the time of at least two fingerprint according to user, it is determined that by user's input
The input sequence at least two fingerprint combinations that at least two fingerprints are formed.
Preferably, the judging unit, at least two fingerprint combinations for judging to determine and prestore at least
Whether two authorize fingerprint combination identical, and the input sequence at least two fingerprint combinations determined is awarded with described at least two
Whether the sequencing for weighing fingerprint combination is identical.
Alternatively, the finger print information to be verified also includes:
User inputs pressing duration during each fingerprint at least two fingerprint;
The judging unit, for judging that the fingerprint for forming each fingerprint combination determined each authorizes with forming respectively
Whether the fingerprint of fingerprint combination matches and to press duration identical.
The embodiments of the invention provide a kind of terminal, the terminal includes processor, and the processor is used to perform storage
The step of above-mentioned fingerprint authentication method being realized during the computer program stored in device.
The embodiments of the invention provide a kind of readable storage medium storing program for executing, is stored thereon with computer program, the computer journey
The step of above-mentioned fingerprint authentication method is realized when sequence is executed by processor.
Beneficial effects of the present invention include:
Fingerprint authentication method and device provided in an embodiment of the present invention, user's input of authentication server receiving terminal collection
Finger print information to be verified, wherein, finger print information to be verified include user input at least two fingerprints and user input described in
The time interval of adjacent fingerprint at least two fingerprints, the time of adjacent fingerprint at least two fingerprint is inputted according to user
Interval, it is determined that the fingerprint combination that forms of at least two fingerprints inputted by user, judge the fingerprint combination determined with it is local pre-
Whether the mandate fingerprint combination first stored matches, when the fingerprint combination determined with authorize fingerprint combination match, then returned to user
The response message being verified is returned, otherwise, the response message of authentication failed is returned to user, use is provided in an embodiment of the present invention
Above-mentioned fingerprint authentication method, by side of the fingerprint combination plus the time interval of adjacent fingerprint for verifying at least two fingerprints composition
Formula carries out fingerprint authentication, because this fingerprint combination adds the time interval of adjacent fingerprint to be difficult to be copied illegally, so as to enhance
The security of fingerprint authentication.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification
Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write
Specifically noted structure is realized and obtained in book, claims and accompanying drawing.
Brief description of the drawings
Accompanying drawing described herein is used for providing a further understanding of the present invention, forms the part of the present invention, this hair
Bright schematic description and description is used to explain the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the implementation process diagram for the fingerprint authentication method that the embodiment of the present invention one provides;
Fig. 2 is the structural representation for the fingerprint verifying apparatus that the embodiment of the present invention two provides;
Fig. 3 is the hardware architecture diagram for fingerprint verifying apparatus/terminal device that the embodiment of the present invention three provides.
Embodiment
The present invention proposes a kind of fingerprint authentication method and device, to improve the security of fingerprint authentication.
The implementation principle of method provided in an embodiment of the present invention is:
The finger print information to be verified of user's input of authentication server receiving terminal collection, wherein, finger print information to be verified
At least two fingerprints and user including user's input input the time interval of adjacent fingerprint at least two fingerprint, according to
User inputs the time interval of adjacent fingerprint at least two fingerprint, it is determined that at least two fingerprints inputted by user are formed
Fingerprint combination, whether the fingerprint combination for judging to determine match with the mandate fingerprint combination locally prestored, when determining
Fingerprint combination with authorizing fingerprint combination match, then return to the response message that is verified to user, otherwise, tested to user's return
The response message of failure is demonstrate,proved, using above-mentioned fingerprint authentication method provided in an embodiment of the present invention, by verifying at least two fingerprints
The fingerprint combination of composition carries out fingerprint authentication plus the mode of time interval of adjacent fingerprint, due to this fingerprint combination add it is adjacent
The time interval of fingerprint is difficult to be copied illegally, so as to enhance the security of fingerprint authentication.
The preferred embodiments of the present invention are illustrated below in conjunction with Figure of description, it will be appreciated that described herein
Preferred embodiment is merely to illustrate and explain the present invention, and is not intended to limit the present invention, and in the case where not conflicting, this hair
The feature in embodiment and embodiment in bright can be mutually combined.
Embodiment one
As shown in figure 1, it is the implementation process diagram for the fingerprint authentication method that the embodiment of the present invention one provides, can wrap
Include following steps:
The finger print information to be verified that S11, the user of receiving terminal collection input, wherein, the finger print information bag to be verified
Include at least two fingerprints of user's input and user inputs the time interval of adjacent fingerprint at least two fingerprint.
When it is implemented, after the finger print information to be verified of terminal collection user's input, the finger print information to be verified is sent
To authentication server, wherein, finger print information to be verified include user input at least two fingerprints and user input it is described extremely
The time interval of adjacent fingerprint in few two fingerprints.For example, user in chronological sequence sequentially sequentially inputs three fingerprints, it is respectively
Its left hand middle finger fingerprint, left hand third finger fingerprint and right hand index fingerprint, terminal record above three fingerprint and user's input
During above three fingerprint, the time interval between each two adjacent fingerprint, it is assumed that user input left hand middle finger fingerprint and left hand without
The time interval of name fingerprint is 1s, and the nameless time interval with right hand index fingerprint of input left hand is 3s.
S12, the time interval according to adjacent fingerprint in user's input at least two fingerprint, it is determined that by user's input
The fingerprint combination that at least two fingerprints are formed.
In this step, after authentication server receives the finger print information to be verified of above-mentioned user input of terminal transmission, root
The time interval of adjacent fingerprint at least two fingerprint is inputted according to user, it is determined that at least two fingerprint structures inputted by user
Into fingerprint combination.
When it is implemented, time interval at least two fingerprints of user's input is less than or equal to the phase of preset duration
Adjacent fingerprint is defined as a fingerprint combination.
It should be noted that the finger that multiple adjacent fingerprints that the fingerprint combination, which can be user, continuously to be inputted are formed
The fingerprint combination that line combination or one or more fingerprint inputted simultaneously are formed.
In step S11 example, it is assumed that preset duration 5s, because user inputs left hand middle finger fingerprint and the left hand third finger
The time interval of fingerprint is 1s, and the nameless time interval with right hand index fingerprint of input left hand is 3s, respectively less than preset duration
5s, then left hand middle finger fingerprint and left hand third finger fingerprint can be defined as a fingerprint combination, by the left hand third finger and the right hand
Index fingerprint is defined as a fingerprint combination, also, the time interval sum of above-mentioned two groups of adjacent fingerprints is 4s, again smaller than default
Duration, then left hand middle finger fingerprint, left hand third finger fingerprint and right hand index fingerprint these three adjacent fingerprints can also be defined as
One fingerprint combination.
It is preferred that the finger print information to be verified can also include:User inputs the time of at least two fingerprint.
The fingerprint combination for determining to be made up of at least two fingerprints of user's input, including:
It is determined that at least two fingerprint combinations that at least two fingerprints inputted by user are formed.
When it is implemented, authentication server inputs the time of at least two fingerprint combination according to user, it is determined that by with
The input sequence at least two fingerprint combinations that at least two fingerprints of family input are formed.
Whether the fingerprint combination that S13, judgement are determined matches with the mandate fingerprint combination prestored, if it is, holding
Row step S14, otherwise, perform step S15.
When it is implemented, authentication server judges whether are the fingerprint combination determined and the mandate fingerprint combination prestored
Matching, the fingerprint combination for fingerprint authentication of user's typing when mandate fingerprint combination is initial.
Specifically, authentication server judges at least two fingerprint combinations determined and at least two mandates prestored
Whether fingerprint combination is identical, and the input sequence at least two fingerprint combinations determined authorizes fingerprint group with described at least two
Whether the sequencing of conjunction is identical.
When at least two fingerprint combinations determined with prestore at least two authorize fingerprint combinations it is identical, and determine
When the input sequence of at least two fingerprint combinations gone out is identical with the sequencing that described at least two authorize fingerprint combination, then sentence
The time interval of disconnected at least two fingerprint combinations determined and described at least two time intervals for authorizing fingerprint combination
Whether match.Specifically, at least two fingerprint combinations determined corresponding with what is prestored at least two are calculated and are authorized and are referred to
Each difference of line combination;If each difference be respectively less than be equal to the first predetermined threshold value, it is determined that it is described determine at least two
The time interval of individual fingerprint combination matches with the time interval of described at least two mandate fingerprint combinations;If in each difference
At least one difference be more than first predetermined threshold value, it is determined that between the time of at least two fingerprint combinations determined
Mismatched every authorizing the time interval of fingerprint combination with described at least two.Further, when judge it is described determine to
When the time interval of few two fingerprint combinations matches with the time interval of described at least two mandate fingerprint combinations, then the determination
The fingerprint combination gone out matches with the mandate fingerprint combination prestored, and otherwise, the fingerprint combination determined is with prestoring
Mandate fingerprint combination mismatch.
It is preferred that the finger print information to be verified can also include:User inputs each finger at least two fingerprint
Pressing duration during line.
Whether at least two fingerprint combinations for judging to determine and at least two mandate fingerprint combinations prestored are identical,
Specially:Judge to form the fingerprint of each fingerprint combination determined respectively with whether forming each fingerprint for authorizing fingerprint combination
Match and pressing duration is identical.
When it is implemented, when at least two fingerprint combinations determined and at least two mandate fingerprint combinations prestored
It is identical, and the input sequence at least two fingerprint combinations determined and described at least two sequencings for authorizing fingerprint combination
When identical, then determine whether to form the fingerprint for each fingerprint combination determined with forming each fingerprint for authorizing fingerprint combination
Pressing duration whether match.Specifically, each fingerprint for forming each fingerprint combination determined is calculated with forming each authorize
Each difference of the pressing duration of each fingerprint corresponding to fingerprint combination;If each difference, which is respectively less than, is equal to the second predetermined threshold value,
Then determine that the fingerprint for forming each fingerprint combination determined each authorizes the pressing duration of the fingerprint of fingerprint combination with composition
Match somebody with somebody;If at least one difference in each difference is more than second predetermined threshold value, it is determined that form determine it is each
The fingerprint of fingerprint combination mismatches with forming the pressing duration of each fingerprint for authorizing fingerprint combination.Further, when judging
When the fingerprint for each fingerprint combination that composition is determined matches with forming the pressing duration of each fingerprint for authorizing fingerprint combination, then
The fingerprint combination determined matches with the mandate fingerprint combination prestored, otherwise, the fingerprint combination determined with
The mandate fingerprint combination prestored mismatches.
It should be noted that the first predetermined threshold value is pre-set with the second predetermined threshold value according to empirical value, occurrence
It can be configured according to actual conditions, be not construed as limiting herein.
S14, the response message being verified is returned to the user.
Specifically, when the fingerprint combination determined matches with the mandate fingerprint combination prestored, the service for checking credentials
Device returns to the response message being verified to the user, is verified.
S15, the response message to user return authentication failed.
Specifically, when the fingerprint combination determined and the mandate fingerprint combination prestored mismatch, checking clothes
Device be engaged in the response message of user return authentication failed, verifies and does not pass through.
Fingerprint authentication method provided in an embodiment of the present invention, the user that authentication server receiving terminal gathers input to be tested
Finger print information is demonstrate,proved, wherein, at least two described at least two fingerprints and user's input of the finger print information to be verified including user's input
Pressing duration when the time interval of adjacent fingerprint and user input each fingerprint at least two fingerprint in individual fingerprint,
The time interval of adjacent fingerprint or user at least two fingerprint are inputted according to user to input at least two fingerprint
Pressing duration during each fingerprint, the fingerprint combination for judging to determine and the mandate fingerprint combination that locally prestores whether
Match somebody with somebody, when the fingerprint combination determined is with authorizing fingerprint combination match, then to the response message that is verified of user's return, otherwise,
The response message of authentication failed is returned to user, using above-mentioned fingerprint authentication method provided in an embodiment of the present invention, passes through checking
The fingerprint combination of at least two fingerprints composition is inputted at least two fingerprint plus the time interval of adjacent fingerprint with user
The mode of pressing duration during each fingerprint carries out fingerprint authentication, it is difficult to is copied illegally, so as to enhance the peace of fingerprint authentication
Quan Xing.
It should be noted that the executive agent of the embodiment of the present invention can also be terminal, it is not construed as limiting herein.
Embodiment two
As shown in Fig. 2 it is the structural representation for the fingerprint verifying apparatus that the embodiment of the present invention two provides, can include:
Receiving unit 21, for the finger print information to be verified of user's input of receiving terminal collection, wherein, it is described to be verified
Finger print information includes at least two fingerprints of user's input and user inputs the time of adjacent fingerprint at least two fingerprint
Interval;
First determining unit 22, for inputting the time interval of adjacent fingerprint at least two fingerprint according to user,
It is determined that the fingerprint combination that at least two fingerprints inputted by user are formed;
Whether judging unit 23, the fingerprint combination for judging to determine match with the mandate fingerprint combination prestored;
Response unit 24, for when the judged result of the judging unit is is, returning and being verified to the user
Response message;Otherwise, the response message of authentication failed is returned to the user.
It is preferred that first determining unit 22, specifically for time interval at least two fingerprints that input user
Adjacent fingerprint less than or equal to preset duration is defined as a fingerprint combination.
Alternatively, the finger print information to be verified also includes:
User inputs the time of at least two fingerprint;
First determining unit, at least two fingerprint groups for determining to be made up of at least two fingerprints of user's input
Close;
Described device can also include:
Second determining unit, for inputting the time of at least two fingerprint according to user, it is determined that by user's input
The input sequence at least two fingerprint combinations that at least two fingerprints are formed.
It is preferred that the judging unit 23, at least two fingerprint combinations for judging to determine and prestore to
Whether few two authorize fingerprint combination identical, and the input sequence at least two fingerprint combinations determined and described at least two
Authorize the sequencing of fingerprint combination whether identical.
Alternatively, the finger print information to be verified also includes:
User inputs pressing duration during each fingerprint at least two fingerprint;
The judging unit 23, for judging that the fingerprint for forming each fingerprint combination determined each is awarded with forming respectively
Whether the fingerprint of power fingerprint combination matches and to press duration identical.
Embodiment three
As shown in figure 3, the hardware configuration signal of the fingerprint verifying apparatus/terminal device provided for the embodiment of the present invention three
Figure.Fingerprint verifying apparatus/terminal device of the embodiment includes:Processor 301, memory 302 and it is stored in the storage
In device and the computer program that can run on the processor, such as fingerprint authentication program.Meter described in the computing device
The step in above-mentioned each fingerprint authentication method embodiment, such as the step S11 shown in Fig. 1 are realized during calculation machine program.Or institute
The function of each module/unit in above-mentioned each device embodiment, such as 21 are realized when stating computer program described in computing device.
Exemplary, the computer program can be divided into one or more module/units, one or more
Individual module/unit is stored in the memory, and by the computing device, to complete the present invention.It is one or more
Individual module/unit can be the series of computation machine programmed instruction section that can complete specific function, and the instruction segment is used to describe institute
State implementation procedure of the computer program in the fingerprint verifying apparatus/terminal device.For example, the computer program can be by
It is divided into receiving unit, the first determining unit, judging unit and response unit, each module concrete function is as follows:
Receiving unit, for the finger print information to be verified of user's input of receiving terminal collection, wherein, the finger to be verified
Line information includes at least two fingerprints of user's input and user was inputted at least two fingerprint between the time of adjacent fingerprint
Every;
First determining unit, for inputting the time interval of adjacent fingerprint at least two fingerprint according to user, really
The fingerprint combination that fixed at least two fingerprints by user's input are formed;
Whether judging unit, the fingerprint combination for judging to determine match with the mandate fingerprint combination prestored;
Response unit, for when the judged result of the judging unit is is, returning to what is be verified to the user
Response message;Otherwise, the response message of authentication failed is returned to the user.
Fingerprint verifying apparatus/the terminal device can be desktop PC, notebook, palm PC and cloud service
The computing devices such as device.Fingerprint verifying apparatus/the terminal device may include, but be not limited only to, processor, memory.This area
Technical staff is appreciated that the schematic diagram is only the example of fingerprint verifying apparatus/terminal device, does not form to fingerprint inspection
The restriction of card device/terminal device, can be included than illustrating more or less parts, either combine some parts or not
With part, such as the fingerprint verifying apparatus/terminal device can also include input-output equipment, network access equipment, total
Line etc..
The processor can be CPU (Central Processing Unit, CPU), can also be it
His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng the processor is the control centre of the fingerprint verifying apparatus/terminal device, whole using various interfaces and connection
The various pieces of fingerprint verifying apparatus/terminal device.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization
The various functions of fingerprint verifying apparatus/terminal device.The memory can mainly include storing program area and storage data field, its
In, storing program area can storage program area, application program (such as sound-playing function, image needed at least one function
Playing function etc.) etc.;Storage data field can store uses created data (such as voice data, phone directory according to mobile phone
Deng) etc..In addition, memory can include high-speed random access memory, nonvolatile memory can also be included, such as firmly
Disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital,
SD) block, flash card (Flash Card), at least one disk memory, flush memory device or other volatile solid-states
Part.
Example IV
If the integrated module/unit of the fingerprint verifying apparatus/terminal device is realized in the form of SFU software functional unit
And as independent production marketing or in use, it can be stored in a computer read/write memory medium.Based on such
Understand, the present invention realizes all or part of flow in above-described embodiment method, can also instruct phase by computer program
The hardware of pass is completed, and described computer program can be stored in a computer-readable recording medium, the computer program exists
When being executed by processor, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program includes computer journey
Sequence code, the computer program code can be source code form, object identification code form, executable file or some middle shapes
Formula etc..The computer-readable medium can include:Any entity or device, the note of the computer program code can be carried
Recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory),
Random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium
Deng.It should be noted that the content that the computer-readable medium includes can be real according to legislation in jurisdiction and patent
The requirement trampled carries out appropriate increase and decrease, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium
Do not include electric carrier signal and telecommunication signal.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program
Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more
The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (10)
- A kind of 1. fingerprint authentication method, it is characterised in that including:The finger print information to be verified of user's input of receiving terminal collection, wherein, it is defeated that the finger print information to be verified includes user At least two fingerprints entered and user input the time interval of adjacent fingerprint at least two fingerprint;The time interval of adjacent fingerprint at least two fingerprint is inputted according to user, it is determined that at least two by user's input The fingerprint combination that fingerprint is formed;Whether the fingerprint combination for judging to determine matches with the mandate fingerprint combination prestored;If it is, the response message being verified is returned to the user;Otherwise, the response message of authentication failed is returned to the user.
- 2. the method as described in claim 1, it is characterised in that adjacent at least two fingerprint according to user's input The time interval of fingerprint, it is determined that the fingerprint combination that at least two fingerprints inputted by user are formed, including:The adjacent fingerprint that time interval at least two fingerprints of user's input is less than or equal to preset duration is defined as one Individual fingerprint combination.
- 3. method as claimed in claim 2, it is characterised in that the finger print information to be verified also includes:User inputs the time of at least two fingerprint;The fingerprint combination for determining to be made up of at least two fingerprints of user's input, including:It is determined that at least two fingerprint combinations that at least two fingerprints inputted by user are formed;Methods described also includes:The time of at least two fingerprint is inputted according to user, it is determined that at least two fingerprints inputted by user are formed at least The input sequence of two fingerprint combinations.
- 4. method as claimed in claim 3, it is characterised in that the fingerprint combination for judging to determine is awarded with what is prestored Whether power fingerprint combination matches, including:Whether at least two fingerprint combinations for judging to determine and at least two mandate fingerprint combinations prestored are identical, and really Whether the input sequence at least two fingerprint combinations made authorizes the sequencing of fingerprint combination identical with described at least two.
- 5. method as claimed in claim 4, it is characterised in that the finger print information to be verified also includes:User inputs pressing duration during each fingerprint at least two fingerprint;Whether at least two fingerprint combinations for judging to determine and at least two mandate fingerprint combinations prestored are identical, Including:Judge to form respectively the fingerprint of each fingerprint combination determined with form each fingerprint for authorizing fingerprint combination whether Match somebody with somebody and to press duration identical.
- A kind of 6. fingerprint verifying apparatus, it is characterised in that including:Receiving unit, for the finger print information to be verified of user's input of receiving terminal collection, wherein, the fingerprint letter to be verified Breath includes at least two fingerprints of user's input and user inputs the time interval of adjacent fingerprint at least two fingerprint;First determining unit, for inputting the time interval of adjacent fingerprint at least two fingerprint according to user, it is determined that by The fingerprint combination that at least two fingerprints of user's input are formed;Whether judging unit, the fingerprint combination for judging to determine match with the mandate fingerprint combination prestored;Response unit, for when the judged result of the judging unit is is, the response being verified to be returned to the user Message;Otherwise, the response message of authentication failed is returned to the user.
- 7. device as claimed in claim 6, it is characterised in thatFirst determining unit, it is less than or equal to specifically for time interval at least two fingerprints that input user pre- If the adjacent fingerprint of duration is defined as a fingerprint combination.
- 8. device as claimed in claim 7, it is characterised in that the finger print information to be verified also includes:User inputs the time of at least two fingerprint;First determining unit, at least two fingerprint combinations for determining to be made up of at least two fingerprints of user's input;Described device also includes:Second determining unit, for inputting the time of at least two fingerprint according to user, it is determined that by user's input at least The input sequence at least two fingerprint combinations that two fingerprints are formed.
- 9. a kind of terminal, it is characterised in that the terminal includes processor, and the processor is used to perform what is stored in memory The step of fingerprint authentication method as described in any one in claim 1-5 is realized during computer program.
- 10. a kind of readable storage medium storing program for executing, is stored thereon with computer program, it is characterised in that the computer program is processed The step of fingerprint authentication method as described in any one in claim 1-5 is realized when device performs.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710986722.2A CN107679385A (en) | 2017-10-20 | 2017-10-20 | A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710986722.2A CN107679385A (en) | 2017-10-20 | 2017-10-20 | A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107679385A true CN107679385A (en) | 2018-02-09 |
Family
ID=61141863
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710986722.2A Withdrawn CN107679385A (en) | 2017-10-20 | 2017-10-20 | A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107679385A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033786A (en) * | 2018-08-23 | 2018-12-18 | 珠海格力电器股份有限公司 | Method for hiding file, electronic device and computer storage medium |
CN109409068A (en) * | 2018-10-29 | 2019-03-01 | 维沃移动通信有限公司 | A kind of operation execution method and terminal |
CN110929552A (en) * | 2018-09-20 | 2020-03-27 | 北京小米移动软件有限公司 | Fingerprint identification method and device, electronic equipment and storage medium |
CN110929550A (en) * | 2018-09-20 | 2020-03-27 | 北京小米移动软件有限公司 | Fingerprint identification method and device, electronic equipment and storage medium |
CN116522310A (en) * | 2023-04-26 | 2023-08-01 | 悠盾智能科技(武汉)有限公司 | Fingerprint-based security verification method, terminal, electronic equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069335A (en) * | 2015-08-27 | 2015-11-18 | 广东欧珀移动通信有限公司 | Password setting method, verification method and terminal |
CN105160227A (en) * | 2015-08-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | Remote fingerprint verification method, user terminal and fingerprint verification system |
CN105260643A (en) * | 2015-10-30 | 2016-01-20 | 南昌欧菲生物识别技术有限公司 | Multi-fingerprint cross-unlocking method and system |
-
2017
- 2017-10-20 CN CN201710986722.2A patent/CN107679385A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069335A (en) * | 2015-08-27 | 2015-11-18 | 广东欧珀移动通信有限公司 | Password setting method, verification method and terminal |
CN105160227A (en) * | 2015-08-28 | 2015-12-16 | 广东欧珀移动通信有限公司 | Remote fingerprint verification method, user terminal and fingerprint verification system |
CN105260643A (en) * | 2015-10-30 | 2016-01-20 | 南昌欧菲生物识别技术有限公司 | Multi-fingerprint cross-unlocking method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109033786A (en) * | 2018-08-23 | 2018-12-18 | 珠海格力电器股份有限公司 | Method for hiding file, electronic device and computer storage medium |
CN110929552A (en) * | 2018-09-20 | 2020-03-27 | 北京小米移动软件有限公司 | Fingerprint identification method and device, electronic equipment and storage medium |
CN110929550A (en) * | 2018-09-20 | 2020-03-27 | 北京小米移动软件有限公司 | Fingerprint identification method and device, electronic equipment and storage medium |
CN110929550B (en) * | 2018-09-20 | 2023-11-14 | 北京小米移动软件有限公司 | Fingerprint identification method and device, electronic equipment and storage medium |
CN109409068A (en) * | 2018-10-29 | 2019-03-01 | 维沃移动通信有限公司 | A kind of operation execution method and terminal |
CN116522310A (en) * | 2023-04-26 | 2023-08-01 | 悠盾智能科技(武汉)有限公司 | Fingerprint-based security verification method, terminal, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107679385A (en) | A kind of fingerprint authentication method and device, terminal and readable storage medium storing program for executing | |
CN109815657B (en) | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment | |
CN108898389B (en) | Content verification method and device based on block chain and electronic equipment | |
CN104104672B (en) | The method that dynamic authorization code is established in identity-based certification | |
CN107566337A (en) | Communication means and device between a kind of block chain node | |
TW202018571A (en) | Data storage method and device based on block chain and electronic equipment | |
CN104915832B (en) | Mobile payment, verification method and its device and system | |
US20180196875A1 (en) | Determining repeat website users via browser uniqueness tracking | |
CN107835173A (en) | A kind of teleaction service handles method, storage medium and server | |
CN105763565B (en) | Account logon method, device and game system | |
CN116208426B (en) | Data hierarchical authorization query control system and method | |
CN112187702A (en) | Method and device for verifying client | |
CN108615152B (en) | Transaction device based on block chain | |
CN113037505B (en) | Method and system for realizing trusted Web application | |
CN111160928A (en) | Identity verification method and device | |
CN104751350B (en) | A kind of method for information display and terminal | |
CN114817888A (en) | Certificate registering and issuing method, device and storage medium | |
CN113486316A (en) | User identity authentication method and device, electronic equipment and readable storage medium | |
CN108647510A (en) | Application program access method and device | |
CN113890739B (en) | Cross-blockchain authentication method and device, electronic equipment and medium | |
CN115170257A (en) | Method, system and device for bid evaluation | |
CN111476640A (en) | Authentication method, system, storage medium and big data authentication platform | |
CN104486306A (en) | Method for identity authentication based on finger vein recognition and cloud service | |
CN110555682A (en) | multi-channel implementation method based on alliance chain | |
CN112035812A (en) | Block chain-based programming skill evaluation method and device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180209 |
|
WW01 | Invention patent application withdrawn after publication |