CN107862196A - Fingerprint verification method, mobile terminal and computer-readable recording medium - Google Patents
Fingerprint verification method, mobile terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107862196A CN107862196A CN201711234782.5A CN201711234782A CN107862196A CN 107862196 A CN107862196 A CN 107862196A CN 201711234782 A CN201711234782 A CN 201711234782A CN 107862196 A CN107862196 A CN 107862196A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- finger
- input
- cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention discloses a kind of fingerprint verification method, this method includes:Password Input request is received, is asked to show interface for password input according to the Password Input, the interface for password input includes two different preset touch regions;The finger print information that user is inputted based on the preset touch region is obtained, the finger print information includes the input area and input sequence of fingerprint and fingerprint;Finger-print cipher to be verified is converted to the fingerprint in the finger print information according to the input area of fingerprint and input sequence;Judge whether the finger-print cipher to be verified matches with default finger-print cipher, if so, then judging that finger print identifying passes through.The invention also discloses a kind of mobile terminal and a kind of computer-readable recording medium.The present invention can solve the problem that the relatively low technical problem of the security password security of existing mobile terminal.
Description
Technical field
The present invention relates to technical field of mobile terminals, more particularly to fingerprint verification method, mobile terminal and computer-readable
Storage medium.
Background technology
At present, the security password based on mobile terminal mainly includes numerical ciphers, finger-print cipher etc., the safety of this kind of password
Property is often relatively low.Such as use numerical ciphers, due to existing mobile terminal device cipher inputting keyboard be it is dominant, in public
Input numerical ciphers, it is easy to peeped by the crowd of surrounding or monitoring device, cause to divulge a secret;Finger-print cipher is and for example used, is referred to
Line has been able to be replicated as human body biological characteristics, and when finger print information is stolen, the method for single finger print identifying is present very
Big potential safety hazard, thus the security for how improving mobile terminal safety password becomes current urgent problem to be solved.
The content of the invention
It is a primary object of the present invention to propose a kind of fingerprint verification method, mobile terminal and computer-readable storage medium
Matter, it is intended to solve the relatively low technical problem of the security password security of existing mobile terminal.
To achieve the above object, the present invention provides a kind of fingerprint verification method, and the fingerprint verification method includes following step
Suddenly:
Password Input request is received, is asked to show interface for password input, Password Input circle according to the Password Input
Face includes two different preset touch regions;
The finger print information that user is inputted based on the preset touch region is obtained, the finger print information includes fingerprint and referred to
The input area and input sequence of line;
Fingerprint to be verified is converted to the fingerprint in the finger print information according to the input area of fingerprint and input sequence
Password;
Judge whether the finger-print cipher to be verified matches with default finger-print cipher, if so, then judging finger print identifying
Pass through.
Alternatively, the reception Password Input request, asked to show interface for password input according to the Password Input, it is described
Before interface for password input includes the step of two different preset touch regions, in addition to:
Receive finger-print cipher and instruction is set, set instruction display to include the preset touch region according to the finger-print cipher
Password set interface;
Obtain the finger print information of at least two fingerprints of the user based on preset touch region typing;
According to finger-print cipher corresponding to the finger print information generation got, using the finger-print cipher of generation as pre-
If finger-print cipher.
Alternatively, finger-print cipher corresponding to the finger print information generation that the basis is got, by the finger of generation
After line password is as the step of default finger-print cipher, in addition to:
Judge whether encrypted content corresponding with the default finger-print cipher is related to payment;
If so, then the default finger-print cipher is sent to corresponding server;
If it is not, then the default finger-print cipher is preserved local to mobile terminal.
Alternatively, the reception finger-print cipher sets instruction, sets instruction display to include according to the finger-print cipher described
Before the password in preset touch region sets the step of interface, in addition to:
Receive touch area and instruction is set;
Set instruction that one touch area is set respectively on the relative both sides of mobile terminal display screen according to the touch area,
Using the touch area of setting as finger-print cipher typing region.
Alternatively, the input area and input sequence according to fingerprint, which is converted to the fingerprint in the finger print information, treats
The step of finger-print cipher of checking, includes:
Judge whether the fingerprint in the finger print information is effective fingerprint;
If so, then the fingerprint is converted to corresponding according to default fingerprint input area and the corresponding relation of character
Character;
By the character arrangements being converted to it is a character string according to the input sequence of the fingerprint, the character string is made
For finger-print cipher to be verified.
Alternatively, the step of whether fingerprint judged in the finger print information is effective fingerprint includes:
Judge fingerprint in the finger print information whether with the fingerprint matching in default mandate fingerprint base;
If so, then judge that the fingerprint is effective fingerprint.
Alternatively, the reception Password Input request, asked to show interface for password input according to the Password Input, it is described
Before interface for password input includes the step of two different preset touch regions, in addition to:
Establish and authorize fingerprint base, the mandate fingerprint base includes several and authorizes fingerprint.
Alternatively, the character is numeral or letter.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, and the mobile terminal includes:Memory,
Processor and the finger print identifying program that can be run on the memory and on the processor is stored in, the finger print identifying journey
The step of fingerprint verification method as described above being realized when sequence is by the computing device.
In addition, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, described computer-readable
Finger print identifying program is stored with storage medium, is realized when the mobile terminal operation sequence is executed by processor as described above
The step of fingerprint verification method.
The present invention receives Password Input request, is asked to show interface for password input, the password according to the Password Input
Inputting interface includes two different preset touch regions;Obtain the fingerprint letter that user is inputted based on the preset touch region
Breath, the finger print information include the input area and input sequence of fingerprint and fingerprint;According to the input area of fingerprint and input
Order is converted to the fingerprint in the finger print information finger-print cipher to be verified;Whether judge the finger-print cipher to be verified
Matched with default finger-print cipher, if so, then judging that finger print identifying passes through.By the above-mentioned means, the present invention combines fingerprint, fingerprint
Input area and fingerprint input sequence, ultimately generate finger-print cipher, and finger print identifying is carried out based on the finger-print cipher, relatively
In single finger print identifying mode of the prior art, present invention incorporates the multiple information relevant with fingerprint, refer to so as to improve
The security of line certification, solves the relatively low technical problem of the security password security of existing mobile terminal.
Brief description of the drawings
Fig. 1 is a kind of hardware architecture diagram for the mobile terminal for realizing each embodiment of the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the schematic flow sheet of fingerprint verification method first embodiment of the present invention;
Fig. 4 is the distributing position schematic diagram in preset touch region in the embodiment of the present invention;
Fig. 5 is another distributing position schematic diagram in preset touch region in the embodiment of the present invention;
Fig. 6 is the schematic flow sheet of fingerprint verification method second embodiment of the present invention;
Fig. 7 is the schematic flow sheet of fingerprint verification method 3rd embodiment of the present invention.
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not form the restriction to mobile terminal, and mobile terminal can be included than illustrating more or less parts,
Either combine some parts or different parts arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
Based on above-mentioned mobile terminal hardware configuration, each embodiment of mobile terminal of the present invention is proposed.
Fig. 1 is refer to, in an embodiment of mobile terminal of the present invention, the mobile terminal includes:Memory 109, processing
Device 110 and it is stored in the finger print identifying program that can be run on the memory 109 and on the processor 110, the fingerprint
Authentication procedure realizes following steps when being performed by the processor 110:
Password Input request is received, is asked to show interface for password input, Password Input circle according to the Password Input
Face includes two different preset touch regions;
The finger print information that user is inputted based on the preset touch region is obtained, the finger print information includes fingerprint and referred to
The input area and input sequence of line;
Fingerprint to be verified is converted to the fingerprint in the finger print information according to the input area of fingerprint and input sequence
Password;
Judge whether the finger-print cipher to be verified matches with default finger-print cipher, if so, then judging finger print identifying
Pass through.
Further, following steps are also realized when the finger print identifying program is performed by the processor 110:
Receive finger-print cipher and instruction is set, set instruction display to include the preset touch region according to the finger-print cipher
Password set interface;
Obtain the finger print information of at least two fingerprints of the user based on preset touch region typing;
According to finger-print cipher corresponding to the finger print information generation got, using the finger-print cipher of generation as pre-
If finger-print cipher.
Further, following steps are also realized when the finger print identifying program is performed by the processor 110:
Judge whether encrypted content corresponding with the default finger-print cipher is related to payment;
If so, then the default finger-print cipher is sent to corresponding server;
If it is not, then the default finger-print cipher is preserved local to mobile terminal.
Further, following steps are also realized when the finger print identifying program is performed by the processor 110:
Receive touch area and instruction is set;
Set instruction that one touch area is set respectively on the relative both sides of mobile terminal display screen according to the touch area,
Using the touch area of setting as finger-print cipher typing region.
Further, following steps are also realized when the finger print identifying program is performed by the processor 110:
Judge whether the fingerprint in the finger print information is effective fingerprint;
If so, then the fingerprint is converted to corresponding according to default fingerprint input area and the corresponding relation of character
Character;
By the character arrangements being converted to it is a character string according to the input sequence of the fingerprint, the character string is made
For finger-print cipher to be verified.
Further, following steps are also realized when the finger print identifying program is performed by the processor 110:
Judge fingerprint in the finger print information whether with the fingerprint matching in default mandate fingerprint base;
If so, then judge that the fingerprint is effective fingerprint.
Further, following steps are also realized when the finger print identifying program is performed by the processor 110:
Establish and authorize fingerprint base, the mandate fingerprint base includes several and authorizes fingerprint.
Further, the character is numeral or letter.
Each specific embodiment of the specific embodiment of mobile terminal of the present invention and following fingerprint verification methods is essentially identical,
This is not repeated.
For the ease of understanding the embodiment of the present invention, the communications network system being based on below to the mobile terminal of the present invention enters
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and here is omitted.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers
Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc.
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the inventive method is proposed.
The present invention provides a kind of fingerprint verification method.
Reference picture 3, Fig. 3 are the schematic flow sheet of fingerprint verification method first embodiment of the present invention, and methods described includes:
Step S10, Password Input request is received, asked to show interface for password input according to the Password Input, it is described close
Code inputting interface includes two different preset touch regions;
In embodiments of the present invention, the fingerprint verification method can be applied to smart mobile phone, tablet personal computer etc. and show with touch-control
The terminal device of display screen, being particularly applicable to unlocking screen, file unblock, application program unblock, secure payment etc. needs user
Input in the scene of password.
First, mobile terminal receives Password Input request, and Password Input request can pass through following scenario triggered:User presses
The power key of pressure mobile terminal lights mobile terminal display screen, or system ejects when user wants to check a certain encrypted document
" please input password " dialog box, or user initiate delivery operation using mobile terminal, such as are clicked " really in certain shopping APP
Recognize payment " or scan payment Quick Response Code etc..
After mobile terminal receives Password Input request, that is, interface for password input is shown, the interface for password input includes two
Individual different preset touch region.In the prior art, if digital encryption, interface for password input generally shows that a numeral is empty
Intend keyboard so that user's input numerical ciphers, if encrypting fingerprint, interface for password input generally prompts user in relevant position
The fingerprint of the single finger of oneself is inputted, the present embodiment difference with the prior art is that the present embodiment mobile terminal is shown
Interface for password input includes two different preset touch regions, to facilitate user based on the two different preset touch areas
Domain inputs the fingerprint of oneself different finger according to certain input sequence respectively.
Reference picture 4, Fig. 4 are the distributing position schematic diagram in preset touch region in the embodiment of the present invention, preset touch in figure
Region is included respectively positioned at the touch area 1 and touch area 2 in the centre position of mobile terminal display screen both sides, so can be square
Just user's both hands grip mobile terminal carries out fingerprint input (carrying out fingerprint input using both hands thumb).Certainly, the present embodiment
Preset touch region is not limited to the distributing position shown in Fig. 4, when it is implemented, the size and location of touch area can carry out spirit
It is living to set, for example it is arranged on position on the upper side or on the lower side of display screen both sides etc..Further, the position in preset touch region may be used also
Changed, reference picture 5 with the change with the grip state of mobile terminal, Fig. 5 is preset touch region in the embodiment of the present invention
Another distributing position schematic diagram, it is corresponding default to touch when mobile terminal is changed into transverse screen grip state from portrait layout grip state
The preset touch region that control region is changed under transverse screen grip state therewith, so facilitate user when transverse screen holds mobile terminal
Carry out fingerprint input.
Step S20, obtains the finger print information that user is inputted based on the preset touch region, and the finger print information includes referring to
The input area and input sequence of line and fingerprint;
In the step, finger print information that acquisition for mobile terminal user is inputted based on preset touch region, the finger print information bag
Include the input area and input sequence of fingerprint and fingerprint.Such as fingerprint of the user based on the input in preset touch region in Fig. 4
Information can be:Left hand thumb fingerprint is inputted in preset touch region 1 first, is then continuously inputted in preset touch region 2
Right hand thumb fingerprint twice, then continuously input left hand thumb fingerprint twice in preset touch region 1 again.
Step S30, the fingerprint in the finger print information is converted to according to the input area of fingerprint and input sequence to be tested
The finger-print cipher of card;
Acquisition for mobile terminal is to after finger print information, according to the input area of fingerprint in finger print information and input sequence by fingerprint
Be converted to finger-print cipher to be verified.Specifically, can pre-set between different preset touch regions and kinds of characters
Corresponding relation, for example the corresponding character " 1 " of preset touch region 1 in Fig. 4, the corresponding character " 2 " of preset touch region 2 are set;Afterwards
Continue when user is based on the touch control operation of progress of preset touch region 1, mobile terminal specifically will be designated as character by touch control operation
" 1 ", when user, which is based on preset touch region 2, carries out a touch control operation, mobile terminal specifically will be designated as word by touch control operation
Accord with " 2 ".
Such as when user input finger print information for first preset touch region 1 input left hand thumb fingerprint, then
Right hand thumb fingerprint twice is continuously inputted in preset touch region 2, then continuously input is left twice in preset touch region 1 again
During hand thumb fingerprint, mobile terminal is to be changed the fingerprint in the finger print information according to the input area and input sequence of fingerprint
For finger-print cipher " 12211 " to be verified.
It should be noted that finger-print cipher to be verified is not limited to above-mentioned numerical ciphers or letter (such as
" ABBAA "), Chinese character (such as " left and right is right left ") or the other-end character or picture that can identify, during specific implementation
The type of finger-print cipher can flexibly be set;It is further to note that the total degree that user inputs fingerprint also can flexibly be set
Put, it will be understood that the total degree that user inputs fingerprint is more, and the length of finger-print cipher is also longer, and cipher safety is also better;
Further, it is also possible to set interval for the input of fingerprint twice, if detected in the preset duration after this input fingerprint
Fingerprint input next time is not received, then user can be prompted to re-enter password.
Step S40, judges whether the finger-print cipher to be verified matches with default finger-print cipher, if so, then judging
Finger print identifying passes through.
After finger-print cipher to be verified is obtained, mobile terminal judge the finger-print cipher to be verified whether with default finger
Line password match, if so, then judging that finger print identifying passes through.Such as when finger-print cipher to be verified is " 12211 ", and it is default
When finger-print cipher is also " 12211 ", both matchings are judged, finger print identifying passes through;When finger-print cipher to be verified is " 12211 ",
And default finger-print cipher judges that both mismatch when being also " 12121 ", now mobile terminal can prompt user cipher to input
Mistake simultaneously re-enters password.
In finger print identifying by rear, mobile terminal unlocks function corresponding with this finger print identifying, such as, in screen locking shape
Finger print identifying is by rear under state, and mobile terminal unlocks display screen, based on the finger print identifying that file unlocks by rear, it is mobile eventually
End i.e. unblock respective file, for finger print identifying by rear, mobile terminal allows user complete using electronic account under pay status
Into payment, etc..
In the present embodiment, mobile terminal receives Password Input request, is asked to show that password is defeated according to the Password Input
Enter interface, the interface for password input includes two different preset touch regions;Obtain user and be based on the preset touch area
The finger print information of domain input, the finger print information include the input area and input sequence of fingerprint and fingerprint;According to fingerprint
Input area and input sequence are converted to the fingerprint in the finger print information finger-print cipher to be verified;Judge described to be verified
Finger-print cipher whether matched with default finger-print cipher, if so, then judge finger print identifying pass through.By the above-mentioned means, this reality
Example combination fingerprint, the input area of fingerprint and the input sequence of fingerprint are applied, ultimately generates finger-print cipher, and be based on the finger-print cipher
Finger print identifying is carried out, relative to single finger print identifying mode of the prior art, the present embodiment combines relevant with fingerprint more
Individual information, so as to improve the security of finger print identifying, the security password security for solving existing mobile terminal is relatively low
Technical problem.
Further, reference picture 6, Fig. 6 are the schematic flow sheet of fingerprint verification method second embodiment of the present invention.Based on upper
The embodiment shown in Fig. 3 is stated, before step S10, can also be included:
Step S50, receive finger-print cipher and instruction is set, set instruction display to include according to the finger-print cipher described default
The password of touch area sets interface;
Step S60, obtain the finger print information of at least two fingerprints of the user based on preset touch region typing;
Step S70, it is according to finger-print cipher corresponding to the finger print information generation got, the fingerprint of generation is close
Code is used as default finger-print cipher.
In the present embodiment, before finger print identifying is carried out, mobile terminal need to pre-set finger-print cipher.Specifically, move
The finger-print cipher that dynamic terminal can receive user's triggering sets instruction, and sets instruction display to include two according to the finger-print cipher
The password in different preset touch regions sets interface, then, obtains user based on preset touch region typing at least
The finger print information of two fingerprints, wherein, two fingerprints can be the fingerprint of different fingers or the fingerprint of identical finger,
Finger print information includes the input area and input sequence of fingerprint and fingerprint;Afterwards, mobile terminal is believed according to the fingerprint got
Finger-print cipher corresponding to breath generation, the process of the generation finger-print cipher can refer in fingerprint verification method first embodiment of the present invention
Finger-print cipher generating process, do not repeat herein;After finger-print cipher is generated, mobile terminal will the finger-print cipher as pre-
If finger-print cipher.
Further, after the step s 70, can also include:Judge encrypt corresponding with the default finger-print cipher
Whether content is related to payment;If so, then the default finger-print cipher is sent to corresponding server;If it is not, then by described in
Default finger-print cipher preserves local to mobile terminal.
After finger-print cipher is generated, mobile terminal can also judge whether encrypted content corresponding with the finger-print cipher is related to
Pay, such as, be that payment cipher is set under shopping APP operation interface when detecting user, mobile terminal can determine that with
Encrypted content corresponding to the finger-print cipher is related to payment;When encrypted content corresponding with default finger-print cipher is related to payment,
Mobile terminal sends the default finger-print cipher to corresponding server, so that server is carried out to the default finger-print cipher
Preserve, and when encrypted content corresponding with default finger-print cipher is not related to payment, mobile terminal can be by the default finger
Line password is preserved to local.
Further, before step S50, can also include:Receive touch area and instruction is set;According to the Touch Zone
Domain sets instruction to set a touch area respectively on the relative both sides of mobile terminal display screen, and the touch area of setting is made
For finger-print cipher typing region.
In the present embodiment, mobile terminal can receive the touch area setting instruction of user, then according to the Touch Zone
Domain sets instruction to set a touch area respectively on the relative both sides of display screen, and using the touch area of setting as fingerprint
Password typing region, wherein, the position of touch area and big I are flexibly set, such as, operate for the convenience of the user, touch area
The edge middle position of display screen can be arranged on, certainly, the edge that touch area can also be arranged on display screen is on the upper side or inclined
Under position, or other positions.
In the present embodiment, the password that preset touch region is included by providing sets interface for users to set fingerprint close
Code, premise is provided for follow-up cipher authentication.
Further, reference picture 7, Fig. 7 are the schematic flow sheet of fingerprint verification method 3rd embodiment of the present invention.Based on upper
The embodiment shown in Fig. 3 is stated, step S30 can include:
Step S31, judge whether the fingerprint in the finger print information is effective fingerprint;
If so, step S32 is then performed, according to default fingerprint input area and the corresponding relation of character, by the fingerprint
Be converted to corresponding character;
Step S33, by the character arrangements being converted to be a character string according to the input sequence of the fingerprint, will described in
Character string is as finger-print cipher to be verified.
Wherein, step S31 can include:Judge whether the fingerprint in the finger print information is authorized in fingerprint base with default
Fingerprint matching;If so, then judge that the fingerprint is effective fingerprint.Accordingly, before step S10, can also include:Establish
Fingerprint base is authorized, the mandate fingerprint base includes several and authorizes fingerprint.Further, above-mentioned character is numeral or letter.
In the present embodiment, mobile terminal is converted to the fingerprint in the finger print information got finger-print cipher to be verified
Process it is as follows:
First, it is determined that whether the fingerprint in finger print information is effective fingerprint, therefore, a mandate fingerprint can be pre-established
Storehouse, the mandate fingerprint base include several and authorize fingerprint, and it is the fingerprint with Password Input authority to authorize fingerprint, for example is moved
The left hand thumb fingerprint that terminal receives user's typing simultaneously authorizes to the fingerprint, and user can pass through during subsequent fingerprint certification
Left hand thumb carries out fingerprint input operation, specifically, mobile terminal may determine that fingerprint in finger print information whether with it is default
Authorize fingerprint base in fingerprint matching, if so, then judging that the fingerprint is effective fingerprint.Judge in addition, working as in finger print information
Whether fingerprint is with after the fingerprint matching in default mandate fingerprint base, can also determine whether the input area of the fingerprint with presetting
Input area matching, if so, then judge that the fingerprint be effective fingerprint, for example left hand thumb fingerprint in Fig. 4 can be set
It can be inputted by preset touch region 1, and right hand thumb fingerprint can only be inputted by preset touch region 2.
Then, mobile terminal is converted to the fingerprint according to default fingerprint input area and the corresponding relation of character
Corresponding character, for example the corresponding character " 1 " of preset touch region 1 in Fig. 4, the corresponding character " 2 " of preset touch region 2 are set;
Subsequently when user, which is based on preset touch region 1, carries out a touch control operation, mobile terminal specifically will be designated as word by touch control operation
Accord with " 1 ", when user, which is based on preset touch region 2, carries out a touch control operation, mobile terminal specifically touch control operation will be designated as
Character " 2 ".
Afterwards, the character arrangements being converted to are a character string according to the input sequence of the fingerprint by mobile terminal,
And using the character string as finger-print cipher to be verified, such as, when the finger print information of user's input is first in preset touch
Region 1 inputs left hand thumb fingerprint, then continuously inputs right hand thumb fingerprint twice, Ran Houzai in preset touch region 2
In preset touch region 1 during continuously input left hand thumb fingerprint twice, mobile terminal i.e. should according to the input sequence of fingerprint
Fingerprint in finger print information is converted to finger-print cipher to be verified " 12211 ", by the way that fingerprint is converted into numeral or letter, is easy to
Mobile terminal identifies and follow-up comparison,
By the above-mentioned means, it is effective fingerprint that only the fingerprint of user can be determined as by mobile terminal, and it is
Other people is replicated the finger print information of user, due to be not aware that fingerprint typing order, therefore can not by finger print identifying,
So as to which the present embodiment can lift the security of finger print identifying.
The present invention also provides a kind of computer-readable recording medium.
Finger print identifying program is stored with computer-readable recording medium of the present invention, the finger print identifying program is by processor
Following steps are realized during execution:
Password Input request is received, is asked to show interface for password input, Password Input circle according to the Password Input
Face includes two different preset touch regions;
The finger print information that user is inputted based on the preset touch region is obtained, the finger print information includes fingerprint and referred to
The input area and input sequence of line;
Fingerprint to be verified is converted to the fingerprint in the finger print information according to the input area of fingerprint and input sequence
Password;
Judge whether the finger-print cipher to be verified matches with default finger-print cipher, if so, then judging finger print identifying
Pass through.
Further, following steps are also realized when the finger print identifying program is executed by processor:
Receive finger-print cipher and instruction is set, set instruction display to include the preset touch region according to the finger-print cipher
Password set interface;
Obtain the finger print information of at least two fingerprints of the user based on preset touch region typing;
According to finger-print cipher corresponding to the finger print information generation got, using the finger-print cipher of generation as pre-
If finger-print cipher.
Further, following steps are also realized when the finger print identifying program is executed by processor:
Judge whether encrypted content corresponding with the default finger-print cipher is related to payment;
If so, then the default finger-print cipher is sent to corresponding server;
If it is not, then the default finger-print cipher is preserved local to mobile terminal.
Further, following steps are also realized when the finger print identifying program is executed by processor:
Receive touch area and instruction is set;
Set instruction that one touch area is set respectively on the relative both sides of mobile terminal display screen according to the touch area,
Using the touch area of setting as finger-print cipher typing region.
Further, following steps are also realized when the finger print identifying program is executed by processor:
Judge whether the fingerprint in the finger print information is effective fingerprint;
If so, then the fingerprint is converted to corresponding according to default fingerprint input area and the corresponding relation of character
Character;
By the character arrangements being converted to it is a character string according to the input sequence of the fingerprint, the character string is made
For finger-print cipher to be verified.
Further, following steps are also realized when the finger print identifying program is executed by processor:
Judge fingerprint in the finger print information whether with the fingerprint matching in default mandate fingerprint base;
If so, then judge that the fingerprint is effective fingerprint.
Further, following steps are also realized when the finger print identifying program is executed by processor:
Establish and authorize fingerprint base, the mandate fingerprint base includes several and authorizes fingerprint.
Further, the character is numeral or letter.
Wherein, the method that the finger print identifying program run on the processor is realized when being performed can refer to the present invention
Fingerprint verification method embodiment, here is omitted.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
1. a kind of fingerprint verification method, it is characterised in that the fingerprint verification method comprises the following steps:
Password Input request is received, is asked to show interface for password input, the interface for password input bag according to the Password Input
Include two different preset touch regions;
Obtain the finger print information that input based on the preset touch region of user, the finger print information is including fingerprint and fingerprint
Input area and input sequence;
Finger-print cipher to be verified is converted to the fingerprint in the finger print information according to the input area of fingerprint and input sequence;
Judge whether the finger-print cipher to be verified matches with default finger-print cipher, if so, then judging that finger print identifying passes through.
2. fingerprint verification method as claimed in claim 1, it is characterised in that the reception Password Input request, according to described
The step of Password Input request shows interface for password input, and the interface for password input includes two different preset touch regions
Before, in addition to:
Receive finger-print cipher and instruction is set, set instruction display to include the close of the preset touch region according to the finger-print cipher
Code sets interface;
Obtain the finger print information of at least two fingerprints of the user based on preset touch region typing;
According to finger-print cipher corresponding to the finger print information generation got, using the finger-print cipher of generation as default
Finger-print cipher.
3. fingerprint verification method as claimed in claim 2, it is characterised in that the finger print information life that the basis is got
Into corresponding finger-print cipher, using the finger-print cipher of generation as the step of default finger-print cipher after, in addition to:
Judge whether encrypted content corresponding with the default finger-print cipher is related to payment;
If so, then the default finger-print cipher is sent to corresponding server;
If it is not, then the default finger-print cipher is preserved local to mobile terminal.
4. fingerprint verification method as claimed in claim 2, it is characterised in that the reception finger-print cipher sets instruction, according to
Before the step of finger-print cipher sets instruction display to include the password setting interface in the preset touch region, in addition to:
Receive touch area and instruction is set;
Set instruction that one touch area is set respectively on the relative both sides of mobile terminal display screen according to the touch area, will set
The touch area put is as finger-print cipher typing region.
5. fingerprint verification method as claimed in claim 1, it is characterised in that the input area according to fingerprint and input are suitable
The step of fingerprint in the finger print information is converted to finger-print cipher to be verified by sequence includes:
Judge whether the fingerprint in the finger print information is effective fingerprint;
If so, the fingerprint is then converted to by corresponding character according to default fingerprint input area and the corresponding relation of character;
By the character arrangements being converted to it is a character string according to the input sequence of the fingerprint, using the character string as treating
The finger-print cipher of checking.
6. fingerprint verification method as claimed in claim 5, it is characterised in that the fingerprint that judges in the finger print information is
No the step of being effective fingerprint, includes:
Judge fingerprint in the finger print information whether with the fingerprint matching in default mandate fingerprint base;
If so, then judge that the fingerprint is effective fingerprint.
7. fingerprint verification method as claimed in claim 6, it is characterised in that the reception Password Input request, according to described
The step of Password Input request shows interface for password input, and the interface for password input includes two different preset touch regions
Before, in addition to:
Establish and authorize fingerprint base, the mandate fingerprint base includes several and authorizes fingerprint.
8. the fingerprint verification method as any one of claim 5 to 7, it is characterised in that the character is numeral or word
It is female.
9. a kind of mobile terminal, it is characterised in that the mobile terminal includes:Memory, processor and it is stored in the storage
On device and the finger print identifying program that can run on the processor, the finger print identifying program is by real during the computing device
Now the step of fingerprint verification method as any one of claim 1 to 8.
10. a kind of computer-readable recording medium, it is characterised in that be stored with fingerprint on the computer-readable recording medium and recognize
Program is demonstrate,proved, the finger print identifying as any one of claim 1 to 8 is realized when the finger print identifying program is executed by processor
The step of method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711234782.5A CN107862196A (en) | 2017-11-29 | 2017-11-29 | Fingerprint verification method, mobile terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711234782.5A CN107862196A (en) | 2017-11-29 | 2017-11-29 | Fingerprint verification method, mobile terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107862196A true CN107862196A (en) | 2018-03-30 |
Family
ID=61704080
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711234782.5A Pending CN107862196A (en) | 2017-11-29 | 2017-11-29 | Fingerprint verification method, mobile terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107862196A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108400994A (en) * | 2018-05-30 | 2018-08-14 | 努比亚技术有限公司 | User authen method, mobile terminal, server and computer readable storage medium |
CN108989041A (en) * | 2018-05-03 | 2018-12-11 | 北京集创北方科技股份有限公司 | Encryption method and device, decryption method and device |
CN108985034A (en) * | 2018-06-22 | 2018-12-11 | 维沃移动通信有限公司 | A kind of unlocking method and terminal device |
CN109543381A (en) * | 2018-11-22 | 2019-03-29 | Oppo广东移动通信有限公司 | Solve lock control method and electronic device |
CN109829280A (en) * | 2019-01-25 | 2019-05-31 | 努比亚技术有限公司 | A kind of unlocking method and terminal, computer readable storage medium |
CN111126291A (en) * | 2019-12-25 | 2020-05-08 | 奕力科技股份有限公司 | Multi-fingerprint detection device and multi-fingerprint authentication method |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104933337A (en) * | 2015-05-22 | 2015-09-23 | 广东欧珀移动通信有限公司 | Method for realizing fingerprint unlocking and intelligent terminal |
CN105631276A (en) * | 2015-05-21 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint password verification method and system, and terminal |
-
2017
- 2017-11-29 CN CN201711234782.5A patent/CN107862196A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631276A (en) * | 2015-05-21 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint password verification method and system, and terminal |
CN104933337A (en) * | 2015-05-22 | 2015-09-23 | 广东欧珀移动通信有限公司 | Method for realizing fingerprint unlocking and intelligent terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108989041A (en) * | 2018-05-03 | 2018-12-11 | 北京集创北方科技股份有限公司 | Encryption method and device, decryption method and device |
CN108400994A (en) * | 2018-05-30 | 2018-08-14 | 努比亚技术有限公司 | User authen method, mobile terminal, server and computer readable storage medium |
CN108400994B (en) * | 2018-05-30 | 2022-06-03 | 深圳市马博士网络科技有限公司 | User authentication method, mobile terminal, server, and computer-readable storage medium |
CN108985034A (en) * | 2018-06-22 | 2018-12-11 | 维沃移动通信有限公司 | A kind of unlocking method and terminal device |
CN108985034B (en) * | 2018-06-22 | 2020-05-12 | 维沃移动通信有限公司 | Unlocking method and terminal equipment |
CN109543381A (en) * | 2018-11-22 | 2019-03-29 | Oppo广东移动通信有限公司 | Solve lock control method and electronic device |
CN109829280A (en) * | 2019-01-25 | 2019-05-31 | 努比亚技术有限公司 | A kind of unlocking method and terminal, computer readable storage medium |
CN111126291A (en) * | 2019-12-25 | 2020-05-08 | 奕力科技股份有限公司 | Multi-fingerprint detection device and multi-fingerprint authentication method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107862196A (en) | Fingerprint verification method, mobile terminal and computer-readable recording medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN108197441A (en) | Flexible screen terminal and its solution lock control method, computer readable storage medium | |
CN107392013A (en) | A kind of terminal safety protection method, terminal and computer-readable recording medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN107122817A (en) | Processing method and Quick Response Code terminal based on Quick Response Code | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN109885999A (en) | A kind of account register method, terminal and computer readable storage medium | |
CN107517208A (en) | Apparatus control method, device and computer-readable recording medium | |
CN107360139A (en) | A kind of mobile terminal, data ciphering method and computer-readable recording medium | |
CN107563158A (en) | Show hiden application figure calibration method, equipment and computer-readable recording medium | |
CN107295501A (en) | Information updating method, terminal, server and computer-readable recording medium | |
CN107846675A (en) | Register method, terminal, registrar and computer-readable recording medium | |
CN108196762A (en) | A kind of terminal control method, terminal and computer readable storage medium | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN107276991A (en) | Load method, equipment and the computer-readable recording medium of Web page | |
CN108989534A (en) | Message prompt method, mobile terminal and computer readable storage medium | |
CN108601062A (en) | WiFi connections sharing method, terminal and computer storage media | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107330314A (en) | Authorization method, mobile terminal and readable storage medium storing program for executing based on biological characteristic | |
CN107220554A (en) | A kind of file forwarding management method and corresponding system, terminal device | |
CN107330313A (en) | Application control method, mobile terminal and readable storage medium storing program for executing | |
CN107317680A (en) | Labeling method, system and the computer-readable recording medium of secured account numbers | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180330 |
|
RJ01 | Rejection of invention patent application after publication |