CN109376519A - A kind of unlocked by fingerprint method and terminal device - Google Patents

A kind of unlocked by fingerprint method and terminal device Download PDF

Info

Publication number
CN109376519A
CN109376519A CN201811244212.9A CN201811244212A CN109376519A CN 109376519 A CN109376519 A CN 109376519A CN 201811244212 A CN201811244212 A CN 201811244212A CN 109376519 A CN109376519 A CN 109376519A
Authority
CN
China
Prior art keywords
terminal equipment
information
fingerprint
finger print
print information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811244212.9A
Other languages
Chinese (zh)
Other versions
CN109376519B (en
Inventor
童文敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201811244212.9A priority Critical patent/CN109376519B/en
Publication of CN109376519A publication Critical patent/CN109376519A/en
Application granted granted Critical
Publication of CN109376519B publication Critical patent/CN109376519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Collating Specific Patterns (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of unlocked by fingerprint method and terminal devices, and wherein unlocked by fingerprint method includes: that first terminal equipment receives the target fingerprint information that second terminal equipment is sent;Target fingerprint information is determined as to the unlock finger print information of first terminal equipment;The input of the first fingerprint is received, when the input of the first fingerprint and the unlock finger print information of first terminal equipment match, first terminal equipment is unlocked in response to the input of the first fingerprint.The embodiment of the present invention increases the function of fingerprint transmission, it is shared to can be realized user fingerprints, so that the available relevant information of user by authorization, realizes the shared of both terminal equipment stored information, the limitation that could previously must have been unlocked after typing fingerprint on the terminal device is broken.

Description

A kind of unlocked by fingerprint method and terminal device
Technical field
The present invention relates to field of communication technology more particularly to a kind of unlocked by fingerprint method and terminal devices.
Background technique
Currently, during user's using terminal equipment, when user or non-user need to unlock, generally require Prefabricated fingerprint on terminal device, and after unlock, it can check that institute is functional.It is fingerprint matching function, area there are also a kind of scheme Not in the former, there are a fingerprint matching function, two users to be set by fingerprint matching function in respective terminal for terminal device Standby upper authorization other side's fingerprint is stored in oneself terminal device, and can use the unlocked by fingerprint terminal device of deposit.
Current fingerprint authorization unlocking method is confined to that terminal could be unlocked after must first inputting fingerprint on the terminal device There is the drawbacks of unlock limitation in equipment.
Summary of the invention
The embodiment of the present invention provides a kind of unlocked by fingerprint method and terminal device, to solve fingerprint authorization in the prior art Unlocking manner need to shift to an earlier date typing finger print information on the terminal device, there is the drawbacks of unlock limitation.
To solve the above-mentioned problems, the embodiments of the present invention are implemented as follows:
In a first aspect, the embodiment of the present invention provides a kind of unlocked by fingerprint method, it is applied to first terminal equipment, comprising:
Receive the target fingerprint information that second terminal equipment is sent;
Target fingerprint information is determined as to the unlock finger print information of first terminal equipment;
The input of the first fingerprint is received, when the input of the first fingerprint and the unlock finger print information of first terminal equipment match, First terminal equipment is unlocked in response to the input of the first fingerprint.
Second aspect, the embodiment of the present invention also provide a kind of unlocked by fingerprint method, are applied to second terminal equipment, comprising:
The input of the second fingerprint is received, the second fingerprint is obtained and inputs corresponding target fingerprint information;
Target fingerprint information is sent to first terminal equipment.
The third aspect, the embodiment of the present invention provide a kind of first terminal equipment, comprising:
First receiving module, for receiving the target fingerprint information of second terminal equipment transmission;
First determining module, for target fingerprint information to be determined as to the unlock finger print information of first terminal equipment;
Processing module, for receiving the input of the first fingerprint, in the unlock fingerprint of the first fingerprint input and first terminal equipment When information matches, first terminal equipment is unlocked in response to the input of the first fingerprint.
Fourth aspect, the embodiment of the present invention provide a kind of second terminal equipment, comprising:
Module is obtained, for receiving the input of the second fingerprint, the second fingerprint is obtained and inputs corresponding target fingerprint information;
Second sending module, for sending target fingerprint information to first terminal equipment.
5th aspect, the embodiment of the present invention also provide a kind of terminal device, including processor, memory and are stored in storage On device and the computer program that can run on a processor, above-mentioned unlocked by fingerprint is realized when computer program is executed by processor The step of method.
6th aspect, the embodiment of the present invention also provide a kind of computer readable storage medium, computer readable storage medium Upper storage computer program, the step of above-mentioned unlocked by fingerprint method is realized when computer program is executed by processor.
In the embodiment of the present invention, the target fingerprint information of second terminal equipment transmission is received by first terminal equipment, it will Target fingerprint information is determined as the unlock finger print information of first terminal equipment, is receiving and unlock finger print information matched first When fingerprint inputs, first terminal equipment is unlocked, can realize finger print information and terminal on the basis of fingerprint transmits Equipment stored information is shared, and finger print information can guarantee the efficient and convenient of information sharing by remotely being transmitted.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 shows unlocked by fingerprint of embodiment of the present invention method schematic diagrams one;
Fig. 2 indicates unlocked by fingerprint of embodiment of the present invention method schematic diagram two;
Fig. 3 indicates unlocked by fingerprint of embodiment of the present invention method implementation process diagram;
Fig. 4 indicates first terminal of embodiment of the present invention equipment schematic diagram;
Fig. 5 indicates second terminal of embodiment of the present invention equipment schematic diagram;
Fig. 6 indicates the terminal of that embodiment of the invention device hardware structural schematic diagram.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a kind of unlocked by fingerprint method, is applied to first terminal equipment, as shown in Figure 1, comprising:
Step 101 receives the target fingerprint information that second terminal equipment is sent.
First terminal equipment can receive target fingerprint information transmitted by second terminal equipment, wherein first terminal equipment When receiving target fingerprint information, second terminal equipment can be docked by special pipe joint, call WiFi to realize (Near Field Communication, near radio are logical by (WIreless-Fidelity, WiMAX), bluetooth, NFC Letter) or receive target fingerprint information transmitted by second terminal equipment by other means.
It wherein, further include establishing and second terminal equipment before receiving the target fingerprint information that second terminal equipment is sent Between connection, after the connection between foundation and second terminal equipment, correspondingly, receive second terminal equipment send target The process of finger print information are as follows: receive the transmission of second terminal equipment uses the encrypted target fingerprint information of predetermined encryption mode; It is decrypted using default manner of decryption, obtains target fingerprint information.
Before receiving target fingerprint information transmitted by second terminal equipment, it can initially set up and second terminal equipment Between connection, connection here can be WiFi connection, bluetooth connection, NFC connection or the connection of other modes.It is establishing After connection, receive second terminal equipment send by encrypted target fingerprint information, wherein second terminal equipment is right When target fingerprint information is encrypted, used cipher mode is predetermined encryption mode, and first terminal equipment receives encryption After target fingerprint information afterwards, can using default manner of decryption corresponding with predetermined encryption mode to target fingerprint information into Row decryption, and then target fingerprint information transmitted by available second terminal equipment.
It should be noted that predetermined encryption mode and default manner of decryption are first terminal equipment and second terminal equipment Shared information.Second terminal equipment used cipher mode when encrypting to target fingerprint information is first terminal equipment It is known, therefore first terminal equipment is after receiving the target fingerprint information of encryption, it can be according to corresponding manner of decryption It is decrypted.In the above process, by being encrypted to the target fingerprint information transmitted, it is ensured that the safety of information transmitting Property.
Step 102, the unlock finger print information that target fingerprint information is determined as to first terminal equipment.
First terminal equipment is after receiving target fingerprint information transmitted by second terminal equipment, the mesh that will receive Mark finger print information is determined as unlock finger print information corresponding to first terminal equipment.
The step of target fingerprint information is wherein determined as to the unlock finger print information of first terminal equipment, comprising: determine Whether two terminal devices are the first legitimate device;If second terminal equipment is the first legitimate device, second terminal equipment is sent Target fingerprint information be determined as the unlock finger print information of first terminal equipment, and store to the unlock fingerprint of first terminal equipment In information storage area.It should be noted that the unlock finger print information of first terminal equipment may include multiple, target fingerprint information Only one of unlock finger print information, multiple unlock finger print informations here may include first terminal equipment user The finger print information of finger print information and other users.
When determining target fingerprint information is the unlock finger print information of first terminal equipment, need to detect transmission target fingerprint Whether the second terminal equipment of information belongs to preset first legitimate device, wherein whether detection second terminal equipment belongs to first The process of legitimate device includes: in preset first white list of detection with the presence or absence of second terminal equipment, or detects whether to connect It receives user and confirms that second terminal equipment is the operation of the first legitimate device.If there are second terminal equipment in the first white list, Or the confirmation operation of user is received, it can determine that second terminal equipment is the first legitimate device.
After determining that second terminal equipment is the first legitimate device, target transmitted by second terminal equipment can be referred to Line information is determined as the unlock finger print information of first terminal equipment, then stores target fingerprint information to first terminal equipment It unlocks in finger print information memory block.
By detecting whether second terminal equipment belongs to the first legitimate device, it is ensured that the standard that unlock finger print information determines True property avoids the occurrence of the case where accidentally confirmation unlocks finger print information.
Step 103 receives the input of the first fingerprint, in the unlock finger print information phase of the first fingerprint input and first terminal equipment When matching, first terminal equipment is unlocked in response to the input of the first fingerprint.
After target fingerprint information to be determined as to the unlock finger print information of first terminal equipment, the of user can receive The input of one fingerprint can root if the unlock finger print information of the input of the first fingerprint and first terminal equipment that receive matches First terminal equipment is unlocked according to the input of the first fingerprint.
Wherein, the input of the first fingerprint is received, in the unlock finger print information phase of the first fingerprint input and first terminal equipment Timing inputs the process being unlocked to first terminal equipment in response to the first fingerprint are as follows: the input of the first fingerprint is received, in response to The input of first fingerprint obtains the first fingerprint and inputs corresponding finger print information;First fingerprint is inputted into corresponding finger print information and the The unlock finger print information of one terminal device compares;The solution of corresponding finger print information Yu first terminal equipment is inputted in the first fingerprint When lock finger print information matches, first terminal equipment is unlocked.
After the first fingerprint input for receiving user, corresponding finger print information is obtained in response to the input of the first fingerprint, The corresponding finger print information of first fingerprint input is compared with the unlock finger print information of first terminal equipment, in the first fingerprint Input corresponding finger print information and first terminal equipment any unlock finger print information match in the case where, can be in response to the The input of one fingerprint executes the unlock to first terminal equipment.
Wherein the unlock finger print information of first terminal equipment includes at least two, one of them is first terminal equipment itself The unlock finger print information of the first terminal equipment user stored, another is target fingerprint information, certainly can also be according to reality Border situation is unlock finger print information come the finger print information for determining other users.Here the first fingerprint input can be any user Input to first terminal equipment.Pass through the first fingerprint input that will be received corresponding finger print information and first terminal equipment Any unlock finger print information be compared, it is ensured that according to the first fingerprint input first terminal equipment is unlocked it is effective Property, avoid the occurrence of the first fingerprint input with wherein one unlock finger print information match can not but be unlocked the case where.
In embodiments of the present invention, the step of target fingerprint information is determined as to the unlock finger print information of first terminal equipment Later, further includes: authenticate success message to second terminal equipment feedback target finger print information.
Determine that the second terminal equipment for sending target fingerprint information is the first legitimate device in first terminal equipment, by target Finger print information is determined as after the unlock finger print information of first terminal equipment, can be anti-by target fingerprint authentification of message success message It is fed to second terminal equipment, so far second terminal equipment user can solve first terminal equipment according to target fingerprint information Lock operation.
In embodiments of the present invention, the step of target fingerprint information is determined as to the unlock finger print information of first terminal equipment Later, further includes: generate the operation button shared with second terminal facility information.
After target fingerprint information to be determined as to the unlock finger print information of first terminal equipment, it can be generated with second eventually The operation button of end equipment information sharing can form the overlapping trees for being specific to second terminal equipment by this operation button, Operating procedure of the key operation by information sharing to other side, when reducing shared may be implemented.It can wherein be set in second terminal Standby user unlocks successfully laggard row information to first terminal equipment according to target fingerprint information and shares.
In embodiments of the present invention, the step of target fingerprint information is determined as to the unlock finger print information of first terminal equipment Later, further includes: determine access authority of the target fingerprint information in first terminal equipment.
After target fingerprint information to be determined as to the unlock finger print information of first terminal equipment, it can be set in first terminal The access authority of standby middle determining target fingerprint information, such as setting address list, short message are not allow to access, and can realized at this time Guarantee the privacy of first terminal equipment user while information sharing.
Wherein, when the input of the first fingerprint matches with target fingerprint information, it is being unlocked to first terminal equipment Afterwards, further includes: in response to access authority, execute access control.
Since the access authority of target fingerprint information can be set in first terminal equipment, then the first fingerprint input with In the case that target fingerprint information matches, after being unlocked to first terminal equipment, can according to the access authority of setting, Only show the permitted content of access authority.Such as when setting access authority, determine that address list and short message do not allow to access, then The other information in addition to address list and short message can be shared when executing access control, and the privacy for guaranteeing user may be implemented.
In embodiments of the present invention, while receiving the target fingerprint information that second terminal equipment is sent, further includes: to Second terminal equipment sends the first finger print information;Receive second terminal equipment feedback the first finger print information certification success message or First finger print information authentification failure message.
While receiving the target fingerprint information that second terminal equipment is sent, first can be sent to second terminal equipment Finger print information, the first finger print information here can be the fingerprint that first terminal equipment is stored or the fingerprint re-typed. The target fingerprint information sent by receiving second terminal equipment, and the first finger print information is sent to second terminal equipment, it can be with Authorization identifying request is initiated to second terminal equipment while carrying out authorization identifying to second terminal equipment.
Second terminal equipment is after receiving the first finger print information, if authorization identifying request passes through, first terminal is set The first finger print information that standby receivable second terminal equipment is sent authenticates success message, if authorization identifying request does not pass through, the One terminal device can receive the first finger print information authentification failure message that second terminal equipment is sent.
Wherein after the success of target fingerprint authentification of message and the first finger print information authenticate successfully, first terminal may be implemented and set Standby and second terminal equipment both sides' authorization identifying;If target fingerprint authentification of message success but the first finger print information it is unverified at When function, it can only realize first terminal equipment to the folk prescription authorization identifying of second terminal equipment.
By sending the first finger print information to second terminal equipment, can recognize in target fingerprint information and the first finger print information On the basis of card is successful, both sides' authorization identifying is realized, to guarantee that both sides realize information sharing.
The embodiment of the present invention, it is by receiving the target fingerprint information of second terminal equipment transmission, target fingerprint information is true It is set to the unlock finger print information of first terminal equipment, it is right when receiving the first fingerprint input matched with unlock finger print information First terminal equipment is unlocked, and can realize finger print information and the stored letter of terminal device on the basis of fingerprint transmits Breath is shared, and finger print information can guarantee the efficient and convenient of information sharing by remotely being transmitted.
Furthermore, it by forming a shared key after authorizing successfully, can be provided for the information sharing of both sides More convenient and fast channel simplifies the operating process that information is shared, and can realize the same of information sharing additionally by setting access authority When, guarantee the privacy of terminal device.It, can be successfully basic in certification by sending the first finger print information to second terminal equipment Upper realization both sides' authorization identifying guarantees that both sides realize information sharing.
The embodiment of the present invention also provides a kind of unlocked by fingerprint method, is applied to second terminal equipment, as shown in Figure 2, comprising:
Step 201 receives the input of the second fingerprint, obtains the second fingerprint and inputs corresponding target fingerprint information.
It is directed to for second terminal equipment, can receive the second fingerprint input of user, obtain the second fingerprint and input institute Corresponding target fingerprint information.Wherein the second fingerprint input can in advance receive, can also send target fingerprint information it Preceding reception.
Step 202 sends target fingerprint information to first terminal equipment.
After second terminal equipment obtains the corresponding target fingerprint information of the second fingerprint input, by target fingerprint information It is sent to first terminal equipment, wherein before sending target fingerprint information to first terminal equipment, comprising: foundation and first terminal Connection between equipment;Correspondingly, the step of sending target fingerprint information to first terminal equipment, comprising: establishing and first After connection between terminal device, target fingerprint information is encrypted using predetermined encryption mode;It is sent out to first terminal equipment Send encrypted target fingerprint information.
Before sending target fingerprint information to first terminal equipment, need to initially set up between first terminal equipment Connection, wherein connection between the two can be WiFi connection, bluetooth connection, NFC connection or other connections.Establishing first After connection between terminal device and second terminal equipment, second terminal equipment can be using predetermined encryption mode to target fingerprint Information is encrypted, and after encryption is completed, encrypted target fingerprint information can be sent to first terminal equipment.Wherein Predetermined encryption mode is the shared information of first terminal equipment and second terminal equipment.Second terminal equipment is believed to target fingerprint Breath when being encrypted used cipher mode be that therefore first terminal equipment is receiving encryption known to first terminal equipment Target fingerprint information after, can be decrypted according to corresponding manner of decryption.In the above process, by the mesh transmitted Mark finger print information is encrypted, it is ensured that the safety of information transmitting.
After the step of sending target fingerprint information to first terminal equipment, further includes: receive first terminal equipment for mesh Mark finger print information is determined as unlocking transmitted target fingerprint authentification of message success message after finger print information.
After target fingerprint information is sent to first terminal equipment, and first terminal equipment is by target fingerprint information It is determined as after the unlock finger print information of first terminal equipment, first terminal equipment can send target to second terminal equipment and refer to Line authentification of message success message, second terminal equipment receive target fingerprint authentification of message transmitted by first terminal equipment at After the message of function, it may be implemented to be unlocked first terminal equipment using target fingerprint information.
Wherein, while sending target fingerprint information to first terminal equipment, further includes: receive first terminal equipment hair The first finger print information sent;Detect whether first terminal equipment is the second legitimate device;If first terminal equipment is second legal Equipment feeds back the first finger print information to first terminal equipment and authenticates success message;If first terminal equipment is not second legal to set It is standby, the first finger print information authentification failure message is fed back to first terminal equipment.
While second terminal equipment sends target fingerprint information to first terminal equipment, it can receive first terminal and set Standby the first transmitted finger print information, second terminal equipment can detecte transmission first after receiving the first finger print information Whether the first terminal equipment of finger print information belongs to the second legitimate device, wherein the mode detected can be with are as follows: detection preset the It whether there is first terminal equipment in two white lists, or detect whether that receiving user confirms that first terminal equipment is the second conjunction The operation of method equipment.If there are first terminal equipment in the second white list, or receive the confirmation operation of user, can determine First terminal equipment is the second legitimate device.
If it is determined that first terminal equipment is the second legitimate device, then the certification of the first finger print information is fed back to first terminal equipment Otherwise success message needs to feed back the first finger print information authentification failure message to first terminal equipment.If wherein target fingerprint is believed Breath authenticates successfully and after the first finger print information authenticates successfully, and the both sides that first terminal equipment and second terminal equipment may be implemented award Power certification;If can only realize that first terminal is set in the success of target fingerprint authentification of message but unverified successful the first finger print information The standby folk prescription authorization identifying to second terminal equipment.
It, can be successfully basic in target fingerprint information and the certification of the first finger print information by receiving the first finger print information On, both sides' authorization identifying is realized, to guarantee that both sides realize information sharing.
The embodiment of the present invention, by first terminal equipment send target fingerprint information, target fingerprint authentification of message at When function, using target fingerprint information to first terminal equipment unlock, can fingerprint transmit on the basis of, realize finger print information with And terminal device stored information is shared, and finger print information can guarantee the quick of information sharing by remotely being transmitted It is convenient.
The first finger print information sent by receiving first terminal equipment, while the first finger print information authenticates successfully, It realizes both sides' authorization identifying, guarantees that both sides realize the shared of information.
It is introduced below by implementing procedure of the specific example to the embodiment of the present invention, as shown in Figure 3:
Step 301, second terminal equipment determine target fingerprint information.
Target fingerprint information is transmitted to first terminal equipment by step 302.
It can be transmitted using predetermined encryption mode in transmission, to guarantee the safety of information transmission.
Step 303, first terminal equipment judge whether to be determined as target fingerprint information to unlock finger print information, if then holding Row step 304, it is no to then follow the steps 306.
Wherein while first terminal equipment receives target fingerprint information, first can also be sent to second terminal equipment Finger print information carries out authorization identifying request, after target fingerprint information and the first finger print information authenticate successfully, may be implemented The authorization identifying of both sides.Wherein authenticating and successfully refer to that target fingerprint information can be used as the unlock of first terminal equipment and refer to here Line information, the first finger print information can be used as the unlock finger print information of second terminal equipment.Only target fingerprint authentification of message at , it can be achieved that folk prescription authorization identifying when function.
Step 304 generates the key that information sharing is carried out with second terminal equipment.
Step 305, the access authority that target fingerprint information is set.
Step 306 feeds back authentication failure message to second terminal equipment.
The above-mentioned interaction flow for first terminal of embodiment of the present invention equipment and second terminal equipment, passes through above-mentioned embodiment party Formula can realize the shared of finger print information and terminal device stored information, and finger print information on the basis of fingerprint mutually passes It can guarantee the efficient and convenient of information sharing by remotely being transmitted.
The embodiment of the present invention also provides a kind of first terminal equipment, as shown in Figure 4, comprising:
First receiving module 10, for receiving the target fingerprint information of second terminal equipment transmission;
First determining module 20, for target fingerprint information to be determined as to the unlock finger print information of first terminal equipment;
Processing module 30 refers to for receiving the input of the first fingerprint in the input of the first fingerprint and the unlock of first terminal equipment When line information matches, first terminal equipment is unlocked in response to the input of the first fingerprint.
Wherein, first terminal equipment further include:
First establishes module, for the first receiving module receive second terminal equipment send target fingerprint information it Before, establish the connection between second terminal equipment;
First receiving module includes:
Receiving submodule, for receiving second after first establishes the connection between module foundation and second terminal equipment What terminal device was sent uses the encrypted target fingerprint information of predetermined encryption mode;
First acquisition submodule obtains target fingerprint information for being decrypted using default manner of decryption.
Wherein, the first determining module includes:
First determines submodule, for determining whether second terminal equipment is the first legitimate device;
Second determines submodule, if being the first legitimate device for second terminal equipment, second terminal equipment is sent Target fingerprint information is determined as the unlock finger print information of first terminal equipment, and stores to the unlock fingerprint letter of first terminal equipment It ceases in memory block.
Wherein, first terminal equipment further include:
First feedback module, for target fingerprint information to be determined as to the unlock of first terminal equipment in the first determining module After finger print information, success message is authenticated to second terminal equipment feedback target finger print information.
Wherein, first terminal equipment further include:
Generation module, for target fingerprint information to be determined as to the unlock fingerprint of first terminal equipment in the first determining module After information, the operation button shared with second terminal facility information is generated.
Wherein, processing module includes:
Second acquisition submodule inputs in response to the first fingerprint for receiving the input of the first fingerprint, it is defeated to obtain the first fingerprint Enter corresponding finger print information;
Comparative sub-module, the unlock fingerprint for the first fingerprint to be inputted corresponding finger print information and first terminal equipment are believed Manner of breathing compares;
Submodule is unlocked, the unlock fingerprint for inputting corresponding finger print information and first terminal equipment in the first fingerprint is believed When manner of breathing matches, first terminal equipment is unlocked.
Wherein, first terminal equipment further include:
Second determining module, for target fingerprint information to be determined as to the unlock of first terminal equipment in the first determining module After finger print information, access authority of the target fingerprint information in first terminal equipment is determined.
Wherein, first terminal equipment further include:
Execution module matches for inputting in the first fingerprint with target fingerprint information, and processing module sets first terminal After being unlocked, in response to access authority, access control is executed.
Wherein, first terminal equipment further include:
First sending module, for receiving the same of the target fingerprint information that second terminal equipment is sent in the first receiving module When, the first finger print information is sent to second terminal equipment;
Second receiving module, the first finger print information for receiving second terminal equipment feedback authenticate success message or first Finger print information authentification failure message.
First terminal equipment provided in an embodiment of the present invention, the target fingerprint by receiving the transmission of second terminal equipment are believed Target fingerprint information, is determined as the unlock finger print information of first terminal equipment by breath, is matched receiving with unlock finger print information The first fingerprint input when, first terminal equipment is unlocked, can fingerprint transmit on the basis of, realize finger print information with And terminal device stored information is shared, and finger print information can guarantee the quick of information sharing by remotely being transmitted It is convenient.Furthermore, it by forming a shared key after authorizing successfully, can be provided more just for the information sharing of both sides Prompt channel simplifies the operating process that information is shared, additionally by setting access authority can while realizing information sharing, Guarantee the privacy of terminal device.It, can be on the basis of certification be successful by sending the first finger print information to second terminal equipment It realizes both sides' authorization identifying, guarantees that both sides realize information sharing.
The embodiment of the present invention also provides a kind of second terminal equipment, as shown in Figure 5, comprising:
Module 40 is obtained, for receiving the input of the second fingerprint, the second fingerprint is obtained and inputs corresponding target fingerprint information;
Second sending module 50, for sending target fingerprint information to first terminal equipment.
Wherein, second terminal equipment further include:
Second establishes module, before sending target fingerprint information to first terminal equipment for the second sending module, establishes With the connection between first terminal equipment;
Second sending module includes:
Submodule is encrypted, for establishing after module establishes the connection between first terminal equipment second, using default Cipher mode encrypts target fingerprint information;
Sending submodule, for sending encrypted target fingerprint information to first terminal equipment.
Wherein, second terminal equipment further include:
Third receiving module, for receiving after the second sending module sends target fingerprint information to first terminal equipment Target fingerprint information is determined as unlocking transmitted target fingerprint authentification of message after finger print information and successfully disappeared by first terminal equipment Breath.
Wherein, second terminal equipment further include:
4th receiving module is used for while the second sending module sends target fingerprint information to first terminal equipment, Receive the first finger print information that first terminal equipment is sent;
Detection module, for detecting whether first terminal equipment is the second legitimate device;
Second feedback module, if being the second legitimate device for first terminal equipment, to first terminal equipment feedback first Finger print information authenticates success message;
Third feedback module, if not being the second legitimate device for first terminal equipment, to first terminal equipment feedback the One finger print information authentification failure message.
Second terminal equipment provided in an embodiment of the present invention, by sending target fingerprint information to first terminal equipment, When the success of target fingerprint authentification of message, first terminal equipment is unlocked using target fingerprint information, the base that can be transmitted in fingerprint On plinth, realize the shared of finger print information and terminal device stored information, and finger print information can by remotely being transmitted, Guarantee the efficient and convenient of information sharing;The first finger print information sent by receiving first terminal equipment, in the first finger print information While certification successfully, both sides' authorization identifying is realized, guarantee that both sides realize the shared of information.
A kind of hardware structural diagram of Fig. 6 terminal device of each embodiment to realize the present invention, the terminal device 600 Including but not limited to: radio frequency unit 601, audio output unit 603, input unit 604, sensor 605, is shown network module 602 Show the components such as unit 606, user input unit 607, interface unit 608, memory 609, processor 610 and power supply 611.
It will be understood by those skilled in the art that terminal device structure shown in Fig. 6 does not constitute the limit to terminal device Fixed, terminal device may include perhaps combining certain components or different component cloth than illustrating more or fewer components It sets.In embodiments of the present invention, terminal device includes but is not limited to mobile phone, tablet computer, laptop, palm PC, vehicle Mounted terminal, wearable device and pedometer etc..
Wherein, terminal device can be first terminal equipment or second terminal equipment, when terminal device is first terminal When equipment, processor 610 is used to receive the target fingerprint information of second terminal equipment transmission;Target fingerprint information is determined as The unlock finger print information of one terminal device;The input of the first fingerprint is received, in the unlock of the first fingerprint input and first terminal equipment When finger print information matches, first terminal equipment is unlocked in response to the input of the first fingerprint.
Wherein, before receiving the target fingerprint information that second terminal equipment is sent, processor 610 is also used to execute following step It is rapid: to establish the connection between second terminal equipment;
When receiving the target fingerprint information that second terminal equipment is sent, processor 610 is also used to execute following steps: It establishes and after the connection between second terminal equipment, receives the encrypted using predetermined encryption mode of second terminal equipment transmission Target fingerprint information;It is decrypted using default manner of decryption, obtains target fingerprint information.
Wherein, when target fingerprint information to be determined as to the unlock finger print information of first terminal equipment, processor 610 is also used to It executes following steps: determining whether second terminal equipment is the first legitimate device;If second terminal equipment is the first legitimate device, The target fingerprint information that second terminal equipment is sent is determined as to the unlock finger print information of first terminal equipment, and is stored to first In the unlock finger print information memory block of terminal device.
Wherein, target fingerprint information is determined as after the unlock finger print information of first terminal equipment, processor 610 is also used In execution following steps: authenticating success message to second terminal equipment feedback target finger print information.
Wherein, target fingerprint information is determined as after the unlock finger print information of first terminal equipment, processor 610 is also used In execution following steps: generating the operation button shared with second terminal facility information.
Wherein, the input of the first fingerprint is received, in the unlock finger print information phase of the first fingerprint input and first terminal equipment Match, when being unlocked in response to the input of the first fingerprint to first terminal equipment, processor 610 is also used to execute following steps: connecing The input of the first fingerprint is received, is inputted in response to the first fingerprint, the first fingerprint is obtained and inputs corresponding finger print information;First fingerprint is defeated Enter corresponding finger print information compared with the unlock finger print information of first terminal equipment;Corresponding fingerprint letter is inputted in the first fingerprint When breath and the unlock finger print information of first terminal equipment match, first terminal equipment is unlocked.
Wherein, target fingerprint information is determined as after the unlock finger print information of first terminal equipment, processor 610 is also used In execution following steps: determining access authority of the target fingerprint information in first terminal equipment.
Wherein, when the input of the first fingerprint matches with target fingerprint information, it is being unlocked to first terminal equipment Afterwards, processor 610 is also used to execute following steps: in response to access authority, executing access control.
Wherein, while receiving the target fingerprint information that second terminal equipment is sent, processor 610 is also used to execute following Step: the first finger print information is sent to second terminal equipment;Receive second terminal equipment feedback the first finger print information certification at Function message or the first finger print information authentification failure message.
In this way, target fingerprint information is determined as first by the target fingerprint information for receiving the transmission of second terminal equipment The unlock finger print information of terminal device, when receiving the first fingerprint input matched with unlock finger print information, to first terminal Equipment is unlocked, and can realize the shared of finger print information and terminal device stored information on the basis of fingerprint transmits, And finger print information can guarantee the efficient and convenient of information sharing by remotely being transmitted.
Furthermore, it by forming a shared key after authorizing successfully, can be provided for the information sharing of both sides More convenient and fast channel simplifies the operating process that information is shared, and can realize the same of information sharing additionally by setting access authority When, guarantee the privacy of terminal device.It, can be successfully basic in certification by sending the first finger print information to second terminal equipment Upper realization both sides' authorization identifying guarantees that both sides realize information sharing.
When terminal device is second terminal equipment, processor 610 is used for: being received the input of the second fingerprint, is obtained second and refer to Line inputs corresponding target fingerprint information;Target fingerprint information is sent to first terminal equipment.
Wherein, before sending target fingerprint information to first terminal equipment, processor 610 is also used to execute following steps: Establish the connection between first terminal equipment;
When sending target fingerprint information to first terminal equipment, processor 610 is also used to execute following steps:
After connection between foundation and first terminal equipment, target fingerprint information is added using predetermined encryption mode It is close;Encrypted target fingerprint information is sent to first terminal equipment.
Wherein, after sending target fingerprint information to first terminal equipment, processor 610 is also used to execute following steps: connecing It receives first terminal equipment and target fingerprint information is determined as unlocking transmitted target fingerprint authentification of message success after finger print information Message.
Wherein, while sending target fingerprint information to first terminal equipment, processor 610 is also used to execute following step It is rapid: to receive the first finger print information that first terminal equipment is sent;Detect whether first terminal equipment is the second legitimate device;If the One terminal device is the second legitimate device, feeds back the first finger print information to first terminal equipment and authenticates success message;If first eventually End equipment is not the second legitimate device, feeds back the first finger print information authentification failure message to first terminal equipment.
In this way, in the success of target fingerprint authentification of message, being utilized by sending target fingerprint information to first terminal equipment Target fingerprint information unlocks first terminal equipment, can realize that finger print information and terminal are set on the basis of fingerprint transmits Standby stored information is shared, and finger print information can guarantee the efficient and convenient of information sharing by remotely being transmitted;Pass through The first finger print information that first terminal equipment is sent is received, while the first finger print information authenticates successfully, realizes both sides' authorization Certification guarantees that both sides realize the shared of information.
It should be understood that the embodiment of the present invention in, radio frequency unit 601 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 610 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 601 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 601 can also by wireless communication system and network and other set Standby communication.
Terminal device provides wireless broadband internet by network module 602 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 603 can be received by radio frequency unit 601 or network module 602 or in memory 609 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 603 can also provide and end The relevant audio output of specific function that end equipment 600 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 603 includes loudspeaker, buzzer and receiver etc..
Input unit 604 is for receiving audio or video signal.Input unit 604 may include graphics processor (Graphics Processing Unit, GPU) 6041 and microphone 6042, graphics processor 6041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 606.Through graphics processor 6041, treated that picture frame can be deposited Storage is sent in memory 609 (or other storage mediums) or via radio frequency unit 601 or network module 602.Mike Wind 6042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The format output that mobile communication base station can be sent to via radio frequency unit 601 is converted in the case where telephone calling model.
Terminal device 600 further includes at least one sensor 605, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 6061, and proximity sensor can close when terminal device 600 is moved in one's ear Display panel 6061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify terminal device posture (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);It passes Sensor 605 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, wet Meter, thermometer, infrared sensor etc. are spent, details are not described herein.
Display unit 606 is for showing information input by user or being supplied to the information of user.Display unit 606 can wrap Display panel 6061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 6061.
User input unit 607 can be used for receiving the number or character information of input, and generate the use with terminal device Family setting and the related key signals input of function control.Specifically, user input unit 607 include touch panel 6071 and Other input equipments 6072.Touch panel 6071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 6071 or in touch panel 6071 Neighbouring operation).Touch panel 6071 may include both touch detecting apparatus and touch controller.Wherein, touch detection Device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touch control Device processed receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 610, receiving area It manages the order that device 610 is sent and is executed.Furthermore, it is possible to more using resistance-type, condenser type, infrared ray and surface acoustic wave etc. Seed type realizes touch panel 6071.In addition to touch panel 6071, user input unit 607 can also include other input equipments 6072.Specifically, other input equipments 6072 can include but is not limited to physical keyboard, function key (such as volume control button, Switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 6071 can be covered on display panel 6061, when touch panel 6071 is detected at it On or near touch operation after, send processor 610 to determine the type of touch event, be followed by subsequent processing device 610 according to touching The type for touching event provides corresponding visual output on display panel 6061.Although in Fig. 6, touch panel 6071 and display Panel 6061 is the function that outputs and inputs of realizing terminal device as two independent components, but in some embodiments In, can be integrated by touch panel 6071 and display panel 6061 and realize the function that outputs and inputs of terminal device, it is specific this Place is without limitation.
Interface unit 608 is the interface that external device (ED) is connect with terminal device 600.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 608 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 600 or can be used in 600 He of terminal device Data are transmitted between external device (ED).
Memory 609 can be used for storing software program and various data.Memory 609 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 609 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 610 is the control centre of terminal device, utilizes each of various interfaces and the entire terminal device of connection A part by running or execute the software program and/or module that are stored in memory 609, and calls and is stored in storage Data in device 609 execute the various functions and processing data of terminal device, to carry out integral monitoring to terminal device.Place Managing device 610 may include one or more processing units;Preferably, processor 610 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 610.
Terminal device 600 can also include the power supply 611 (such as battery) powered to all parts, it is preferred that power supply 611 Can be logically contiguous by power-supply management system and processor 610, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 600 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 610, and memory 609 is stored in On memory 609 and the computer program that can run on the processor 610, the computer program are executed by processor 610 Each process of the above-mentioned unlocked by fingerprint embodiment of the method for Shi Shixian, and identical technical effect can be reached, to avoid repeating, here It repeats no more.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned unlocked by fingerprint embodiment of the method, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (28)

1. a kind of unlocked by fingerprint method is applied to first terminal equipment characterized by comprising
Receive the target fingerprint information that second terminal equipment is sent;
The target fingerprint information is determined as to the unlock finger print information of the first terminal equipment;
The input of the first fingerprint is received, is matched in first fingerprint input and the unlock finger print information of the first terminal equipment When, the first terminal equipment is unlocked in response to first fingerprint input.
2. unlocked by fingerprint method according to claim 1, which is characterized in that the mesh for receiving second terminal equipment and sending Before the step of marking finger print information, comprising:
Establish the connection between the second terminal equipment;
Described the step of receiving the target fingerprint information that second terminal equipment is sent, comprising:
After the connection established between the second terminal equipment, the use for receiving the second terminal equipment transmission, which is preset, to be added The close encrypted target fingerprint information of mode;
It is decrypted using default manner of decryption, obtains the target fingerprint information.
3. unlocked by fingerprint method according to claim 1, which is characterized in that described to be determined as the target fingerprint information The step of unlock finger print information of the first terminal equipment, comprising:
Determine whether the second terminal equipment is the first legitimate device;
If the second terminal equipment is the first legitimate device, the target fingerprint information that the second terminal equipment is sent It is determined as the unlock finger print information of the first terminal equipment, and stores to the unlock finger print information of the first terminal equipment and deposit In storage area.
4. unlocked by fingerprint method according to claim 1, which is characterized in that described to be determined as the target fingerprint information After the step of unlock finger print information of the first terminal equipment, further includes:
The target fingerprint authentification of message success message is fed back to the second terminal equipment.
5. unlocked by fingerprint method according to claim 1, which is characterized in that described to be determined as the target fingerprint information After the step of unlock finger print information of the first terminal equipment, further includes:
Generate the operation button shared with the second terminal facility information.
6. unlocked by fingerprint method according to claim 1, which is characterized in that the input of the first fingerprint of the reception, described When the input of first fingerprint and the unlock finger print information of the first terminal equipment match, in response to first fingerprint input pair The step of first terminal equipment is unlocked, comprising:
The first fingerprint input is received, is inputted in response to first fingerprint, first fingerprint is obtained and inputs corresponding finger Line information;
First fingerprint is inputted corresponding finger print information to compare with the unlock finger print information of the first terminal equipment;
When first fingerprint inputs corresponding finger print information and the unlock finger print information of the first terminal equipment matches, The first terminal equipment is unlocked.
7. unlocked by fingerprint method according to claim 1, which is characterized in that described to be determined as the target fingerprint information After the step of unlock finger print information of the first terminal equipment, further includes:
Determine access authority of the target fingerprint information in the first terminal equipment.
8. unlocked by fingerprint method according to claim 7, which is characterized in that in first fingerprint input and the target When finger print information matches, after being unlocked to the first terminal equipment, further includes:
In response to the access authority, access control is executed.
9. unlocked by fingerprint method according to claim 1, which is characterized in that the mesh for receiving second terminal equipment and sending While marking finger print information, further includes:
The first finger print information is sent to the second terminal equipment;
Receive first finger print information certification success message or first finger print information of the second terminal equipment feedback Authentification failure message.
10. a kind of unlocked by fingerprint method is applied to second terminal equipment characterized by comprising
The input of the second fingerprint is received, second fingerprint is obtained and inputs corresponding target fingerprint information;
The target fingerprint information is sent to first terminal equipment.
11. unlocked by fingerprint method according to claim 10, which is characterized in that described to described in the transmission of first terminal equipment Before the step of target fingerprint information, comprising:
Establish the connection between the first terminal equipment;
Described the step of sending the target fingerprint information to first terminal equipment, comprising:
Establish and the first terminal equipment between connection after, using predetermined encryption mode to the target fingerprint information into Row encryption;
The encrypted target fingerprint information is sent to the first terminal equipment.
12. unlocked by fingerprint method according to claim 10, which is characterized in that described to described in the transmission of first terminal equipment After the step of target fingerprint information, further includes:
It receives the first terminal equipment and the target fingerprint information is determined as unlocking the transmitted mesh after finger print information It marks finger print information and authenticates success message.
13. unlocked by fingerprint method according to claim 10, which is characterized in that described to described in the transmission of first terminal equipment While target fingerprint information, further includes:
Receive the first finger print information that the first terminal equipment is sent;
Detect whether the first terminal equipment is the second legitimate device;
If the first terminal equipment is the second legitimate device, first finger print information is fed back to the first terminal equipment and is recognized Demonstrate,prove success message;
If the first terminal equipment is not the second legitimate device, first finger print information is fed back to the first terminal equipment Authentification failure message.
14. a kind of first terminal equipment characterized by comprising
First receiving module, for receiving the target fingerprint information of second terminal equipment transmission;
First determining module, for the target fingerprint information to be determined as to the unlock finger print information of the first terminal equipment;
Processing module, for receiving the input of the first fingerprint, in the unlock of first fingerprint input and the first terminal equipment When finger print information matches, the first terminal equipment is unlocked in response to first fingerprint input.
15. first terminal equipment according to claim 14, which is characterized in that further include:
First establishes module, for first receiving module receive second terminal equipment send target fingerprint information it Before, establish the connection between the second terminal equipment;
First receiving module includes:
Receiving submodule, for receiving after described first establishes the connection between module foundation and the second terminal equipment What the second terminal equipment was sent uses the encrypted target fingerprint information of predetermined encryption mode;
First acquisition submodule obtains the target fingerprint information for being decrypted using default manner of decryption.
16. first terminal equipment according to claim 14, which is characterized in that first determining module includes:
First determines submodule, for determining whether the second terminal equipment is the first legitimate device;
Second determines submodule, if being the first legitimate device for the second terminal equipment, the second terminal equipment is sent out The target fingerprint information sent is determined as the unlock finger print information of the first terminal equipment, and stores to the first terminal In the unlock finger print information memory block of equipment.
17. first terminal equipment according to claim 14, which is characterized in that further include:
First feedback module is set for the target fingerprint information to be determined as the first terminal in first determining module After standby unlock finger print information, the target fingerprint authentification of message success message is fed back to the second terminal equipment.
18. first terminal equipment according to claim 14, which is characterized in that further include:
Generation module, for the target fingerprint information to be determined as the first terminal equipment in first determining module After unlocking finger print information, the operation button shared with the second terminal facility information is generated.
19. first terminal equipment according to claim 14, which is characterized in that the processing module includes:
Second acquisition submodule is inputted in response to first fingerprint for receiving first fingerprint input, obtains described the One fingerprint inputs corresponding finger print information;
Comparative sub-module, for first fingerprint being inputted corresponding finger print information and the unlock of the first terminal equipment refers to Line information compares;
Submodule is unlocked, for inputting corresponding finger print information in first fingerprint and the unlock of the first terminal equipment refers to When line information matches, the first terminal equipment is unlocked.
20. first terminal equipment according to claim 14, which is characterized in that further include:
Second determining module is set for the target fingerprint information to be determined as the first terminal in first determining module After standby unlock finger print information, access authority of the target fingerprint information in the first terminal equipment is determined.
21. first terminal equipment according to claim 20, which is characterized in that further include:
Execution module matches for inputting in first fingerprint with the target fingerprint information, and the processing module is to institute It states after first terminal equipment is unlocked, in response to the access authority, executes access control.
22. first terminal equipment according to claim 14, which is characterized in that further include:
First sending module, for receiving the same of the target fingerprint information that second terminal equipment is sent in first receiving module When, the first finger print information is sent to the second terminal equipment;
Second receiving module, for receive second terminal equipment feedback first finger print information certification success message or The first finger print information authentification failure message.
23. a kind of second terminal equipment characterized by comprising
Module is obtained, for receiving the input of the second fingerprint, second fingerprint is obtained and inputs corresponding target fingerprint information;
Second sending module, for sending the target fingerprint information to first terminal equipment.
24. second terminal equipment according to claim 23, which is characterized in that further include:
Second establishes module, before sending the target fingerprint information to first terminal equipment for second sending module, Establish the connection between the first terminal equipment;Second sending module includes:
Submodule is encrypted, for using after described second establishes the connection between module foundation and the first terminal equipment Predetermined encryption mode encrypts the target fingerprint information;
Sending submodule, for sending the encrypted target fingerprint information to the first terminal equipment.
25. second terminal equipment according to claim 23, which is characterized in that further include:
Third receiving module is used for after second sending module sends the target fingerprint information to first terminal equipment, It receives the first terminal equipment target fingerprint information is determined as unlocking the transmitted target after finger print information and refer to Line authentification of message success message.
26. second terminal equipment according to claim 23, which is characterized in that further include:
4th receiving module, for sending the same of the target fingerprint information to first terminal equipment in second sending module When, receive the first finger print information that the first terminal equipment is sent;
Detection module, for detecting whether the first terminal equipment is the second legitimate device;
Second feedback module is fed back if being the second legitimate device for the first terminal equipment to the first terminal equipment First finger print information authenticates success message;
Third feedback module, it is anti-to the first terminal equipment if not being the second legitimate device for the first terminal equipment Present the first finger print information authentification failure message.
27. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 9 is realized when the computer program is executed by the processor Or described in any one of 10 to 13 the step of unlocked by fingerprint method.
28. a kind of computer readable storage medium, which is characterized in that store computer journey on the computer readable storage medium Sequence realizes the fingerprint as described in any one of claim 1 to 9 or 10 to 13 when the computer program is executed by processor The step of unlocking method.
CN201811244212.9A 2018-10-24 2018-10-24 Fingerprint unlocking method and terminal equipment Active CN109376519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811244212.9A CN109376519B (en) 2018-10-24 2018-10-24 Fingerprint unlocking method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811244212.9A CN109376519B (en) 2018-10-24 2018-10-24 Fingerprint unlocking method and terminal equipment

Publications (2)

Publication Number Publication Date
CN109376519A true CN109376519A (en) 2019-02-22
CN109376519B CN109376519B (en) 2021-01-08

Family

ID=65401829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811244212.9A Active CN109376519B (en) 2018-10-24 2018-10-24 Fingerprint unlocking method and terminal equipment

Country Status (1)

Country Link
CN (1) CN109376519B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110505295A (en) * 2019-08-20 2019-11-26 阿里巴巴集团控股有限公司 A kind of unlocking information setting method, device and equipment
CN110830262A (en) * 2019-10-29 2020-02-21 维沃移动通信有限公司 Authorization management method and electronic equipment
WO2022089599A1 (en) * 2020-10-29 2022-05-05 华为技术有限公司 Shared data distribution method and electronic devices
CN115065497A (en) * 2022-04-14 2022-09-16 中国银行股份有限公司 Unlocking method and device for shared equipment and terminal equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104992092A (en) * 2015-06-16 2015-10-21 小米科技有限责任公司 Method, device and system for fingerprint information verification
CN205068396U (en) * 2015-09-25 2016-03-02 深圳市欧雷玛科技有限公司 Portable phone fingerprint identification system
CN105761336A (en) * 2014-12-18 2016-07-13 富泰华工业(深圳)有限公司 Hand-held apparatus and method for remote control of fingerprint lock of hand-held apparatus
CN105912914A (en) * 2016-05-27 2016-08-31 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal equipment
US20160342784A1 (en) * 2011-07-15 2016-11-24 Vmware, Inc. Mobile device authentication
CN107408169A (en) * 2016-02-18 2017-11-28 指纹卡有限公司 Portable electron device for remote control

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160342784A1 (en) * 2011-07-15 2016-11-24 Vmware, Inc. Mobile device authentication
CN105761336A (en) * 2014-12-18 2016-07-13 富泰华工业(深圳)有限公司 Hand-held apparatus and method for remote control of fingerprint lock of hand-held apparatus
CN104992092A (en) * 2015-06-16 2015-10-21 小米科技有限责任公司 Method, device and system for fingerprint information verification
CN205068396U (en) * 2015-09-25 2016-03-02 深圳市欧雷玛科技有限公司 Portable phone fingerprint identification system
CN107408169A (en) * 2016-02-18 2017-11-28 指纹卡有限公司 Portable electron device for remote control
CN105912914A (en) * 2016-05-27 2016-08-31 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110505295A (en) * 2019-08-20 2019-11-26 阿里巴巴集团控股有限公司 A kind of unlocking information setting method, device and equipment
CN110830262A (en) * 2019-10-29 2020-02-21 维沃移动通信有限公司 Authorization management method and electronic equipment
CN110830262B (en) * 2019-10-29 2022-11-01 维沃移动通信有限公司 Authorization management method and electronic equipment
WO2022089599A1 (en) * 2020-10-29 2022-05-05 华为技术有限公司 Shared data distribution method and electronic devices
CN115065497A (en) * 2022-04-14 2022-09-16 中国银行股份有限公司 Unlocking method and device for shared equipment and terminal equipment

Also Published As

Publication number Publication date
CN109376519B (en) 2021-01-08

Similar Documents

Publication Publication Date Title
EP3605989B1 (en) Information sending method, information receiving method, apparatus, and system
WO2017185711A1 (en) Method, apparatus and system for controlling smart device, and storage medium
CN111062026B (en) Verification information sharing method and electronic equipment
CN109376519A (en) A kind of unlocked by fingerprint method and terminal device
CN110188524B (en) Information encryption method, information decryption method and terminal
CN108449114B (en) Bluetooth connection method and mobile terminal
US10658864B2 (en) Multifunctional wireless charging system and its data transmission method
CN109981891A (en) A kind of terminal control method, device and terminal device
CN109145552A (en) Information ciphering method and terminal device
CN109145571A (en) A kind of account login method, terminal and server
CN110149628A (en) A kind of information processing method and terminal device
CN110830262B (en) Authorization management method and electronic equipment
CN109525666A (en) A kind of data back up method and mobile terminal
CN109753776A (en) A kind of method, apparatus and mobile terminal of information processing
CN109992939A (en) A kind of login method and terminal device
CN108737341B (en) Service processing method, terminal and server
CN109062492A (en) A kind of application access method and terminal
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN110879896B (en) Encryption and decryption method for folding screen terminal and electronic equipment
CN108040186A (en) The sending method and mobile terminal of a kind of dtmf signal
CN109753784B (en) Authorization method based on multi-dimensional code, mobile terminal and server
CN109740000B (en) Multimedia file processing method and mobile terminal
CN110555924B (en) Method and device for unlocking processing
CN115033864A (en) Identity verification method and system and electronic equipment
CN107818247B (en) Mobile terminal unlocking method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant