CN110502963A - Fingerprint verification method, fingerprint certification device and terminal - Google Patents

Fingerprint verification method, fingerprint certification device and terminal Download PDF

Info

Publication number
CN110502963A
CN110502963A CN201811063933.XA CN201811063933A CN110502963A CN 110502963 A CN110502963 A CN 110502963A CN 201811063933 A CN201811063933 A CN 201811063933A CN 110502963 A CN110502963 A CN 110502963A
Authority
CN
China
Prior art keywords
finger print
print identifying
fingerprint
mode
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811063933.XA
Other languages
Chinese (zh)
Other versions
CN110502963B (en
Inventor
陈柳章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Excelsecu Data Technology Co Ltd
Original Assignee
Shenzhen Excelsecu Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Excelsecu Data Technology Co Ltd filed Critical Shenzhen Excelsecu Data Technology Co Ltd
Priority to CN201811063933.XA priority Critical patent/CN110502963B/en
Priority to PCT/CN2019/097947 priority patent/WO2020052353A1/en
Publication of CN110502963A publication Critical patent/CN110502963A/en
Application granted granted Critical
Publication of CN110502963B publication Critical patent/CN110502963B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention is suitable for finger print identifying technical field, provides a kind of fingerprint verification method, fingerprint certification device, terminal and computer readable storage medium, and the fingerprint verification method includes: to receive finger print identifying request;The determining and associated finger print identifying mode of destination application, wherein the destination application is the application program for sending the finger print identifying request;The operation of this finger print identifying is executed with the finger print identifying mode.The present invention can be improved the flexibility for carrying out finger print identifying.

Description

Fingerprint verification method, fingerprint certification device and terminal
Technical field
The invention belongs to field of terminal technology more particularly to a kind of fingerprint verification method, fingerprint certification device, terminal and meters Calculation machine readable storage medium storing program for executing.
Background technique
Currently, safe and accurate with its, the convenient, fast feature of fingerprint recognition has obtained widely answering in many fields With for example, being checked card on fingerprint attendance machine by fingerprint recognition progress attendance.
However, present inventor is having found after numerous studies, existing fingerprint equipment, for the fingerprint of registration Information, usually carried out by the related application of equipment itself it is exclusive or all shared, for example, being registered on fingerprint attendance machine Fingerprint can be only applied to the machine progress attendance and check card.As it can be seen that finger print identifying mode flexibility in the prior art is inadequate, it is not right Finger print identifying more deeply and adequately excavate and utilize.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of fingerprint verification method, fingerprint certification device, terminal and computers Readable storage medium storing program for executing, it is inflexible in a manner of solution in the prior art finger print identifying, finger print identifying is carried out more deep The problem of with adequately discovering and using.
The first aspect of the embodiment of the present invention provides a kind of fingerprint verification method, and the fingerprint verification method includes:
Receive finger print identifying request;
The determining and associated finger print identifying mode of destination application, wherein the destination application is described in transmission The application program of finger print identifying request;
The operation of this finger print identifying is executed with the finger print identifying mode.
The second aspect of the embodiment of the present invention provides a kind of fingerprint certification device, and the fingerprint certification device includes:
Receiving unit, for receiving finger print identifying request;
Determination unit, for the determining and associated finger print identifying mode of destination application, wherein the target application journey Sequence is to send the application program of the finger print identifying request;
Authentication unit, the finger print identifying mode for being determined with the determination unit execute the operation of this finger print identifying.
The third aspect of the embodiment of the present invention provides a kind of terminal, including memory, processor and is stored in described In memory and the computer program that can run on the processor, the processor are realized when executing the computer program As described in any one the step of fingerprint verification method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, and the fingerprint verification method as described in any one is realized when the computer program is executed by processor The step of.
Existing beneficial effect is the present invention compared with prior art:
The present invention is by when receiving finger print identifying request, determining and sending the finger print identifying target application journey requested The associated finger print identifying mode of sequence, and execute this finger print identifying using the finger print identifying mode and operate.That is, according to the present invention Different finger print identifying modes is respectively associated in the scheme of offer, the application program that can carry out finger print identifying to request, so that Finger print identifying can be carried out based on different finger print identifying modes when carrying out finger print identifying, and different finger print identifying modes can be with Different certification permissions is respectively corresponded, to improve the flexibility using finger print identifying.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the implementation flow chart of fingerprint verification method provided in an embodiment of the present invention;
Fig. 2 be another embodiment of the present invention provides fingerprint verification method implementation flow chart;
Fig. 3 is the structural schematic diagram of fingerprint certification device provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
Present invention could apply to fingerprint equipment, the fingerprint equipment can the authorized user of typing in advance finger print information ( The registration of fingerprint is carried out in advance), fingerprint equipment can in advance configure the fingerprint of registration to different shared models, such as will Target fingerprint is configured to unconditional shared model, and all application programs carry out fingerprint using the target fingerprint in this mode Certification;In another example configuring conditional shared model for target fingerprint, in this mode, part meets answering for setting condition It can be authenticated using the target fingerprint with program;For another example exclusive occupying mode can be configured by target fingerprint, in the mode Under, only specified application program just can use the target fingerprint and carry out finger print identifying.It can be right under above-mentioned each mode There should be matched finger print identifying mode, provide finger print identifying by corresponding finger print identifying mode for each application program. To improve the flexibility of finger print identifying.
To make the object, technical solutions and advantages of the present invention clearer, pass through specific embodiment below in conjunction with attached drawing To be illustrated.
Referring to Fig. 1, it illustrates the implementation flow charts of fingerprint verification method provided in an embodiment of the present invention, and details are as follows:
In a step 101, finger print identifying request is received.
In embodiments of the present invention, finger print identifying request, the application program can be initiated from application program to fingerprint equipment It can be the application program on the fingerprint equipment, it can also answering on another terminal device communicated to connect with the fingerprint equipment With program, fingerprint equipment receives the finger print identifying request of application program transmission.
It should be noted that application program initiates finger print identifying request to fingerprint equipment, include in finger print identifying request The finger print information or its fingerprint characteristic value information of the user to be certified of finger print information to be certified namely application program acquisition, Its authentication purpose be in order to verify whether the user to be certified is authorized user, and, whether which has operation The permission of the application program.
In a step 102, the determining and associated finger print identifying mode of destination application, wherein the target application journey Sequence is to send the application program of the finger print identifying request.
In embodiments of the present invention, to send the application program of finger print identifying request to fingerprint equipment as target application journey Sequence, fingerprint equipment can determine and the associated finger print identifying mould of the destination application when receiving finger print identifying request Formula.For example, the contingency table of application program and finger print identifying mode can be stored in advance in fingerprint equipment, fingerprint equipment is being received When the finger print identifying sent to destination application is requested, the mark of the available destination application, and it is based on the mark Lookup and the associated finger print identifying mode of the destination application from contingency table, or can be stored in advance in fingerprint equipment The contingency table of fingerprint and finger print identifying mode, fingerprint equipment is in the finger print identifying request for receiving destination application transmission When, the available fingerprint with the associated fingerprint of the destination application, and is searched from contingency table based on the mark and The associated finger print identifying mode of the destination application.
Optionally, in one implementation, above-mentioned steps 102 may include:
The determining communication modes communicated with the destination application;Based on the communication modes and preset One contingency table, the determining and associated finger print identifying mode of the destination application, wherein first contingency table is communication side Formula-finger print identifying pattern association table.
In the present embodiment, mesh can be determined based on the communication modes that destination application and fingerprint equipment are communicated Mark the finger print identifying mode of application program.
In practical applications, destination application and fingerprint equipment can pass through SPI (Serial Peripheral Interface, Serial Peripheral Interface (SPI)), Uart (Universal Asynchronous Receiver/Transmitter, it is general Asynchronous receiving-transmitting transmitter), IIC (Inter-Integrated Circuit, IC bus), bluetooth, USB (Universal Serial Bus, universal serial bus), 7816 interfaces etc. communication modes are communicated.Illustratively, it can will be set with fingerprint It is standby that first certification mode is set as by the destination application that SPI is communicated, will pass through with fingerprint equipment Uart or IIC into The destination application of row communication is set as the second certification mode, the target application that will be communicated with fingerprint equipment by bluetooth Program setting is third certification mode.
In embodiments of the present invention, communication modes-finger print identifying pattern association can establish based on the preset rule of correspondence Table can determine the communication modes of destination application and fingerprint equipment when receiving finger print identifying request;Mesh is being determined After the communication modes for marking application program and fingerprint equipment, it can be searched from the communication modes-finger print identifying pattern association table And the determining and associated finger print identifying mode of the destination application.
Optionally, in another implementation, above-mentioned steps 102 may include:
Determine used Encryption Algorithm when fingerprint to be certified is encrypted in the destination application;It is based on The Encryption Algorithm and preset second contingency table, the determining and associated finger print identifying mode of the destination application, In, second contingency table is Encryption Algorithm-finger print identifying pattern association table.
In practical applications, destination application sends finger print identifying request to fingerprint equipment, in order to improve safety, needs The information of transmission is encrypted, for example, it is desired to be encrypted to finger print information to be certified.Herein, the cipher mode It can be using symmetric encipherment algorithm, be also possible to rivest, shamir, adelman, can also be that hash algorithm or other encryptions are calculated Method, or can also be the combination of multiple encryption algorithms.
In the present embodiment, the Encryption Algorithm that can be utilized based on different application programs establishes Encryption Algorithm-fingerprint Certification mode contingency table, when receiving finger print identifying request, it is first determined Encryption Algorithm used in destination application;In It, can be from the Encryption Algorithm-finger print identifying pattern association table after Encryption Algorithm used in destination application has been determined It searches and determines and the associated finger print identifying mode of the destination application.
In step 103, the operation of this finger print identifying is executed with the finger print identifying mode
In embodiments of the present invention, determined with after the associated finger print identifying mode of destination application, can be with base It is that the destination application executes the operation of this finger print identifying in corresponding finger print identifying mode.
In embodiments of the present invention, different finger print identifying modes can correspond to different fingerprint shared models, i.e., different Finger print identifying permission, for example, the first finger print identifying mode can correspond to unconditional shared model, all applications in this mode Program carries out finger print identifying using the target fingerprint;Second finger print identifying mode can correspond to conditional shared model, In this mode, part is met the application program to impose a condition and can be authenticated using the target fingerprint;Third finger print identifying Mode can correspond to exclusive occupying mode, and in this mode, only specified application program just can use the target fingerprint and be referred to Line certification.
From the foregoing, it will be observed that the present invention is by when receiving finger print identifying request, determining and sending finger print identifying request The associated finger print identifying mode of destination application, and execute this finger print identifying using the finger print identifying mode and operate.That is, Different finger print identifying moulds is respectively associated in the scheme provided according to the present invention, the application program that can carry out finger print identifying to request Formula enables and carries out finger print identifying based on different finger print identifying modes when carrying out finger print identifying, and different fingerprints is recognized Card mode can respectively correspond different certification permissions, to improve the flexibility using finger print identifying.
Fig. 2 shows another embodiment of the present invention provides fingerprint verification method implementation flow chart, details are as follows:
In step 201, when carrying out fingerprint register, the fingerprint of registration is configured to different finger print identifying modes.
In embodiments of the present invention, when carrying out fingerprint register, the fingerprint of registration can be configured to different shared moulds Formula, the corresponding finger print identifying mode of each shared model.
Specifically, when authorized user carries out fingerprint register to fingerprint equipment difference can be configured by the fingerprint of registration Finger print identifying mode, wherein each finger print identifying mode can correspond to different fingerprint shared models.For example, the first fingerprint Certification mode can correspond to unconditional shared model, and all application programs are referred to using the target fingerprint in this mode Line certification;Second finger print identifying mode can correspond to conditional shared model, and in this mode, part meets setting condition Application program can be authenticated using the target fingerprint;Third finger print identifying mode can correspond to exclusive occupying mode, in the mode Under, only specified application program just can use the target fingerprint and carry out finger print identifying.
In embodiments of the present invention, its storage region can be divided into different subregions, each sub-district by fingerprint equipment Domain is used to store the finger print information corresponding to different finger print identifying modes.Destination application is based on finger print identifying associated with it The permission that there is mode access respective sub-areas to carry out finger print identifying.
Optionally, the finger print identifying mode may include the first finger print identifying mode;In the first finger print identifying mould Under formula, if the fingerprint of request certification matches with pre-registered fingerprint, it is determined that finger print identifying passes through.
In the present embodiment, the finger print information for being configured to the first finger print identifying mode is stored in the first storage by fingerprint equipment Region, under the first finger print identifying mode, all application programs may have access to the first storage subregion and carry out finger print identifying. If the pre-registered fingerprint stored in the fingerprint of destination application request certification and the first storage subregion matches, really Determine finger print identifying to pass through.
Optionally, the finger print identifying mode includes the second finger print identifying mode;Under the second finger print identifying mode, If the fingerprint of request certification matches with pre-registered fingerprint, and, the destination application is answering with specified permission With program, it is determined that finger print identifying passes through.
In the present embodiment, the finger print information for being configured to the second finger print identifying mode is stored in the second storage by fingerprint equipment Region, under the second finger print identifying mode, the application program for only having specified permission can access the second storage subregion And carry out finger print identifying.If being stored in the fingerprint of destination application request certification and the second storage subregion pre-registered Fingerprint matches, and, the destination application is the application program with specified permission, it is determined that finger print identifying passes through.
The finger print identifying mode includes third finger print identifying mode;Under the third finger print identifying mode, if request The fingerprint of certification matches with pre-registered fingerprint, and, the destination application is specified application program, it is determined that is referred to Line certification passes through.
In the present embodiment, the finger print information for being configured to third finger print identifying mode is stored in third storage by fingerprint equipment Region, under the third finger print identifying mode, only specified application program can access third storage subregion and be referred to Line certification.If the pre-registered fingerprint phase stored in the fingerprint of destination application request certification and third storage subregion Match, and, the destination application is specified application program, it is determined that finger print identifying passes through.
In step 202, finger print identifying request is received.
In step 203, the determining and associated finger print identifying mode of destination application, wherein the target application journey Sequence is to send the application program of the finger print identifying request.
In step 204, the operation of this finger print identifying is executed with the finger print identifying mode.
In embodiments of the present invention, for details, reference can be made to the steps in embodiment illustrated in fig. 1 to step 204 for above-mentioned steps 202 101 to step 103, and details are not described herein.
From the foregoing, it will be observed that the present invention is by when receiving finger print identifying request, determining and sending finger print identifying request The associated finger print identifying mode of destination application, and execute this finger print identifying using the finger print identifying mode and operate.That is, Different finger print identifying moulds is respectively associated in the scheme provided according to the present invention, the application program that can carry out finger print identifying to request Formula enables and carries out finger print identifying based on different finger print identifying modes when carrying out finger print identifying, and different fingerprints is recognized Card mode can respectively correspond different certification permissions, to improve the flexibility using finger print identifying.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
The following are the device of the invention embodiments can refer to above-mentioned corresponding the details of wherein not detailed description Embodiment of the method.
Fig. 3 shows the structural schematic diagram of fingerprint certification device provided in an embodiment of the present invention, for ease of description, only shows Go out part related to the embodiment of the present invention, details are as follows:
As shown in figure 3, fingerprint certification device 3 includes: receiving unit 31, determination unit 32 and authentication unit 33.
Receiving unit 31, for receiving finger print identifying request.
Determination unit 32, for the determining and associated finger print identifying mode of destination application, wherein the target application Program is to send the application program of the finger print identifying request.
Authentication unit 33, the finger print identifying mode for being determined with determination unit 32 execute the operation of this finger print identifying.
Optionally, fingerprint certification device 3 further include:
Fingerprint configuration unit, for configuring the fingerprint of registration to different finger print identifying moulds when carrying out fingerprint register Formula.
Optionally, the finger print identifying mode includes the first finger print identifying mode, and authentication unit 33 is specifically used for:
The operation of this finger print identifying is executed with the first finger print identifying mode;
Under the first finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, really Determine finger print identifying to pass through.
Optionally, the finger print identifying mode includes the second finger print identifying mode, and authentication unit 33 is specifically used for:
The operation of this finger print identifying is executed with the second finger print identifying mode;
Under the second finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, institute Stating destination application is the application program with specified permission, it is determined that finger print identifying passes through.
Optionally, the finger print identifying mode includes third finger print identifying mode, and authentication unit 33 is specifically used for:
The operation of this finger print identifying is executed with the third finger print identifying mode;
Under the third finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, institute Stating destination application is specified application program, it is determined that finger print identifying passes through.
Optionally, fingerprint certification device 3 further include:
Communication modes determination unit, for the determining communication modes communicated with the destination application;
Correspondingly, determination unit 32 is specifically used for: be based on the communication modes and preset first contingency table, determine with The associated finger print identifying mode of destination application, wherein first contingency table is communication modes-finger print identifying mode Contingency table.
Optionally, fingerprint certification device 3 further include:
Encryption Algorithm determination unit, when for determining that fingerprint to be certified is encrypted in the destination application Used Encryption Algorithm;
Correspondingly, determination unit 32 is specifically used for: be based on the Encryption Algorithm and preset second contingency table, determine with The associated finger print identifying mode of destination application, wherein second contingency table is Encryption Algorithm-finger print identifying mode Contingency table.
From the foregoing, it will be observed that the present invention is by when receiving finger print identifying request, determining and sending finger print identifying request The associated finger print identifying mode of destination application, and execute this finger print identifying using the finger print identifying mode and operate.That is, Different finger print identifying moulds is respectively associated in the scheme provided according to the present invention, the application program that can carry out finger print identifying to request Formula enables and carries out finger print identifying based on different finger print identifying modes when carrying out finger print identifying, and different fingerprints is recognized Card mode can respectively correspond different certification permissions, to improve the flexibility using finger print identifying.
Fig. 4 is the schematic diagram for the terminal that one embodiment of the invention provides.As shown in figure 4, the terminal 4 of the embodiment includes: Processor 40, memory 41 and it is stored in the computer program that can be run in the memory 41 and on the processor 40 42.The processor 40 realizes the step in above-mentioned each fingerprint verification method embodiment when executing the computer program 42, Such as step 101 shown in FIG. 1 is to step 103.Alternatively, the processor 40 realized when executing the computer program 42 it is above-mentioned The function of each module/unit in each Installation practice, such as the function of unit 31 to 33 shown in Fig. 3.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 42 in the terminal 4 is described.For example, the computer program 42 can be divided into Receiving unit, determination unit and authentication unit, each unit concrete function are as follows:
Receiving unit, for receiving finger print identifying request;
Determination unit, for the determining and associated finger print identifying mode of destination application, wherein the target application journey Sequence is to send the application program of the finger print identifying request;
Authentication unit, the finger print identifying mode for being determined with the determination unit execute the operation of this finger print identifying.
The terminal 4 can be the meter such as mobile terminal, desktop PC, notebook, palm PC and cloud server Calculate equipment.The terminal may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4 The only example of terminal 4, the not restriction of structure paired terminal 4 may include than illustrating more or fewer components or group Close certain components or different components, for example, the terminal can also include input-output equipment, it is network access equipment, total Line etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor Deng.
The memory 41 can be the internal storage unit of the terminal 4, such as the hard disk or memory of terminal 4.It is described Memory 41 is also possible to the External memory equipment of the terminal 4, such as the plug-in type hard disk being equipped in the terminal 4, intelligence Storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) Deng.Further, the memory 41 can also both include the internal storage unit of the terminal 4 or set including external storage It is standby.The memory 41 is for other programs and data needed for storing the computer program and the terminal.It is described to deposit Reservoir 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal and method can pass through Other modes are realized.For example, device/terminal embodiment described above is only schematical, for example, the module or The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute Display or the mutual coupling or direct-coupling or communication connection discussed can be through some interfaces, device or unit INDIRECT COUPLING or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of fingerprint verification method, which is characterized in that the fingerprint verification method includes:
Receive finger print identifying request;
The determining and associated finger print identifying mode of destination application, wherein the destination application is to send the fingerprint The application program of certification request;
The operation of this finger print identifying is executed with the finger print identifying mode.
2. fingerprint verification method according to claim 1, which is characterized in that wrapped before reception finger print identifying request It includes:
When carrying out fingerprint register, it configures the fingerprint of registration to different finger print identifying modes.
3. fingerprint verification method according to claim 2, which is characterized in that the finger print identifying mode includes the first fingerprint Certification mode;
It is described with the finger print identifying mode execute this finger print identifying operation include:
The operation of this finger print identifying is executed with the first finger print identifying mode;
Under the first finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, it is determined that refer to Line certification passes through.
4. fingerprint verification method according to claim 2, which is characterized in that the finger print identifying mode includes the second fingerprint Certification mode;
It is described with the finger print identifying mode execute this finger print identifying operation include:
The operation of this finger print identifying is executed with the second finger print identifying mode;
Under the second finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, the mesh Mark application program is the application program with specified permission, it is determined that finger print identifying passes through.
5. fingerprint verification method according to claim 2, which is characterized in that the finger print identifying mode includes third fingerprint Certification mode;
It is described with the finger print identifying mode execute this finger print identifying operation include:
The operation of this finger print identifying is executed with the third finger print identifying mode;
Under the third finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, the mesh Mark application program is specified application program, it is determined that finger print identifying passes through.
6. fingerprint verification method according to any one of claims 1 to 5, which is characterized in that the determination and target application The associated finger print identifying mode of program includes:
The determining communication modes communicated with the destination application;
Based on the communication modes and preset first contingency table, the determining and associated finger print identifying of the destination application Mode, wherein first contingency table is communication modes-finger print identifying pattern association table.
7. fingerprint verification method according to any one of claims 1 to 5, which is characterized in that the determination and target application The associated finger print identifying mode of program includes:
Determine used Encryption Algorithm when fingerprint to be certified is encrypted in the destination application;
Based on the Encryption Algorithm and preset second contingency table, the determining and associated finger print identifying of the destination application Mode, wherein second contingency table is Encryption Algorithm-finger print identifying pattern association table.
8. a kind of fingerprint certification device, which is characterized in that the fingerprint certification device includes:
Receiving unit, for receiving finger print identifying request;
Determination unit, for determining with the associated finger print identifying mode of destination application, wherein the destination application is Send the application program of the finger print identifying request;
Authentication unit, the finger print identifying mode for being determined with the determination unit execute the operation of this finger print identifying.
9. a kind of terminal, including memory, processor and storage can be run in the memory and on the processor Computer program, which is characterized in that the processor is realized when executing the computer program as claim 1 to 7 is any The step of item fingerprint verification method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists In the step of realization fingerprint verification method as described in any one of claim 1 to 7 when the computer program is executed by processor Suddenly.
CN201811063933.XA 2018-09-12 2018-09-12 Fingerprint authentication method, fingerprint authentication device and terminal Active CN110502963B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811063933.XA CN110502963B (en) 2018-09-12 2018-09-12 Fingerprint authentication method, fingerprint authentication device and terminal
PCT/CN2019/097947 WO2020052353A1 (en) 2018-09-12 2019-07-26 Fingerprint authentication method, fingerprint authentication device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811063933.XA CN110502963B (en) 2018-09-12 2018-09-12 Fingerprint authentication method, fingerprint authentication device and terminal

Publications (2)

Publication Number Publication Date
CN110502963A true CN110502963A (en) 2019-11-26
CN110502963B CN110502963B (en) 2022-04-12

Family

ID=68584581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811063933.XA Active CN110502963B (en) 2018-09-12 2018-09-12 Fingerprint authentication method, fingerprint authentication device and terminal

Country Status (2)

Country Link
CN (1) CN110502963B (en)
WO (1) WO2020052353A1 (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090113524A (en) * 2008-04-28 2009-11-02 한국전자통신연구원 Method of Fingerprint Authentication in Human Body Communication
CN102801851A (en) * 2011-05-27 2012-11-28 Lg电子株式会社 Mobile terminal and mode controlling method therein
CN103178962A (en) * 2013-02-05 2013-06-26 金硕澳门离岸商业服务有限公司 Universal fingermark authentication method and universal fingermark authentication device
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
WO2014082387A1 (en) * 2012-11-28 2014-06-05 鹤山世达光电科技有限公司 Nfc-based fingerprint authentication system and fingerprint authentication method
CN104321778A (en) * 2012-06-29 2015-01-28 苹果公司 Automatic association of authentication credentials with biometrics
US20150067827A1 (en) * 2013-08-29 2015-03-05 Pantech Co., Ltd. Apparatus and method for setting a user-defined pattern for an application
CN104537327A (en) * 2014-12-29 2015-04-22 宁波百世信息科技有限公司 Electronic tag reading method and device
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN106790315A (en) * 2017-04-01 2017-05-31 深圳天珑无线科技有限公司 A kind of right management method and device
CN107632870A (en) * 2017-09-19 2018-01-26 维沃移动通信有限公司 The startup method and terminal of a kind of application
CN108141363A (en) * 2015-10-15 2018-06-08 诺基亚技术有限公司 For the device of certification, method and computer program product

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5500180B2 (en) * 2010-01-28 2014-05-21 富士通株式会社 Fingerprint authentication apparatus, fingerprint authentication method, and fingerprint authentication program
CN105975182B (en) * 2012-08-20 2019-05-24 华为终端有限公司 A kind of terminal operation method and terminal
CN103914641A (en) * 2013-01-04 2014-07-09 贝伦企业股份有限公司 Fingerprint management method and system
CN103886237A (en) * 2014-03-26 2014-06-25 深圳市亚略特生物识别科技有限公司 Control method and system for electronic device with fingerprint sensor and touch screen
CN105022570A (en) * 2015-06-30 2015-11-04 广东欧珀移动通信有限公司 Method for controlling applications through fingerprint identification and terminal device

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090113524A (en) * 2008-04-28 2009-11-02 한국전자통신연구원 Method of Fingerprint Authentication in Human Body Communication
CN102801851A (en) * 2011-05-27 2012-11-28 Lg电子株式会社 Mobile terminal and mode controlling method therein
CN104321778A (en) * 2012-06-29 2015-01-28 苹果公司 Automatic association of authentication credentials with biometrics
WO2014082387A1 (en) * 2012-11-28 2014-06-05 鹤山世达光电科技有限公司 Nfc-based fingerprint authentication system and fingerprint authentication method
CN103178962A (en) * 2013-02-05 2013-06-26 金硕澳门离岸商业服务有限公司 Universal fingermark authentication method and universal fingermark authentication device
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
US20150067827A1 (en) * 2013-08-29 2015-03-05 Pantech Co., Ltd. Apparatus and method for setting a user-defined pattern for an application
CN104537327A (en) * 2014-12-29 2015-04-22 宁波百世信息科技有限公司 Electronic tag reading method and device
CN108141363A (en) * 2015-10-15 2018-06-08 诺基亚技术有限公司 For the device of certification, method and computer program product
CN105245346A (en) * 2015-10-19 2016-01-13 宇龙计算机通信科技(深圳)有限公司 Identity authentication method and user terminal
CN106790315A (en) * 2017-04-01 2017-05-31 深圳天珑无线科技有限公司 A kind of right management method and device
CN107632870A (en) * 2017-09-19 2018-01-26 维沃移动通信有限公司 The startup method and terminal of a kind of application

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
GUOBO XIE等: "Cloud storage identity design based on fingerprint identification", 《2013 6TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING》 *
赵建: "基于加密电路和同态加密的指纹认证方法研究", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Also Published As

Publication number Publication date
CN110502963B (en) 2022-04-12
WO2020052353A1 (en) 2020-03-19

Similar Documents

Publication Publication Date Title
CN105408910B (en) System and method for being verified using wireless communication to user
EP2995039B1 (en) Systems and methods for secure communication
CN208580402U (en) Store equipment and the station for storing equipment
US10164966B2 (en) Decoupling identity from devices in the internet of things
CN109460966A (en) Contract signing method, apparatus and terminal device based on requesting party's classification
EP2541458A1 (en) Resource management system and corresponding method
US10361864B2 (en) Enabling a secure OEM platform feature in a computing environment
CN110071940A (en) Software package encipher-decipher method, server, user equipment and storage medium
CN109067528A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN110362357A (en) A kind of configuration file management method and device of application program
US10439809B2 (en) Method and apparatus for managing application identifier
US8918844B1 (en) Device presence validation
US20190141048A1 (en) Blockchain identification system
CN109787769A (en) Offline authentication method, user terminal and the device end of internet of things equipment
US10019556B2 (en) EPID attestation using RFID
CN108959904A (en) Terminal device applies login method and terminal device
CN113709115B (en) Authentication method and device
CN111586142A (en) Safe multi-party computing method and system
CN109787754A (en) A kind of data encryption/decryption method, computer readable storage medium and server
CN108183889A (en) Identity identifying method and identification authentication system
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN108965315A (en) A kind of authentic authentication method of terminal device, device and terminal device
CN110198538A (en) A kind of method and device obtaining device identification
CN111510421B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN110149633A (en) It is a kind of to support batch Secure authentication method and system of verifying

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant