CN110502963A - Fingerprint verification method, fingerprint certification device and terminal - Google Patents
Fingerprint verification method, fingerprint certification device and terminal Download PDFInfo
- Publication number
- CN110502963A CN110502963A CN201811063933.XA CN201811063933A CN110502963A CN 110502963 A CN110502963 A CN 110502963A CN 201811063933 A CN201811063933 A CN 201811063933A CN 110502963 A CN110502963 A CN 110502963A
- Authority
- CN
- China
- Prior art keywords
- finger print
- print identifying
- fingerprint
- mode
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012795 verification Methods 0.000 title claims abstract description 25
- 238000004590 computer program Methods 0.000 claims description 21
- 238000004891 communication Methods 0.000 claims description 19
- 238000004422 calculation algorithm Methods 0.000 claims description 14
- 230000006870 function Effects 0.000 description 12
- 230000005540 biological transmission Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
Abstract
The present invention is suitable for finger print identifying technical field, provides a kind of fingerprint verification method, fingerprint certification device, terminal and computer readable storage medium, and the fingerprint verification method includes: to receive finger print identifying request;The determining and associated finger print identifying mode of destination application, wherein the destination application is the application program for sending the finger print identifying request;The operation of this finger print identifying is executed with the finger print identifying mode.The present invention can be improved the flexibility for carrying out finger print identifying.
Description
Technical field
The invention belongs to field of terminal technology more particularly to a kind of fingerprint verification method, fingerprint certification device, terminal and meters
Calculation machine readable storage medium storing program for executing.
Background technique
Currently, safe and accurate with its, the convenient, fast feature of fingerprint recognition has obtained widely answering in many fields
With for example, being checked card on fingerprint attendance machine by fingerprint recognition progress attendance.
However, present inventor is having found after numerous studies, existing fingerprint equipment, for the fingerprint of registration
Information, usually carried out by the related application of equipment itself it is exclusive or all shared, for example, being registered on fingerprint attendance machine
Fingerprint can be only applied to the machine progress attendance and check card.As it can be seen that finger print identifying mode flexibility in the prior art is inadequate, it is not right
Finger print identifying more deeply and adequately excavate and utilize.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of fingerprint verification method, fingerprint certification device, terminal and computers
Readable storage medium storing program for executing, it is inflexible in a manner of solution in the prior art finger print identifying, finger print identifying is carried out more deep
The problem of with adequately discovering and using.
The first aspect of the embodiment of the present invention provides a kind of fingerprint verification method, and the fingerprint verification method includes:
Receive finger print identifying request;
The determining and associated finger print identifying mode of destination application, wherein the destination application is described in transmission
The application program of finger print identifying request;
The operation of this finger print identifying is executed with the finger print identifying mode.
The second aspect of the embodiment of the present invention provides a kind of fingerprint certification device, and the fingerprint certification device includes:
Receiving unit, for receiving finger print identifying request;
Determination unit, for the determining and associated finger print identifying mode of destination application, wherein the target application journey
Sequence is to send the application program of the finger print identifying request;
Authentication unit, the finger print identifying mode for being determined with the determination unit execute the operation of this finger print identifying.
The third aspect of the embodiment of the present invention provides a kind of terminal, including memory, processor and is stored in described
In memory and the computer program that can run on the processor, the processor are realized when executing the computer program
As described in any one the step of fingerprint verification method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, and the fingerprint verification method as described in any one is realized when the computer program is executed by processor
The step of.
Existing beneficial effect is the present invention compared with prior art:
The present invention is by when receiving finger print identifying request, determining and sending the finger print identifying target application journey requested
The associated finger print identifying mode of sequence, and execute this finger print identifying using the finger print identifying mode and operate.That is, according to the present invention
Different finger print identifying modes is respectively associated in the scheme of offer, the application program that can carry out finger print identifying to request, so that
Finger print identifying can be carried out based on different finger print identifying modes when carrying out finger print identifying, and different finger print identifying modes can be with
Different certification permissions is respectively corresponded, to improve the flexibility using finger print identifying.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is the implementation flow chart of fingerprint verification method provided in an embodiment of the present invention;
Fig. 2 be another embodiment of the present invention provides fingerprint verification method implementation flow chart;
Fig. 3 is the structural schematic diagram of fingerprint certification device provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
Present invention could apply to fingerprint equipment, the fingerprint equipment can the authorized user of typing in advance finger print information (
The registration of fingerprint is carried out in advance), fingerprint equipment can in advance configure the fingerprint of registration to different shared models, such as will
Target fingerprint is configured to unconditional shared model, and all application programs carry out fingerprint using the target fingerprint in this mode
Certification;In another example configuring conditional shared model for target fingerprint, in this mode, part meets answering for setting condition
It can be authenticated using the target fingerprint with program;For another example exclusive occupying mode can be configured by target fingerprint, in the mode
Under, only specified application program just can use the target fingerprint and carry out finger print identifying.It can be right under above-mentioned each mode
There should be matched finger print identifying mode, provide finger print identifying by corresponding finger print identifying mode for each application program.
To improve the flexibility of finger print identifying.
To make the object, technical solutions and advantages of the present invention clearer, pass through specific embodiment below in conjunction with attached drawing
To be illustrated.
Referring to Fig. 1, it illustrates the implementation flow charts of fingerprint verification method provided in an embodiment of the present invention, and details are as follows:
In a step 101, finger print identifying request is received.
In embodiments of the present invention, finger print identifying request, the application program can be initiated from application program to fingerprint equipment
It can be the application program on the fingerprint equipment, it can also answering on another terminal device communicated to connect with the fingerprint equipment
With program, fingerprint equipment receives the finger print identifying request of application program transmission.
It should be noted that application program initiates finger print identifying request to fingerprint equipment, include in finger print identifying request
The finger print information or its fingerprint characteristic value information of the user to be certified of finger print information to be certified namely application program acquisition,
Its authentication purpose be in order to verify whether the user to be certified is authorized user, and, whether which has operation
The permission of the application program.
In a step 102, the determining and associated finger print identifying mode of destination application, wherein the target application journey
Sequence is to send the application program of the finger print identifying request.
In embodiments of the present invention, to send the application program of finger print identifying request to fingerprint equipment as target application journey
Sequence, fingerprint equipment can determine and the associated finger print identifying mould of the destination application when receiving finger print identifying request
Formula.For example, the contingency table of application program and finger print identifying mode can be stored in advance in fingerprint equipment, fingerprint equipment is being received
When the finger print identifying sent to destination application is requested, the mark of the available destination application, and it is based on the mark
Lookup and the associated finger print identifying mode of the destination application from contingency table, or can be stored in advance in fingerprint equipment
The contingency table of fingerprint and finger print identifying mode, fingerprint equipment is in the finger print identifying request for receiving destination application transmission
When, the available fingerprint with the associated fingerprint of the destination application, and is searched from contingency table based on the mark and
The associated finger print identifying mode of the destination application.
Optionally, in one implementation, above-mentioned steps 102 may include:
The determining communication modes communicated with the destination application;Based on the communication modes and preset
One contingency table, the determining and associated finger print identifying mode of the destination application, wherein first contingency table is communication side
Formula-finger print identifying pattern association table.
In the present embodiment, mesh can be determined based on the communication modes that destination application and fingerprint equipment are communicated
Mark the finger print identifying mode of application program.
In practical applications, destination application and fingerprint equipment can pass through SPI (Serial Peripheral
Interface, Serial Peripheral Interface (SPI)), Uart (Universal Asynchronous Receiver/Transmitter, it is general
Asynchronous receiving-transmitting transmitter), IIC (Inter-Integrated Circuit, IC bus), bluetooth, USB (Universal
Serial Bus, universal serial bus), 7816 interfaces etc. communication modes are communicated.Illustratively, it can will be set with fingerprint
It is standby that first certification mode is set as by the destination application that SPI is communicated, will pass through with fingerprint equipment Uart or IIC into
The destination application of row communication is set as the second certification mode, the target application that will be communicated with fingerprint equipment by bluetooth
Program setting is third certification mode.
In embodiments of the present invention, communication modes-finger print identifying pattern association can establish based on the preset rule of correspondence
Table can determine the communication modes of destination application and fingerprint equipment when receiving finger print identifying request;Mesh is being determined
After the communication modes for marking application program and fingerprint equipment, it can be searched from the communication modes-finger print identifying pattern association table
And the determining and associated finger print identifying mode of the destination application.
Optionally, in another implementation, above-mentioned steps 102 may include:
Determine used Encryption Algorithm when fingerprint to be certified is encrypted in the destination application;It is based on
The Encryption Algorithm and preset second contingency table, the determining and associated finger print identifying mode of the destination application,
In, second contingency table is Encryption Algorithm-finger print identifying pattern association table.
In practical applications, destination application sends finger print identifying request to fingerprint equipment, in order to improve safety, needs
The information of transmission is encrypted, for example, it is desired to be encrypted to finger print information to be certified.Herein, the cipher mode
It can be using symmetric encipherment algorithm, be also possible to rivest, shamir, adelman, can also be that hash algorithm or other encryptions are calculated
Method, or can also be the combination of multiple encryption algorithms.
In the present embodiment, the Encryption Algorithm that can be utilized based on different application programs establishes Encryption Algorithm-fingerprint
Certification mode contingency table, when receiving finger print identifying request, it is first determined Encryption Algorithm used in destination application;In
It, can be from the Encryption Algorithm-finger print identifying pattern association table after Encryption Algorithm used in destination application has been determined
It searches and determines and the associated finger print identifying mode of the destination application.
In step 103, the operation of this finger print identifying is executed with the finger print identifying mode
In embodiments of the present invention, determined with after the associated finger print identifying mode of destination application, can be with base
It is that the destination application executes the operation of this finger print identifying in corresponding finger print identifying mode.
In embodiments of the present invention, different finger print identifying modes can correspond to different fingerprint shared models, i.e., different
Finger print identifying permission, for example, the first finger print identifying mode can correspond to unconditional shared model, all applications in this mode
Program carries out finger print identifying using the target fingerprint;Second finger print identifying mode can correspond to conditional shared model,
In this mode, part is met the application program to impose a condition and can be authenticated using the target fingerprint;Third finger print identifying
Mode can correspond to exclusive occupying mode, and in this mode, only specified application program just can use the target fingerprint and be referred to
Line certification.
From the foregoing, it will be observed that the present invention is by when receiving finger print identifying request, determining and sending finger print identifying request
The associated finger print identifying mode of destination application, and execute this finger print identifying using the finger print identifying mode and operate.That is,
Different finger print identifying moulds is respectively associated in the scheme provided according to the present invention, the application program that can carry out finger print identifying to request
Formula enables and carries out finger print identifying based on different finger print identifying modes when carrying out finger print identifying, and different fingerprints is recognized
Card mode can respectively correspond different certification permissions, to improve the flexibility using finger print identifying.
Fig. 2 shows another embodiment of the present invention provides fingerprint verification method implementation flow chart, details are as follows:
In step 201, when carrying out fingerprint register, the fingerprint of registration is configured to different finger print identifying modes.
In embodiments of the present invention, when carrying out fingerprint register, the fingerprint of registration can be configured to different shared moulds
Formula, the corresponding finger print identifying mode of each shared model.
Specifically, when authorized user carries out fingerprint register to fingerprint equipment difference can be configured by the fingerprint of registration
Finger print identifying mode, wherein each finger print identifying mode can correspond to different fingerprint shared models.For example, the first fingerprint
Certification mode can correspond to unconditional shared model, and all application programs are referred to using the target fingerprint in this mode
Line certification;Second finger print identifying mode can correspond to conditional shared model, and in this mode, part meets setting condition
Application program can be authenticated using the target fingerprint;Third finger print identifying mode can correspond to exclusive occupying mode, in the mode
Under, only specified application program just can use the target fingerprint and carry out finger print identifying.
In embodiments of the present invention, its storage region can be divided into different subregions, each sub-district by fingerprint equipment
Domain is used to store the finger print information corresponding to different finger print identifying modes.Destination application is based on finger print identifying associated with it
The permission that there is mode access respective sub-areas to carry out finger print identifying.
Optionally, the finger print identifying mode may include the first finger print identifying mode;In the first finger print identifying mould
Under formula, if the fingerprint of request certification matches with pre-registered fingerprint, it is determined that finger print identifying passes through.
In the present embodiment, the finger print information for being configured to the first finger print identifying mode is stored in the first storage by fingerprint equipment
Region, under the first finger print identifying mode, all application programs may have access to the first storage subregion and carry out finger print identifying.
If the pre-registered fingerprint stored in the fingerprint of destination application request certification and the first storage subregion matches, really
Determine finger print identifying to pass through.
Optionally, the finger print identifying mode includes the second finger print identifying mode;Under the second finger print identifying mode,
If the fingerprint of request certification matches with pre-registered fingerprint, and, the destination application is answering with specified permission
With program, it is determined that finger print identifying passes through.
In the present embodiment, the finger print information for being configured to the second finger print identifying mode is stored in the second storage by fingerprint equipment
Region, under the second finger print identifying mode, the application program for only having specified permission can access the second storage subregion
And carry out finger print identifying.If being stored in the fingerprint of destination application request certification and the second storage subregion pre-registered
Fingerprint matches, and, the destination application is the application program with specified permission, it is determined that finger print identifying passes through.
The finger print identifying mode includes third finger print identifying mode;Under the third finger print identifying mode, if request
The fingerprint of certification matches with pre-registered fingerprint, and, the destination application is specified application program, it is determined that is referred to
Line certification passes through.
In the present embodiment, the finger print information for being configured to third finger print identifying mode is stored in third storage by fingerprint equipment
Region, under the third finger print identifying mode, only specified application program can access third storage subregion and be referred to
Line certification.If the pre-registered fingerprint phase stored in the fingerprint of destination application request certification and third storage subregion
Match, and, the destination application is specified application program, it is determined that finger print identifying passes through.
In step 202, finger print identifying request is received.
In step 203, the determining and associated finger print identifying mode of destination application, wherein the target application journey
Sequence is to send the application program of the finger print identifying request.
In step 204, the operation of this finger print identifying is executed with the finger print identifying mode.
In embodiments of the present invention, for details, reference can be made to the steps in embodiment illustrated in fig. 1 to step 204 for above-mentioned steps 202
101 to step 103, and details are not described herein.
From the foregoing, it will be observed that the present invention is by when receiving finger print identifying request, determining and sending finger print identifying request
The associated finger print identifying mode of destination application, and execute this finger print identifying using the finger print identifying mode and operate.That is,
Different finger print identifying moulds is respectively associated in the scheme provided according to the present invention, the application program that can carry out finger print identifying to request
Formula enables and carries out finger print identifying based on different finger print identifying modes when carrying out finger print identifying, and different fingerprints is recognized
Card mode can respectively correspond different certification permissions, to improve the flexibility using finger print identifying.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process
Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit
It is fixed.
The following are the device of the invention embodiments can refer to above-mentioned corresponding the details of wherein not detailed description
Embodiment of the method.
Fig. 3 shows the structural schematic diagram of fingerprint certification device provided in an embodiment of the present invention, for ease of description, only shows
Go out part related to the embodiment of the present invention, details are as follows:
As shown in figure 3, fingerprint certification device 3 includes: receiving unit 31, determination unit 32 and authentication unit 33.
Receiving unit 31, for receiving finger print identifying request.
Determination unit 32, for the determining and associated finger print identifying mode of destination application, wherein the target application
Program is to send the application program of the finger print identifying request.
Authentication unit 33, the finger print identifying mode for being determined with determination unit 32 execute the operation of this finger print identifying.
Optionally, fingerprint certification device 3 further include:
Fingerprint configuration unit, for configuring the fingerprint of registration to different finger print identifying moulds when carrying out fingerprint register
Formula.
Optionally, the finger print identifying mode includes the first finger print identifying mode, and authentication unit 33 is specifically used for:
The operation of this finger print identifying is executed with the first finger print identifying mode;
Under the first finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, really
Determine finger print identifying to pass through.
Optionally, the finger print identifying mode includes the second finger print identifying mode, and authentication unit 33 is specifically used for:
The operation of this finger print identifying is executed with the second finger print identifying mode;
Under the second finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, institute
Stating destination application is the application program with specified permission, it is determined that finger print identifying passes through.
Optionally, the finger print identifying mode includes third finger print identifying mode, and authentication unit 33 is specifically used for:
The operation of this finger print identifying is executed with the third finger print identifying mode;
Under the third finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, institute
Stating destination application is specified application program, it is determined that finger print identifying passes through.
Optionally, fingerprint certification device 3 further include:
Communication modes determination unit, for the determining communication modes communicated with the destination application;
Correspondingly, determination unit 32 is specifically used for: be based on the communication modes and preset first contingency table, determine with
The associated finger print identifying mode of destination application, wherein first contingency table is communication modes-finger print identifying mode
Contingency table.
Optionally, fingerprint certification device 3 further include:
Encryption Algorithm determination unit, when for determining that fingerprint to be certified is encrypted in the destination application
Used Encryption Algorithm;
Correspondingly, determination unit 32 is specifically used for: be based on the Encryption Algorithm and preset second contingency table, determine with
The associated finger print identifying mode of destination application, wherein second contingency table is Encryption Algorithm-finger print identifying mode
Contingency table.
From the foregoing, it will be observed that the present invention is by when receiving finger print identifying request, determining and sending finger print identifying request
The associated finger print identifying mode of destination application, and execute this finger print identifying using the finger print identifying mode and operate.That is,
Different finger print identifying moulds is respectively associated in the scheme provided according to the present invention, the application program that can carry out finger print identifying to request
Formula enables and carries out finger print identifying based on different finger print identifying modes when carrying out finger print identifying, and different fingerprints is recognized
Card mode can respectively correspond different certification permissions, to improve the flexibility using finger print identifying.
Fig. 4 is the schematic diagram for the terminal that one embodiment of the invention provides.As shown in figure 4, the terminal 4 of the embodiment includes:
Processor 40, memory 41 and it is stored in the computer program that can be run in the memory 41 and on the processor 40
42.The processor 40 realizes the step in above-mentioned each fingerprint verification method embodiment when executing the computer program 42,
Such as step 101 shown in FIG. 1 is to step 103.Alternatively, the processor 40 realized when executing the computer program 42 it is above-mentioned
The function of each module/unit in each Installation practice, such as the function of unit 31 to 33 shown in Fig. 3.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 42 in the terminal 4 is described.For example, the computer program 42 can be divided into
Receiving unit, determination unit and authentication unit, each unit concrete function are as follows:
Receiving unit, for receiving finger print identifying request;
Determination unit, for the determining and associated finger print identifying mode of destination application, wherein the target application journey
Sequence is to send the application program of the finger print identifying request;
Authentication unit, the finger print identifying mode for being determined with the determination unit execute the operation of this finger print identifying.
The terminal 4 can be the meter such as mobile terminal, desktop PC, notebook, palm PC and cloud server
Calculate equipment.The terminal may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4
The only example of terminal 4, the not restriction of structure paired terminal 4 may include than illustrating more or fewer components or group
Close certain components or different components, for example, the terminal can also include input-output equipment, it is network access equipment, total
Line etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 41 can be the internal storage unit of the terminal 4, such as the hard disk or memory of terminal 4.It is described
Memory 41 is also possible to the External memory equipment of the terminal 4, such as the plug-in type hard disk being equipped in the terminal 4, intelligence
Storage card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card)
Deng.Further, the memory 41 can also both include the internal storage unit of the terminal 4 or set including external storage
It is standby.The memory 41 is for other programs and data needed for storing the computer program and the terminal.It is described to deposit
Reservoir 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal and method can pass through
Other modes are realized.For example, device/terminal embodiment described above is only schematical, for example, the module or
The division of unit, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units
Or component can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, institute
Display or the mutual coupling or direct-coupling or communication connection discussed can be through some interfaces, device or unit
INDIRECT COUPLING or communication connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as in certain jurisdictions, according to legislation and patent practice, computer-readable medium do not include be electric carrier signal and
Telecommunication signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (10)
1. a kind of fingerprint verification method, which is characterized in that the fingerprint verification method includes:
Receive finger print identifying request;
The determining and associated finger print identifying mode of destination application, wherein the destination application is to send the fingerprint
The application program of certification request;
The operation of this finger print identifying is executed with the finger print identifying mode.
2. fingerprint verification method according to claim 1, which is characterized in that wrapped before reception finger print identifying request
It includes:
When carrying out fingerprint register, it configures the fingerprint of registration to different finger print identifying modes.
3. fingerprint verification method according to claim 2, which is characterized in that the finger print identifying mode includes the first fingerprint
Certification mode;
It is described with the finger print identifying mode execute this finger print identifying operation include:
The operation of this finger print identifying is executed with the first finger print identifying mode;
Under the first finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, it is determined that refer to
Line certification passes through.
4. fingerprint verification method according to claim 2, which is characterized in that the finger print identifying mode includes the second fingerprint
Certification mode;
It is described with the finger print identifying mode execute this finger print identifying operation include:
The operation of this finger print identifying is executed with the second finger print identifying mode;
Under the second finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, the mesh
Mark application program is the application program with specified permission, it is determined that finger print identifying passes through.
5. fingerprint verification method according to claim 2, which is characterized in that the finger print identifying mode includes third fingerprint
Certification mode;
It is described with the finger print identifying mode execute this finger print identifying operation include:
The operation of this finger print identifying is executed with the third finger print identifying mode;
Under the third finger print identifying mode, if the fingerprint of request certification matches with pre-registered fingerprint, and, the mesh
Mark application program is specified application program, it is determined that finger print identifying passes through.
6. fingerprint verification method according to any one of claims 1 to 5, which is characterized in that the determination and target application
The associated finger print identifying mode of program includes:
The determining communication modes communicated with the destination application;
Based on the communication modes and preset first contingency table, the determining and associated finger print identifying of the destination application
Mode, wherein first contingency table is communication modes-finger print identifying pattern association table.
7. fingerprint verification method according to any one of claims 1 to 5, which is characterized in that the determination and target application
The associated finger print identifying mode of program includes:
Determine used Encryption Algorithm when fingerprint to be certified is encrypted in the destination application;
Based on the Encryption Algorithm and preset second contingency table, the determining and associated finger print identifying of the destination application
Mode, wherein second contingency table is Encryption Algorithm-finger print identifying pattern association table.
8. a kind of fingerprint certification device, which is characterized in that the fingerprint certification device includes:
Receiving unit, for receiving finger print identifying request;
Determination unit, for determining with the associated finger print identifying mode of destination application, wherein the destination application is
Send the application program of the finger print identifying request;
Authentication unit, the finger print identifying mode for being determined with the determination unit execute the operation of this finger print identifying.
9. a kind of terminal, including memory, processor and storage can be run in the memory and on the processor
Computer program, which is characterized in that the processor is realized when executing the computer program as claim 1 to 7 is any
The step of item fingerprint verification method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In the step of realization fingerprint verification method as described in any one of claim 1 to 7 when the computer program is executed by processor
Suddenly.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811063933.XA CN110502963B (en) | 2018-09-12 | 2018-09-12 | Fingerprint authentication method, fingerprint authentication device and terminal |
PCT/CN2019/097947 WO2020052353A1 (en) | 2018-09-12 | 2019-07-26 | Fingerprint authentication method, fingerprint authentication device, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811063933.XA CN110502963B (en) | 2018-09-12 | 2018-09-12 | Fingerprint authentication method, fingerprint authentication device and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110502963A true CN110502963A (en) | 2019-11-26 |
CN110502963B CN110502963B (en) | 2022-04-12 |
Family
ID=68584581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811063933.XA Active CN110502963B (en) | 2018-09-12 | 2018-09-12 | Fingerprint authentication method, fingerprint authentication device and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110502963B (en) |
WO (1) | WO2020052353A1 (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090113524A (en) * | 2008-04-28 | 2009-11-02 | 한국전자통신연구원 | Method of Fingerprint Authentication in Human Body Communication |
CN102801851A (en) * | 2011-05-27 | 2012-11-28 | Lg电子株式会社 | Mobile terminal and mode controlling method therein |
CN103178962A (en) * | 2013-02-05 | 2013-06-26 | 金硕澳门离岸商业服务有限公司 | Universal fingermark authentication method and universal fingermark authentication device |
CN103279411A (en) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | Method and system of entering application programs based on fingerprint identification |
WO2014082387A1 (en) * | 2012-11-28 | 2014-06-05 | 鹤山世达光电科技有限公司 | Nfc-based fingerprint authentication system and fingerprint authentication method |
CN104321778A (en) * | 2012-06-29 | 2015-01-28 | 苹果公司 | Automatic association of authentication credentials with biometrics |
US20150067827A1 (en) * | 2013-08-29 | 2015-03-05 | Pantech Co., Ltd. | Apparatus and method for setting a user-defined pattern for an application |
CN104537327A (en) * | 2014-12-29 | 2015-04-22 | 宁波百世信息科技有限公司 | Electronic tag reading method and device |
CN105245346A (en) * | 2015-10-19 | 2016-01-13 | 宇龙计算机通信科技(深圳)有限公司 | Identity authentication method and user terminal |
CN106790315A (en) * | 2017-04-01 | 2017-05-31 | 深圳天珑无线科技有限公司 | A kind of right management method and device |
CN107632870A (en) * | 2017-09-19 | 2018-01-26 | 维沃移动通信有限公司 | The startup method and terminal of a kind of application |
CN108141363A (en) * | 2015-10-15 | 2018-06-08 | 诺基亚技术有限公司 | For the device of certification, method and computer program product |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5500180B2 (en) * | 2010-01-28 | 2014-05-21 | 富士通株式会社 | Fingerprint authentication apparatus, fingerprint authentication method, and fingerprint authentication program |
CN105975182B (en) * | 2012-08-20 | 2019-05-24 | 华为终端有限公司 | A kind of terminal operation method and terminal |
CN103914641A (en) * | 2013-01-04 | 2014-07-09 | 贝伦企业股份有限公司 | Fingerprint management method and system |
CN103886237A (en) * | 2014-03-26 | 2014-06-25 | 深圳市亚略特生物识别科技有限公司 | Control method and system for electronic device with fingerprint sensor and touch screen |
CN105022570A (en) * | 2015-06-30 | 2015-11-04 | 广东欧珀移动通信有限公司 | Method for controlling applications through fingerprint identification and terminal device |
-
2018
- 2018-09-12 CN CN201811063933.XA patent/CN110502963B/en active Active
-
2019
- 2019-07-26 WO PCT/CN2019/097947 patent/WO2020052353A1/en active Application Filing
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20090113524A (en) * | 2008-04-28 | 2009-11-02 | 한국전자통신연구원 | Method of Fingerprint Authentication in Human Body Communication |
CN102801851A (en) * | 2011-05-27 | 2012-11-28 | Lg电子株式会社 | Mobile terminal and mode controlling method therein |
CN104321778A (en) * | 2012-06-29 | 2015-01-28 | 苹果公司 | Automatic association of authentication credentials with biometrics |
WO2014082387A1 (en) * | 2012-11-28 | 2014-06-05 | 鹤山世达光电科技有限公司 | Nfc-based fingerprint authentication system and fingerprint authentication method |
CN103178962A (en) * | 2013-02-05 | 2013-06-26 | 金硕澳门离岸商业服务有限公司 | Universal fingermark authentication method and universal fingermark authentication device |
CN103279411A (en) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | Method and system of entering application programs based on fingerprint identification |
US20150067827A1 (en) * | 2013-08-29 | 2015-03-05 | Pantech Co., Ltd. | Apparatus and method for setting a user-defined pattern for an application |
CN104537327A (en) * | 2014-12-29 | 2015-04-22 | 宁波百世信息科技有限公司 | Electronic tag reading method and device |
CN108141363A (en) * | 2015-10-15 | 2018-06-08 | 诺基亚技术有限公司 | For the device of certification, method and computer program product |
CN105245346A (en) * | 2015-10-19 | 2016-01-13 | 宇龙计算机通信科技(深圳)有限公司 | Identity authentication method and user terminal |
CN106790315A (en) * | 2017-04-01 | 2017-05-31 | 深圳天珑无线科技有限公司 | A kind of right management method and device |
CN107632870A (en) * | 2017-09-19 | 2018-01-26 | 维沃移动通信有限公司 | The startup method and terminal of a kind of application |
Non-Patent Citations (2)
Title |
---|
GUOBO XIE等: "Cloud storage identity design based on fingerprint identification", 《2013 6TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING》 * |
赵建: "基于加密电路和同态加密的指纹认证方法研究", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110502963B (en) | 2022-04-12 |
WO2020052353A1 (en) | 2020-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105408910B (en) | System and method for being verified using wireless communication to user | |
EP2995039B1 (en) | Systems and methods for secure communication | |
CN208580402U (en) | Store equipment and the station for storing equipment | |
US10164966B2 (en) | Decoupling identity from devices in the internet of things | |
CN109460966A (en) | Contract signing method, apparatus and terminal device based on requesting party's classification | |
EP2541458A1 (en) | Resource management system and corresponding method | |
US10361864B2 (en) | Enabling a secure OEM platform feature in a computing environment | |
CN110071940A (en) | Software package encipher-decipher method, server, user equipment and storage medium | |
CN109067528A (en) | Crypto-operation, method, cryptographic service platform and the equipment for creating working key | |
CN110362357A (en) | A kind of configuration file management method and device of application program | |
US10439809B2 (en) | Method and apparatus for managing application identifier | |
US8918844B1 (en) | Device presence validation | |
US20190141048A1 (en) | Blockchain identification system | |
CN109787769A (en) | Offline authentication method, user terminal and the device end of internet of things equipment | |
US10019556B2 (en) | EPID attestation using RFID | |
CN108959904A (en) | Terminal device applies login method and terminal device | |
CN113709115B (en) | Authentication method and device | |
CN111586142A (en) | Safe multi-party computing method and system | |
CN109787754A (en) | A kind of data encryption/decryption method, computer readable storage medium and server | |
CN108183889A (en) | Identity identifying method and identification authentication system | |
CN110266653A (en) | A kind of method for authenticating, system and terminal device | |
CN108965315A (en) | A kind of authentic authentication method of terminal device, device and terminal device | |
CN110198538A (en) | A kind of method and device obtaining device identification | |
CN111510421B (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN110149633A (en) | It is a kind of to support batch Secure authentication method and system of verifying |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |