CN112581656A - Identity verification method, mobile phone and intelligent door lock - Google Patents
Identity verification method, mobile phone and intelligent door lock Download PDFInfo
- Publication number
- CN112581656A CN112581656A CN202011354976.0A CN202011354976A CN112581656A CN 112581656 A CN112581656 A CN 112581656A CN 202011354976 A CN202011354976 A CN 202011354976A CN 112581656 A CN112581656 A CN 112581656A
- Authority
- CN
- China
- Prior art keywords
- password
- information
- fingerprint
- fingerprint information
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000012795 verification Methods 0.000 title claims abstract description 64
- 230000008569 process Effects 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 8
- 230000001360 synchronised effect Effects 0.000 claims description 8
- 230000009286 beneficial effect Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 6
- 230000009977 dual effect Effects 0.000 description 3
- 238000005265 energy consumption Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000002035 prolonged effect Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The invention relates to the technical field of identity authentication, in particular to an identity authentication method, a mobile phone and an intelligent door lock. The identity authentication method comprises the following steps: acquiring fingerprint information of a user from a password input operation through an under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information; and synchronously verifying the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double-identity authentication on the user. The beneficial effects of the invention include: according to the invention, the fingerprint information of the user is acquired while the user inputs the password information, so that double identity information verification of password verification and fingerprint verification is realized, the problems that a digital password is easy to leak or crack, the fingerprint information is easy to steal or the fingerprint identification is easy to trigger by mistake can be effectively solved, and the safety and reliability of identity verification are effectively improved.
Description
Technical Field
The invention relates to the technical field of identity authentication, in particular to an identity authentication method, a mobile phone and an intelligent door lock.
Background
At present, identity authentication in devices such as smart door locks, smart phones and tablet computers is performed in a single authentication mode, such as only a fingerprint authentication mode or only a password authentication mode. The drawbacks of this single authentication approach include:
a single digital password is easily revealed or cracked, while a single fingerprint identification is easily stolen or in some cases falsely triggered, resulting in lower security and reliability.
Disclosure of Invention
In order to solve the technical problems mentioned in the background, in one aspect of the present invention, an identity verification method is provided, the method comprising: acquiring fingerprint information of a user from a password input operation through an under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information; and synchronously verifying the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double-identity authentication on the user.
In one or more embodiments, the acquiring, by the off-screen fingerprint identification function module, fingerprint information of a user from a password input operation according to a preset first policy while acquiring password information includes: fingerprint information is collected when a user inputs password information on a designated password bit.
In one or more embodiments, the acquiring, by the off-screen fingerprint identification function module, fingerprint information of a user from a password input operation according to a preset first policy while acquiring password information includes: fingerprint information is collected as the user enters the password information at each password bit.
In one or more embodiments, the method further comprises: presetting configuration information; the configuration information comprises the number of the password bits, the password on the password bits and the fingerprint information on the password bits; when a plurality of pieces of fingerprint information need to be set on a plurality of password bits, the plurality of pieces of fingerprint information are the same fingerprint information or different fingerprint information.
In one or more embodiments, the configuration information further includes: fingerprint verification passes a threshold; correspondingly, when obtaining the password information, the fingerprint information of the user is collected from the password input operation through the under-screen fingerprint identification function module according to the preset first strategy, and the method further comprises the following steps: and in the process of responding to synchronous verification of the password information and the fingerprint information, the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, and the acquisition and verification of the fingerprint information in the subsequent password input process are stopped.
In one or more embodiments, the synchronously verifying the password information and the fingerprint information according to a preset second policy to synchronously perform dual authentication on a user includes: and responding to that the password information and the fingerprint information on the appointed password position are verified and passed, and the identity authentication is passed.
In one or more embodiments, the synchronously verifying the password information and the fingerprint information according to a preset second policy to synchronously perform dual authentication on a user includes: and responding to that the password information and the fingerprint information on each password bit are verified and passed, and the identity authentication is passed.
In one or more embodiments, the synchronously verifying the password information and the fingerprint information according to a preset second policy to synchronously perform dual authentication on a user includes: and responding to the password information passing verification, and the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, so that the identity verification is passed.
In another aspect of the present invention, a smart phone is also presented, which includes a screen with an off-screen fingerprint recognition function and a storage medium; wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method as described in any one of the above.
In another aspect of the invention, an intelligent door lock is further provided, and the intelligent door lock comprises a module with an under-screen fingerprint identification function and a storage medium; wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method as described in any one of the above.
The beneficial effects of the invention include: according to the invention, the fingerprint information of the user is acquired while the user inputs the password information, so that double identity information verification of password verification and fingerprint verification is realized, the problems that a digital password is easy to leak or crack, the fingerprint information is easy to steal or the fingerprint identification is easy to trigger by mistake can be effectively solved, and the safety and reliability of identity verification are effectively improved. In addition, the invention also designs different fingerprint acquisition strategies (first strategies) and identity authentication strategies (second strategies) aiming at different application scenes, thereby meeting the requirements of quick identification, accurate identification and the like on the premise of ensuring the safety and reliability of the identity authentication.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a flowchart of the operation of the identity verification method of the present invention;
FIG. 2 is a schematic diagram of a first alternative embodiment for unlocking a screen saver using the method of the present invention;
FIG. 3 is a schematic diagram of a second alternative embodiment of online payment using the method of the present invention;
fig. 4 is a schematic diagram of a third alternative embodiment of online payment by the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
The invention provides an identity authentication method, a mobile phone and an intelligent door lock, and the key idea is to combine fingerprint identification and password identification by using the existing under-screen fingerprint identification technology, thereby providing a safer and more reliable identity authentication means. The specific scheme of the invention is as follows:
fig. 1 is a flowchart of the operation of the authentication method of the present invention. In the example of fig. 1, the work flow of the identity recognition method of the present invention includes: step S1, acquiring fingerprint information of a user from password input operation through the under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information; and step S2, synchronously checking the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double authentication on the user.
Specifically, the invention is suitable for equipment with an underscreen fingerprint identification function module, such as equipment with an underscreen fingerprint identification screen, such as a smart phone, a tablet personal computer, a smart door lock and the like.
In the above example, the present invention provides a method for collecting fingerprint information of a user while inputting a password, so as to combine a password authentication method with a fingerprint authentication method to provide a more secure and reliable authentication means, however, in order to adapt to different application scenarios and achieve different technical effects, the present invention further provides the following specific embodiments based on the above example.
In one embodiment, the user controls the implementation of the first policy by setting configuration information. The configuration information set by the user in this embodiment includes the number of the password bits, the password on the password bits, and the fingerprint information on the designated password bits; accordingly, the first policy in this embodiment includes collecting fingerprint information when the user inputs password information on a specified password bit. The process of unlocking the mobile phone screen saver will be described in more detail below.
FIG. 2 is a schematic diagram of a first alternative embodiment for unlocking a screen saver using the method of the present invention. As shown in fig. 2, this embodiment is a process of unlocking the screen saver by inputting a 6-digit password by a user. Before unlocking, a user needs to configure a 6-bit screen protection password, and optionally configures a fingerprint password on the third password bit and the fifth password bit. The fingerprint information configured on the third password bit and the fifth password bit can be the same or different.
Specifically, the same fingerprint information is configured on the third password position and the fifth password position, for example, the fingerprint information of the index finger of the right hand is arranged on the third password position and the fifth password position; different fingerprint information is configured on the third password position and the fifth password position, for example, fingerprint information of a left index finger is configured on the third password position, and fingerprint information of a right index finger is configured on the fifth password position.
In the operation process of unlocking the screen protection, when the configuration information comprises the same fingerprint information configured on the third password bit and the fifth password bit, a user needs to input the password by using the index finger of the right hand when inputting the password information of the third password bit and the fifth password bit so as to identify the password information on the appointed password bit and the fingerprint information synchronously in the subsequent process. Similarly, when the configuration information includes different fingerprint information configured on the third password bit and the fifth password bit, the user needs to input the password with the left index finger when inputting the password information of the third password bit, and needs to input with the right index finger when inputting the password information of the fifth password bit, so as to subsequently and synchronously identify the password information on the designated password bit and the fingerprint information.
In the process of identity recognition, after password information on a specified password bit is input, the acquired password information and fingerprint information are synchronously verified in a mobile phone background, and when all password information and the fingerprint information on the specified password bit pass verification, identity authentication of a user is passed, and screen protection of the mobile phone is unlocked.
By arranging the fingerprint information on the designated password position, the more safe and reliable identity authentication can be realized, and the false identification rate of fingerprint identification can be reduced by reducing the fingerprint verification times, so that the speed of the identity authentication process is increased, and the speed of related operations is further increased; the embodiment is suitable for application scenes with quick identity authentication requirements such as mobile phone screen unlocking.
In a further optional embodiment, in order to further increase the authentication speed, a fingerprint authentication passing threshold may be further set in the configuration information, so that in the process of verifying (fingerprint identification) the fingerprint information, when the number of times of passing verification of the fingerprint information reaches the fingerprint authentication passing threshold, the acquisition and verification of the fingerprint information in the subsequent password input process are stopped. For example, when the fingerprint verification passing threshold is set to be 1, and the password information on the third password bit is input, after the synchronous verification of the fingerprint information passes, the fingerprint information is collected and verified when the password information on the fifth password bit is not input any more. In this way, the safe and reliable identity authentication can be realized more quickly. And because the starting duration of fingerprint collection can be effectively reduced, the energy consumption from fingerprint collection operation can be effectively reduced, and the standby time of equipment such as a mobile phone and the like can be prolonged.
The mode of setting the fingerprint verification passing threshold value brings changes to the identity verification process that no matter the password information on the third password bit is input, the synchronous verification of the fingerprint information passes or the password information on the fifth password bit is input, and the synchronous verification of the fingerprint information passes, so that after all the password verifications pass, the identity verification of the user is passed, and the screen protection of the mobile phone is unlocked.
In another embodiment, the user controls the implementation of the first policy by setting configuration information. In this embodiment, the configuration information set by the user includes the number of password bits, the password on the password bits, and fingerprint information set on each password bit; accordingly, the first strategy in this embodiment includes collecting fingerprint information when the user enters password information at each password bit. Optionally, the same fingerprint information is set for all the password bits; optionally, different fingerprint information is set for part of the password bits; preferably, different fingerprint information is set for each cipher bit. This will be explained in more detail below by means of an online payment process.
Fig. 3 is a schematic diagram of a second alternative embodiment of online payment by the method of the present invention. As shown in fig. 3, this embodiment is a process of online payment by a user inputting a 6-digit password. Before online payment, a user needs to configure a 6-bit payment password, and specifically, the same fingerprint information is set for all password bits, for example, the fingerprint information of the index finger of the right hand is set on the 6-bit password bit.
Fig. 4 is a schematic diagram of a third alternative embodiment of online payment by the method of the present invention. As shown in fig. 4, this embodiment is a process of inputting a 6-digit password by a user to perform online payment. Before online payment, a user needs to configure a 6-bit payment password, and specifically, different fingerprint information is set for partial password bits, for example, right-hand index finger fingerprint information is set for the 1 st, 2 nd and 3 rd password bits, and right-hand middle finger fingerprint information is set for the 4 th, 5 th and 6 th password bits. More extreme, different fingerprint information is set for each password bit, for example, fingerprint information of a right hand index finger and fingerprint information of a right hand middle finger are respectively set for the 1 st to 6 th password bits. Fingerprint information of right-hand ring finger, fingerprint information of left-hand index finger, fingerprint information of left-hand middle finger, and fingerprint information of left-hand ring finger.
In the embodiment shown in fig. 4, during the online payment verification process, the user needs to input the corresponding password information on the corresponding password bit and also needs to use the corresponding finger to perform the input.
In the process of identity recognition, when a user inputs password information, the acquired password information and fingerprint information are synchronously verified in the mobile phone background, and when all password information and fingerprint information corresponding to all password positions are verified, the user passes identity verification and online payment is carried out. Although the embodiments in fig. 3 and fig. 4 can effectively ensure the security of online payment, multiple fingerprint acquisition and verification processes may require re-input verification due to fingerprint acquisition failure or fingerprint verification failure, and further affect the payment experience of the user, so that on the basis of ensuring the security of the identity verification, a fingerprint verification passing threshold is set in the configuration information, so as to be used in the verification (fingerprint identification) process of the fingerprint information, and when the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, the acquisition and verification of the fingerprint information in the subsequent password input process are stopped, so as to improve the speed of the identity verification and improve the accuracy of the operation. For example, when the fingerprint verification passing threshold is set to be 2, after the password information of the first password bit and the second password bit is input and the synchronous verification of the fingerprint information passes, the fingerprint information is collected and verified when the subsequent password information is not input any more. In this way, the authentication can be realized more quickly. And because the starting duration of fingerprint collection can be effectively reduced, the energy consumption from fingerprint collection operation can be effectively reduced, and the standby time of equipment such as a mobile phone and the like can be prolonged.
The mode of setting the fingerprint verification passing threshold value brings about the change to the identity verification process that no matter the password information on the third password bit is input, the synchronous verification of the fingerprint information passes or the password information on the fifth password bit is input, and the synchronous verification of the fingerprint information passes, so that the identity verification of the user is passed and online payment is carried out after all the password verifications pass. The method of the embodiment also ensures the accuracy of the operation on the basis of ensuring the operation safety.
It should be noted that the password information mentioned in the above embodiments is digital password information.
It should be noted that the above embodiments do not limit the specific way in which the fingerprint information is configured according to the present invention. The number of bits for setting the password bits, the configuration number and the configuration position of the fingerprint information, and the fingerprint information of which finger is specifically adopted can be freely selected by the user, and a plurality of permutation and combination schemes formed by the combination schemes are also within the protection scope of the invention.
On the basis of the identity authentication method, the invention also provides a smart phone which comprises a screen with an underscreen fingerprint identification function and a storage medium; wherein the storage medium stores an executable computer program, and the computer program is executed to implement the identity authentication method in the above embodiments.
On the basis of the identity authentication method, the invention also provides an intelligent door lock, which comprises a screen with an under-screen fingerprint identification function and a storage medium; wherein the storage medium stores an executable computer program, and the computer program is executed to implement the identity authentication method in the above embodiments.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.
Claims (10)
1. An identity verification method, the method comprising:
acquiring fingerprint information of a user from a password input operation through an under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information;
and synchronously verifying the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double-identity authentication on the user.
2. The identity authentication method of claim 1, wherein the collecting of the fingerprint information of the user from the password input operation by the under-screen fingerprint identification function module according to the preset first policy while obtaining the password information comprises:
fingerprint information is collected when a user inputs password information on a designated password bit.
3. The identity authentication method of claim 1, wherein the collecting of the fingerprint information of the user from the password input operation by the under-screen fingerprint identification function module according to the preset first policy while obtaining the password information comprises:
fingerprint information is collected as the user enters the password information at each password bit.
4. A method of identity verification according to claim 2 or 3, the method further comprising: presetting configuration information; the configuration information includes
The number of the password bits, the password on the password bits and the fingerprint information on the password bits;
when a plurality of pieces of fingerprint information need to be set on a plurality of password bits, the plurality of pieces of fingerprint information are the same fingerprint information or different fingerprint information.
5. The authentication method of claim 4, wherein the configuration information further comprises: fingerprint verification passes a threshold; correspondingly, when obtaining the password information, the fingerprint information of the user is collected from the password input operation through the under-screen fingerprint identification function module according to the preset first strategy, and the method further comprises the following steps:
and in the process of responding to synchronous verification of the password information and the fingerprint information, the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, and the acquisition and verification of the fingerprint information in the subsequent password input process are stopped.
6. The identity authentication method of claim 2, wherein the synchronously verifying the password information and the fingerprint information according to a preset second policy for synchronously performing double identity authentication on the user comprises:
and responding to that the password information and the fingerprint information on the appointed password position are verified and passed, and the identity authentication is passed.
7. The identity authentication method of claim 3, wherein the synchronously verifying the password information and the fingerprint information according to the preset second policy for synchronously performing double identity authentication on the user comprises:
and responding to that the password information and the fingerprint information on each password bit are verified and passed, and the identity authentication is passed.
8. The identity authentication method of claim 5, wherein the synchronously verifying the password information and the fingerprint information according to the preset second policy for synchronously performing double identity authentication on the user comprises:
and responding to the password information passing verification, and the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, so that the identity verification is passed.
9. A smart phone, characterized in that the smart phone comprises a screen with an under-screen fingerprint recognition function and a storage medium;
wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method according to any one of claims 1-8.
10. An intelligent door lock is characterized by comprising a module with an underscreen fingerprint identification function and a storage medium;
wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method according to any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011354976.0A CN112581656A (en) | 2020-11-27 | 2020-11-27 | Identity verification method, mobile phone and intelligent door lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011354976.0A CN112581656A (en) | 2020-11-27 | 2020-11-27 | Identity verification method, mobile phone and intelligent door lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112581656A true CN112581656A (en) | 2021-03-30 |
Family
ID=75124028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011354976.0A Pending CN112581656A (en) | 2020-11-27 | 2020-11-27 | Identity verification method, mobile phone and intelligent door lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112581656A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112948791A (en) * | 2021-05-17 | 2021-06-11 | 支付宝(杭州)信息技术有限公司 | User identity authentication method and device |
CN113111324A (en) * | 2021-04-21 | 2021-07-13 | 北京京东方传感技术有限公司 | Identity verification method and terminal |
CN114776144A (en) * | 2022-03-25 | 2022-07-22 | 上海创米智能科技有限公司 | Intelligent door lock system, control method thereof and intelligent door |
CN114809853A (en) * | 2022-04-27 | 2022-07-29 | 华人运通(江苏)技术有限公司 | Electric storage box |
CN115482608A (en) * | 2021-12-02 | 2022-12-16 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060156028A1 (en) * | 2005-01-04 | 2006-07-13 | Fujitsu Limited | Security management method, program, and information device |
CN104091103A (en) * | 2014-07-03 | 2014-10-08 | 南昌欧菲生物识别技术有限公司 | Fingerprint and password combined type verification method and device thereof |
CN106648125A (en) * | 2016-11-30 | 2017-05-10 | 上海斐讯数据通信技术有限公司 | Fingerprint keyboard, verification system and method based on fingerprint keyboard |
CN106778557A (en) * | 2016-11-30 | 2017-05-31 | 努比亚技术有限公司 | Fingerprint identification device and method |
CN107507308A (en) * | 2017-08-17 | 2017-12-22 | 美的智慧家居科技有限公司 | The method, apparatus and intelligent door lock of a kind of match information |
CN109240559A (en) * | 2018-08-01 | 2019-01-18 | Oppo广东移动通信有限公司 | Application control method and electronic device |
CN109960907A (en) * | 2017-12-26 | 2019-07-02 | 航天信息股份有限公司 | A kind of method for identifying ID and equipment |
-
2020
- 2020-11-27 CN CN202011354976.0A patent/CN112581656A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060156028A1 (en) * | 2005-01-04 | 2006-07-13 | Fujitsu Limited | Security management method, program, and information device |
CN104091103A (en) * | 2014-07-03 | 2014-10-08 | 南昌欧菲生物识别技术有限公司 | Fingerprint and password combined type verification method and device thereof |
CN106648125A (en) * | 2016-11-30 | 2017-05-10 | 上海斐讯数据通信技术有限公司 | Fingerprint keyboard, verification system and method based on fingerprint keyboard |
CN106778557A (en) * | 2016-11-30 | 2017-05-31 | 努比亚技术有限公司 | Fingerprint identification device and method |
CN107507308A (en) * | 2017-08-17 | 2017-12-22 | 美的智慧家居科技有限公司 | The method, apparatus and intelligent door lock of a kind of match information |
CN109960907A (en) * | 2017-12-26 | 2019-07-02 | 航天信息股份有限公司 | A kind of method for identifying ID and equipment |
CN109240559A (en) * | 2018-08-01 | 2019-01-18 | Oppo广东移动通信有限公司 | Application control method and electronic device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113111324A (en) * | 2021-04-21 | 2021-07-13 | 北京京东方传感技术有限公司 | Identity verification method and terminal |
CN112948791A (en) * | 2021-05-17 | 2021-06-11 | 支付宝(杭州)信息技术有限公司 | User identity authentication method and device |
CN115482608A (en) * | 2021-12-02 | 2022-12-16 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
CN114776144A (en) * | 2022-03-25 | 2022-07-22 | 上海创米智能科技有限公司 | Intelligent door lock system, control method thereof and intelligent door |
CN114809853A (en) * | 2022-04-27 | 2022-07-29 | 华人运通(江苏)技术有限公司 | Electric storage box |
CN114809853B (en) * | 2022-04-27 | 2023-12-05 | 华人运通(江苏)技术有限公司 | Electric storage box |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112581656A (en) | Identity verification method, mobile phone and intelligent door lock | |
CN103677644B (en) | A kind of unlocking method and system of intelligent mobile terminal | |
JP5727008B2 (en) | Operating system unlocking method and mobile phone | |
CN104700007B (en) | A kind of setting of gesture impression password and application process | |
CN105429761B (en) | A kind of key generation method and device | |
WO2017045386A1 (en) | Fingerprint recognition method and device for touch screen, and touch screen | |
WO2015117674A1 (en) | Method for unlocking a mobile communication device and a device thereof | |
CN101436935A (en) | PIN code verification method through fingerprint identification | |
CN101499905A (en) | Image password authentication system for mobile device and method therefor | |
CN104851164B (en) | Intelligent lock with biological feature recognition function and control method thereof | |
CN101174948A (en) | Network login system and method with face authentication | |
CN107038357A (en) | User authority control method and mobile terminal | |
CN107612880A (en) | One kind applies access method and device | |
CN101799857A (en) | Password authentication method | |
CN102968275A (en) | Unlocking method and system of mobile terminal | |
CN109559415A (en) | A kind of intelligent door lock control method and intelligent door lock | |
CN109933966A (en) | Continuous authentication method and system based on biological characteristics | |
CN105653918B (en) | Method for safely carrying out, safe operating device and terminal | |
CN104270754B (en) | A kind of Subscriber Identity Module method for authenticating and device | |
CN106127005A (en) | The user management method of a kind of mobile terminal and system | |
CN106611110A (en) | Identity verification method and system | |
CN105678143A (en) | Methods and devices for setting and acquiring electronic business card | |
CN104966017A (en) | Password input protection system and method | |
Hossain et al. | Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System | |
CN106845197A (en) | A kind of fingerprint identification method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210330 |