CN112581656A - Identity verification method, mobile phone and intelligent door lock - Google Patents

Identity verification method, mobile phone and intelligent door lock Download PDF

Info

Publication number
CN112581656A
CN112581656A CN202011354976.0A CN202011354976A CN112581656A CN 112581656 A CN112581656 A CN 112581656A CN 202011354976 A CN202011354976 A CN 202011354976A CN 112581656 A CN112581656 A CN 112581656A
Authority
CN
China
Prior art keywords
password
information
fingerprint
fingerprint information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011354976.0A
Other languages
Chinese (zh)
Inventor
赵志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Inspur Genersoft Information Technology Co Ltd
Original Assignee
Shandong Inspur Genersoft Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Inspur Genersoft Information Technology Co Ltd filed Critical Shandong Inspur Genersoft Information Technology Co Ltd
Priority to CN202011354976.0A priority Critical patent/CN112581656A/en
Publication of CN112581656A publication Critical patent/CN112581656A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention relates to the technical field of identity authentication, in particular to an identity authentication method, a mobile phone and an intelligent door lock. The identity authentication method comprises the following steps: acquiring fingerprint information of a user from a password input operation through an under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information; and synchronously verifying the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double-identity authentication on the user. The beneficial effects of the invention include: according to the invention, the fingerprint information of the user is acquired while the user inputs the password information, so that double identity information verification of password verification and fingerprint verification is realized, the problems that a digital password is easy to leak or crack, the fingerprint information is easy to steal or the fingerprint identification is easy to trigger by mistake can be effectively solved, and the safety and reliability of identity verification are effectively improved.

Description

Identity verification method, mobile phone and intelligent door lock
Technical Field
The invention relates to the technical field of identity authentication, in particular to an identity authentication method, a mobile phone and an intelligent door lock.
Background
At present, identity authentication in devices such as smart door locks, smart phones and tablet computers is performed in a single authentication mode, such as only a fingerprint authentication mode or only a password authentication mode. The drawbacks of this single authentication approach include:
a single digital password is easily revealed or cracked, while a single fingerprint identification is easily stolen or in some cases falsely triggered, resulting in lower security and reliability.
Disclosure of Invention
In order to solve the technical problems mentioned in the background, in one aspect of the present invention, an identity verification method is provided, the method comprising: acquiring fingerprint information of a user from a password input operation through an under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information; and synchronously verifying the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double-identity authentication on the user.
In one or more embodiments, the acquiring, by the off-screen fingerprint identification function module, fingerprint information of a user from a password input operation according to a preset first policy while acquiring password information includes: fingerprint information is collected when a user inputs password information on a designated password bit.
In one or more embodiments, the acquiring, by the off-screen fingerprint identification function module, fingerprint information of a user from a password input operation according to a preset first policy while acquiring password information includes: fingerprint information is collected as the user enters the password information at each password bit.
In one or more embodiments, the method further comprises: presetting configuration information; the configuration information comprises the number of the password bits, the password on the password bits and the fingerprint information on the password bits; when a plurality of pieces of fingerprint information need to be set on a plurality of password bits, the plurality of pieces of fingerprint information are the same fingerprint information or different fingerprint information.
In one or more embodiments, the configuration information further includes: fingerprint verification passes a threshold; correspondingly, when obtaining the password information, the fingerprint information of the user is collected from the password input operation through the under-screen fingerprint identification function module according to the preset first strategy, and the method further comprises the following steps: and in the process of responding to synchronous verification of the password information and the fingerprint information, the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, and the acquisition and verification of the fingerprint information in the subsequent password input process are stopped.
In one or more embodiments, the synchronously verifying the password information and the fingerprint information according to a preset second policy to synchronously perform dual authentication on a user includes: and responding to that the password information and the fingerprint information on the appointed password position are verified and passed, and the identity authentication is passed.
In one or more embodiments, the synchronously verifying the password information and the fingerprint information according to a preset second policy to synchronously perform dual authentication on a user includes: and responding to that the password information and the fingerprint information on each password bit are verified and passed, and the identity authentication is passed.
In one or more embodiments, the synchronously verifying the password information and the fingerprint information according to a preset second policy to synchronously perform dual authentication on a user includes: and responding to the password information passing verification, and the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, so that the identity verification is passed.
In another aspect of the present invention, a smart phone is also presented, which includes a screen with an off-screen fingerprint recognition function and a storage medium; wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method as described in any one of the above.
In another aspect of the invention, an intelligent door lock is further provided, and the intelligent door lock comprises a module with an under-screen fingerprint identification function and a storage medium; wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method as described in any one of the above.
The beneficial effects of the invention include: according to the invention, the fingerprint information of the user is acquired while the user inputs the password information, so that double identity information verification of password verification and fingerprint verification is realized, the problems that a digital password is easy to leak or crack, the fingerprint information is easy to steal or the fingerprint identification is easy to trigger by mistake can be effectively solved, and the safety and reliability of identity verification are effectively improved. In addition, the invention also designs different fingerprint acquisition strategies (first strategies) and identity authentication strategies (second strategies) aiming at different application scenes, thereby meeting the requirements of quick identification, accurate identification and the like on the premise of ensuring the safety and reliability of the identity authentication.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a flowchart of the operation of the identity verification method of the present invention;
FIG. 2 is a schematic diagram of a first alternative embodiment for unlocking a screen saver using the method of the present invention;
FIG. 3 is a schematic diagram of a second alternative embodiment of online payment using the method of the present invention;
fig. 4 is a schematic diagram of a third alternative embodiment of online payment by the method of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
The invention provides an identity authentication method, a mobile phone and an intelligent door lock, and the key idea is to combine fingerprint identification and password identification by using the existing under-screen fingerprint identification technology, thereby providing a safer and more reliable identity authentication means. The specific scheme of the invention is as follows:
fig. 1 is a flowchart of the operation of the authentication method of the present invention. In the example of fig. 1, the work flow of the identity recognition method of the present invention includes: step S1, acquiring fingerprint information of a user from password input operation through the under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information; and step S2, synchronously checking the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double authentication on the user.
Specifically, the invention is suitable for equipment with an underscreen fingerprint identification function module, such as equipment with an underscreen fingerprint identification screen, such as a smart phone, a tablet personal computer, a smart door lock and the like.
In the above example, the present invention provides a method for collecting fingerprint information of a user while inputting a password, so as to combine a password authentication method with a fingerprint authentication method to provide a more secure and reliable authentication means, however, in order to adapt to different application scenarios and achieve different technical effects, the present invention further provides the following specific embodiments based on the above example.
In one embodiment, the user controls the implementation of the first policy by setting configuration information. The configuration information set by the user in this embodiment includes the number of the password bits, the password on the password bits, and the fingerprint information on the designated password bits; accordingly, the first policy in this embodiment includes collecting fingerprint information when the user inputs password information on a specified password bit. The process of unlocking the mobile phone screen saver will be described in more detail below.
FIG. 2 is a schematic diagram of a first alternative embodiment for unlocking a screen saver using the method of the present invention. As shown in fig. 2, this embodiment is a process of unlocking the screen saver by inputting a 6-digit password by a user. Before unlocking, a user needs to configure a 6-bit screen protection password, and optionally configures a fingerprint password on the third password bit and the fifth password bit. The fingerprint information configured on the third password bit and the fifth password bit can be the same or different.
Specifically, the same fingerprint information is configured on the third password position and the fifth password position, for example, the fingerprint information of the index finger of the right hand is arranged on the third password position and the fifth password position; different fingerprint information is configured on the third password position and the fifth password position, for example, fingerprint information of a left index finger is configured on the third password position, and fingerprint information of a right index finger is configured on the fifth password position.
In the operation process of unlocking the screen protection, when the configuration information comprises the same fingerprint information configured on the third password bit and the fifth password bit, a user needs to input the password by using the index finger of the right hand when inputting the password information of the third password bit and the fifth password bit so as to identify the password information on the appointed password bit and the fingerprint information synchronously in the subsequent process. Similarly, when the configuration information includes different fingerprint information configured on the third password bit and the fifth password bit, the user needs to input the password with the left index finger when inputting the password information of the third password bit, and needs to input with the right index finger when inputting the password information of the fifth password bit, so as to subsequently and synchronously identify the password information on the designated password bit and the fingerprint information.
In the process of identity recognition, after password information on a specified password bit is input, the acquired password information and fingerprint information are synchronously verified in a mobile phone background, and when all password information and the fingerprint information on the specified password bit pass verification, identity authentication of a user is passed, and screen protection of the mobile phone is unlocked.
By arranging the fingerprint information on the designated password position, the more safe and reliable identity authentication can be realized, and the false identification rate of fingerprint identification can be reduced by reducing the fingerprint verification times, so that the speed of the identity authentication process is increased, and the speed of related operations is further increased; the embodiment is suitable for application scenes with quick identity authentication requirements such as mobile phone screen unlocking.
In a further optional embodiment, in order to further increase the authentication speed, a fingerprint authentication passing threshold may be further set in the configuration information, so that in the process of verifying (fingerprint identification) the fingerprint information, when the number of times of passing verification of the fingerprint information reaches the fingerprint authentication passing threshold, the acquisition and verification of the fingerprint information in the subsequent password input process are stopped. For example, when the fingerprint verification passing threshold is set to be 1, and the password information on the third password bit is input, after the synchronous verification of the fingerprint information passes, the fingerprint information is collected and verified when the password information on the fifth password bit is not input any more. In this way, the safe and reliable identity authentication can be realized more quickly. And because the starting duration of fingerprint collection can be effectively reduced, the energy consumption from fingerprint collection operation can be effectively reduced, and the standby time of equipment such as a mobile phone and the like can be prolonged.
The mode of setting the fingerprint verification passing threshold value brings changes to the identity verification process that no matter the password information on the third password bit is input, the synchronous verification of the fingerprint information passes or the password information on the fifth password bit is input, and the synchronous verification of the fingerprint information passes, so that after all the password verifications pass, the identity verification of the user is passed, and the screen protection of the mobile phone is unlocked.
In another embodiment, the user controls the implementation of the first policy by setting configuration information. In this embodiment, the configuration information set by the user includes the number of password bits, the password on the password bits, and fingerprint information set on each password bit; accordingly, the first strategy in this embodiment includes collecting fingerprint information when the user enters password information at each password bit. Optionally, the same fingerprint information is set for all the password bits; optionally, different fingerprint information is set for part of the password bits; preferably, different fingerprint information is set for each cipher bit. This will be explained in more detail below by means of an online payment process.
Fig. 3 is a schematic diagram of a second alternative embodiment of online payment by the method of the present invention. As shown in fig. 3, this embodiment is a process of online payment by a user inputting a 6-digit password. Before online payment, a user needs to configure a 6-bit payment password, and specifically, the same fingerprint information is set for all password bits, for example, the fingerprint information of the index finger of the right hand is set on the 6-bit password bit.
Fig. 4 is a schematic diagram of a third alternative embodiment of online payment by the method of the present invention. As shown in fig. 4, this embodiment is a process of inputting a 6-digit password by a user to perform online payment. Before online payment, a user needs to configure a 6-bit payment password, and specifically, different fingerprint information is set for partial password bits, for example, right-hand index finger fingerprint information is set for the 1 st, 2 nd and 3 rd password bits, and right-hand middle finger fingerprint information is set for the 4 th, 5 th and 6 th password bits. More extreme, different fingerprint information is set for each password bit, for example, fingerprint information of a right hand index finger and fingerprint information of a right hand middle finger are respectively set for the 1 st to 6 th password bits. Fingerprint information of right-hand ring finger, fingerprint information of left-hand index finger, fingerprint information of left-hand middle finger, and fingerprint information of left-hand ring finger.
In the embodiment shown in fig. 4, during the online payment verification process, the user needs to input the corresponding password information on the corresponding password bit and also needs to use the corresponding finger to perform the input.
In the process of identity recognition, when a user inputs password information, the acquired password information and fingerprint information are synchronously verified in the mobile phone background, and when all password information and fingerprint information corresponding to all password positions are verified, the user passes identity verification and online payment is carried out. Although the embodiments in fig. 3 and fig. 4 can effectively ensure the security of online payment, multiple fingerprint acquisition and verification processes may require re-input verification due to fingerprint acquisition failure or fingerprint verification failure, and further affect the payment experience of the user, so that on the basis of ensuring the security of the identity verification, a fingerprint verification passing threshold is set in the configuration information, so as to be used in the verification (fingerprint identification) process of the fingerprint information, and when the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, the acquisition and verification of the fingerprint information in the subsequent password input process are stopped, so as to improve the speed of the identity verification and improve the accuracy of the operation. For example, when the fingerprint verification passing threshold is set to be 2, after the password information of the first password bit and the second password bit is input and the synchronous verification of the fingerprint information passes, the fingerprint information is collected and verified when the subsequent password information is not input any more. In this way, the authentication can be realized more quickly. And because the starting duration of fingerprint collection can be effectively reduced, the energy consumption from fingerprint collection operation can be effectively reduced, and the standby time of equipment such as a mobile phone and the like can be prolonged.
The mode of setting the fingerprint verification passing threshold value brings about the change to the identity verification process that no matter the password information on the third password bit is input, the synchronous verification of the fingerprint information passes or the password information on the fifth password bit is input, and the synchronous verification of the fingerprint information passes, so that the identity verification of the user is passed and online payment is carried out after all the password verifications pass. The method of the embodiment also ensures the accuracy of the operation on the basis of ensuring the operation safety.
It should be noted that the password information mentioned in the above embodiments is digital password information.
It should be noted that the above embodiments do not limit the specific way in which the fingerprint information is configured according to the present invention. The number of bits for setting the password bits, the configuration number and the configuration position of the fingerprint information, and the fingerprint information of which finger is specifically adopted can be freely selected by the user, and a plurality of permutation and combination schemes formed by the combination schemes are also within the protection scope of the invention.
On the basis of the identity authentication method, the invention also provides a smart phone which comprises a screen with an underscreen fingerprint identification function and a storage medium; wherein the storage medium stores an executable computer program, and the computer program is executed to implement the identity authentication method in the above embodiments.
On the basis of the identity authentication method, the invention also provides an intelligent door lock, which comprises a screen with an under-screen fingerprint identification function and a storage medium; wherein the storage medium stores an executable computer program, and the computer program is executed to implement the identity authentication method in the above embodiments.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. An identity verification method, the method comprising:
acquiring fingerprint information of a user from a password input operation through an under-screen fingerprint identification function module according to a preset first strategy while acquiring the password information;
and synchronously verifying the password information and the fingerprint information according to a preset second strategy so as to synchronously carry out double-identity authentication on the user.
2. The identity authentication method of claim 1, wherein the collecting of the fingerprint information of the user from the password input operation by the under-screen fingerprint identification function module according to the preset first policy while obtaining the password information comprises:
fingerprint information is collected when a user inputs password information on a designated password bit.
3. The identity authentication method of claim 1, wherein the collecting of the fingerprint information of the user from the password input operation by the under-screen fingerprint identification function module according to the preset first policy while obtaining the password information comprises:
fingerprint information is collected as the user enters the password information at each password bit.
4. A method of identity verification according to claim 2 or 3, the method further comprising: presetting configuration information; the configuration information includes
The number of the password bits, the password on the password bits and the fingerprint information on the password bits;
when a plurality of pieces of fingerprint information need to be set on a plurality of password bits, the plurality of pieces of fingerprint information are the same fingerprint information or different fingerprint information.
5. The authentication method of claim 4, wherein the configuration information further comprises: fingerprint verification passes a threshold; correspondingly, when obtaining the password information, the fingerprint information of the user is collected from the password input operation through the under-screen fingerprint identification function module according to the preset first strategy, and the method further comprises the following steps:
and in the process of responding to synchronous verification of the password information and the fingerprint information, the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, and the acquisition and verification of the fingerprint information in the subsequent password input process are stopped.
6. The identity authentication method of claim 2, wherein the synchronously verifying the password information and the fingerprint information according to a preset second policy for synchronously performing double identity authentication on the user comprises:
and responding to that the password information and the fingerprint information on the appointed password position are verified and passed, and the identity authentication is passed.
7. The identity authentication method of claim 3, wherein the synchronously verifying the password information and the fingerprint information according to the preset second policy for synchronously performing double identity authentication on the user comprises:
and responding to that the password information and the fingerprint information on each password bit are verified and passed, and the identity authentication is passed.
8. The identity authentication method of claim 5, wherein the synchronously verifying the password information and the fingerprint information according to the preset second policy for synchronously performing double identity authentication on the user comprises:
and responding to the password information passing verification, and the verification passing times of the fingerprint information reaches the fingerprint verification passing threshold, so that the identity verification is passed.
9. A smart phone, characterized in that the smart phone comprises a screen with an under-screen fingerprint recognition function and a storage medium;
wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method according to any one of claims 1-8.
10. An intelligent door lock is characterized by comprising a module with an underscreen fingerprint identification function and a storage medium;
wherein the storage medium has stored therein an executable computer program which, when executed, implements an authentication method according to any one of claims 1-8.
CN202011354976.0A 2020-11-27 2020-11-27 Identity verification method, mobile phone and intelligent door lock Pending CN112581656A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011354976.0A CN112581656A (en) 2020-11-27 2020-11-27 Identity verification method, mobile phone and intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011354976.0A CN112581656A (en) 2020-11-27 2020-11-27 Identity verification method, mobile phone and intelligent door lock

Publications (1)

Publication Number Publication Date
CN112581656A true CN112581656A (en) 2021-03-30

Family

ID=75124028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011354976.0A Pending CN112581656A (en) 2020-11-27 2020-11-27 Identity verification method, mobile phone and intelligent door lock

Country Status (1)

Country Link
CN (1) CN112581656A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948791A (en) * 2021-05-17 2021-06-11 支付宝(杭州)信息技术有限公司 User identity authentication method and device
CN113111324A (en) * 2021-04-21 2021-07-13 北京京东方传感技术有限公司 Identity verification method and terminal
CN114776144A (en) * 2022-03-25 2022-07-22 上海创米智能科技有限公司 Intelligent door lock system, control method thereof and intelligent door
CN114809853A (en) * 2022-04-27 2022-07-29 华人运通(江苏)技术有限公司 Electric storage box
CN115482608A (en) * 2021-12-02 2022-12-16 云丁网络技术(北京)有限公司 Control method and system of intelligent lock

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156028A1 (en) * 2005-01-04 2006-07-13 Fujitsu Limited Security management method, program, and information device
CN104091103A (en) * 2014-07-03 2014-10-08 南昌欧菲生物识别技术有限公司 Fingerprint and password combined type verification method and device thereof
CN106648125A (en) * 2016-11-30 2017-05-10 上海斐讯数据通信技术有限公司 Fingerprint keyboard, verification system and method based on fingerprint keyboard
CN106778557A (en) * 2016-11-30 2017-05-31 努比亚技术有限公司 Fingerprint identification device and method
CN107507308A (en) * 2017-08-17 2017-12-22 美的智慧家居科技有限公司 The method, apparatus and intelligent door lock of a kind of match information
CN109240559A (en) * 2018-08-01 2019-01-18 Oppo广东移动通信有限公司 Application control method and electronic device
CN109960907A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 A kind of method for identifying ID and equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060156028A1 (en) * 2005-01-04 2006-07-13 Fujitsu Limited Security management method, program, and information device
CN104091103A (en) * 2014-07-03 2014-10-08 南昌欧菲生物识别技术有限公司 Fingerprint and password combined type verification method and device thereof
CN106648125A (en) * 2016-11-30 2017-05-10 上海斐讯数据通信技术有限公司 Fingerprint keyboard, verification system and method based on fingerprint keyboard
CN106778557A (en) * 2016-11-30 2017-05-31 努比亚技术有限公司 Fingerprint identification device and method
CN107507308A (en) * 2017-08-17 2017-12-22 美的智慧家居科技有限公司 The method, apparatus and intelligent door lock of a kind of match information
CN109960907A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 A kind of method for identifying ID and equipment
CN109240559A (en) * 2018-08-01 2019-01-18 Oppo广东移动通信有限公司 Application control method and electronic device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113111324A (en) * 2021-04-21 2021-07-13 北京京东方传感技术有限公司 Identity verification method and terminal
CN112948791A (en) * 2021-05-17 2021-06-11 支付宝(杭州)信息技术有限公司 User identity authentication method and device
CN115482608A (en) * 2021-12-02 2022-12-16 云丁网络技术(北京)有限公司 Control method and system of intelligent lock
CN114776144A (en) * 2022-03-25 2022-07-22 上海创米智能科技有限公司 Intelligent door lock system, control method thereof and intelligent door
CN114809853A (en) * 2022-04-27 2022-07-29 华人运通(江苏)技术有限公司 Electric storage box
CN114809853B (en) * 2022-04-27 2023-12-05 华人运通(江苏)技术有限公司 Electric storage box

Similar Documents

Publication Publication Date Title
CN112581656A (en) Identity verification method, mobile phone and intelligent door lock
CN103677644B (en) A kind of unlocking method and system of intelligent mobile terminal
JP5727008B2 (en) Operating system unlocking method and mobile phone
CN104700007B (en) A kind of setting of gesture impression password and application process
CN105429761B (en) A kind of key generation method and device
WO2017045386A1 (en) Fingerprint recognition method and device for touch screen, and touch screen
WO2015117674A1 (en) Method for unlocking a mobile communication device and a device thereof
CN101436935A (en) PIN code verification method through fingerprint identification
CN101499905A (en) Image password authentication system for mobile device and method therefor
CN104851164B (en) Intelligent lock with biological feature recognition function and control method thereof
CN101174948A (en) Network login system and method with face authentication
CN107038357A (en) User authority control method and mobile terminal
CN107612880A (en) One kind applies access method and device
CN101799857A (en) Password authentication method
CN102968275A (en) Unlocking method and system of mobile terminal
CN109559415A (en) A kind of intelligent door lock control method and intelligent door lock
CN109933966A (en) Continuous authentication method and system based on biological characteristics
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
CN104270754B (en) A kind of Subscriber Identity Module method for authenticating and device
CN106127005A (en) The user management method of a kind of mobile terminal and system
CN106611110A (en) Identity verification method and system
CN105678143A (en) Methods and devices for setting and acquiring electronic business card
CN104966017A (en) Password input protection system and method
Hossain et al. Implementing Biometric or Graphical Password Authentication in a Universal Three-Factor Authentication System
CN106845197A (en) A kind of fingerprint identification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210330