CN114969705A - Fingerprint unlocking method and device, electronic equipment and storage medium - Google Patents
Fingerprint unlocking method and device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114969705A CN114969705A CN202210617264.6A CN202210617264A CN114969705A CN 114969705 A CN114969705 A CN 114969705A CN 202210617264 A CN202210617264 A CN 202210617264A CN 114969705 A CN114969705 A CN 114969705A
- Authority
- CN
- China
- Prior art keywords
- fingerprint
- time
- information
- unlocking
- request information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 230000004044 response Effects 0.000 claims description 19
- 238000000926 separation method Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 239000013078 crystal Substances 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Electric Clocks (AREA)
Abstract
The invention discloses a fingerprint unlocking method and device, electronic equipment and a storage medium, and relates to the technical field of fingerprint safety. The fingerprint unlocking method is applied to electronic equipment and comprises the following steps: receiving fingerprint unlocking request information; responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time; acquiring the current timing time of a timer preset in the electronic equipment, wherein the current timing time is a second time; responding to the fact that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval, and comparing the fingerprint information with prestored fingerprint information; and if the fingerprint information comparison is passed, an unlocking instruction is sent. The invention can prevent remote attack and has high safety.
Description
Technical Field
The invention relates to the technical field of fingerprint security, in particular to a fingerprint unlocking method and device, an electronic device and a storage medium.
Background
The fingerprint is the line that the terminal of human finger is formed by unsmooth skin, and the fingerprint just forms before the birth of human and the shape of fingerprint along with individual's growth can not change, only change by an obvious degree, and everyone's fingerprint all is different, can carry out good differentiation in many detailed descriptions.
With the development of science and technology, the fingerprint identification technology has been widely applied to various industries and daily life of people, and particularly, the fingerprint unlocking function brings convenience and better confidentiality to the life of people in many aspects.
At present, although fingerprint information is protected by means of encryption and the like, the fingerprint information still has the risk of being stolen and used. Especially in a remote attack scene, an attacker can easily use the stolen fingerprint information to break the security defense line of the electronic equipment, so that the information security of the electronic equipment is damaged.
Disclosure of Invention
In view of this, the present invention provides a fingerprint unlocking method, apparatus, electronic device and storage medium, which can prevent remote attack and have high security.
In a first aspect, the present invention provides a fingerprint unlocking method applied to an electronic device, including:
receiving fingerprint unlocking request information;
responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time;
acquiring the current timing time of a timer preset in the electronic equipment, wherein the current timing time is a second time;
in response to the difference value between the second time and the first time being smaller than a preset fingerprint effective time interval, comparing the fingerprint information with the prestored fingerprint information;
and if the fingerprint information comparison is passed, an unlocking instruction is sent.
With reference to the first aspect, in an implementation manner of the first aspect, after the receiving fingerprint unlocking request information, the method includes:
and refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
With reference to the first aspect, in another implementation manner of the first aspect, after the obtaining of the current timing time of a timer preset in the electronic device, the method includes:
and refusing unlocking in response to the fact that the difference value of the second time and the first time is larger than or equal to a preset fingerprint effective time interval.
With reference to the first aspect, in a further implementation manner of the first aspect, after comparing the fingerprint information with pre-stored fingerprint information in response to that a difference between the second time and the first time is smaller than a preset fingerprint valid time interval, the method includes:
and if the fingerprint information comparison fails, refusing to unlock.
With reference to the first aspect, in a further implementation manner of the first aspect, a timing time of the timer is different from a system time of the electronic device;
and/or the timer does not provide an interface to the outside and is invisible to the outside.
With reference to the first aspect, in a further implementation manner of the first aspect, the preset fingerprint valid time interval is less than or equal to 2 s.
With reference to the first aspect, in a further implementation manner of the first aspect, the fingerprint unlocking request information is obtained by acquiring, by a fingerprint controller of the electronic device, fingerprint information of a user and a current timing time of the timer when the user presses to acquire a fingerprint, where the current timing time is an initial time, and then combining the acquired fingerprint information of the user and the initial time.
In a second aspect, the present invention provides a fingerprint unlocking device applied to an electronic device, including:
the receiving module is used for receiving fingerprint unlocking request information;
the separation module is used for responding to the fact that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into the fingerprint information and the time information, wherein the time information is first time;
the acquisition module is used for acquiring the current timing time of a timer preset in the electronic equipment, and the current timing time is second time;
the comparison module is used for comparing the fingerprint information with the prestored fingerprint information in response to the fact that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval;
and the unlocking module is used for sending an unlocking instruction if the fingerprint information comparison is passed.
With reference to the second aspect, in one embodiment of the second aspect, the apparatus comprises:
and the first unlocking unit is used for refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
In another embodiment of the second aspect, in combination with the second aspect, the apparatus comprises:
and the second unlocking unit is used for refusing to unlock in response to the fact that the difference value of the second time and the first time is larger than or equal to the preset fingerprint effective time interval.
In a further embodiment of the second aspect, in combination with the second aspect, the apparatus comprises:
and the third unlocking unit is used for refusing to unlock if the fingerprint information comparison fails.
With reference to the second aspect, in a further embodiment of the second aspect, a timing time of the timer is different from a system time of the electronic device;
and/or the timer does not provide an interface to the outside and is not visible to the outside.
With reference to the second aspect, in a further embodiment of the second aspect, the preset fingerprint valid time interval is less than or equal to 2 s.
With reference to the second aspect, in a further implementation manner of the second aspect, the fingerprint unlocking request information is generated by a fingerprint controller of the electronic device, acquiring fingerprint information of the user and a current timing time of the timer when the user presses the collected fingerprint, where the current timing time is an initial time, and then combining the acquired fingerprint information of the user and the initial time.
In a third aspect, the present invention provides an electronic device, comprising: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing any of the methods described above.
In a fourth aspect, the present invention also provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement any of the methods described above.
The fingerprint unlocking method, the fingerprint unlocking device, the electronic equipment and the storage medium provided by the invention firstly receive fingerprint unlocking request information, then respond to the fact that the fingerprint unlocking request information contains time information, separate the fingerprint unlocking request information into the fingerprint information and the time information, the time information is first time, then obtain the current timing time of a timer which is preset in the electronic equipment, the current timing time is second time, respond to the fact that the difference value of the second time and the first time is smaller than a preset fingerprint effective time interval, compare the fingerprint information with the fingerprint information which is stored in advance, and finally send an unlocking instruction if the fingerprint information comparison is passed. Therefore, the embodiment of the invention provides a fingerprint management mechanism with timeliness, the fingerprint safety of a user is protected by adding time information/timeliness to fingerprint unlocking request information, even if an attacker steals the fingerprint information of the user, the attacker cannot know the time information required by the fingerprint unlocking request information, so that the attacker cannot forge and send correct fingerprint unlocking request information to a fingerprint unlocking device in a remote attack scene, the electronic equipment cannot be unlocked smoothly, the information safety of the electronic equipment is ensured, and the safety is greatly improved. Therefore, the embodiment of the invention can prevent remote attack and has high safety.
In order to more clearly illustrate the invention, the invention is further described below with reference to preferred embodiments and the accompanying drawings. Similar parts in the figures are denoted by the same reference numerals. It is to be understood by persons skilled in the art that the following detailed description is illustrative and not restrictive, and is not to be taken as limiting the scope of the invention.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario architecture of the fingerprint unlocking method of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a fingerprint unlocking method according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a fingerprint unlocking method according to the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of a fingerprint unlocking device according to the present invention;
fig. 5 is a schematic structural diagram of an embodiment of an electronic device according to the present invention.
Detailed Description
In one aspect, the present invention provides a fingerprint unlocking method, which is applied to an electronic device, and firstly introduces the electronic device, as shown in fig. 1, a fingerprint module 10 of the electronic device may include a fingerprint controller 1, a fingerprint unlocking device 2, and a timer 3, where:
the fingerprint controller 1 is used for controlling fingerprint input and transmitting fingerprint data to the fingerprint unlocking device;
the fingerprint unlocking device 2 is used for receiving fingerprint data of the fingerprint controller, judging fingerprint validity and unlocking feedback;
the timer 3 is used for determining the effective time of the fingerprint when the fingerprint is unlocked;
also shown in fig. 1 are a memory 4 and a crystal 5, the memory 4 being used for storing fingerprint information and validity interval information, the crystal 5 being used for providing a clock signal for the timer 3.
As shown in fig. 2, the fingerprint unlocking method of the present embodiment, executed by the fingerprint unlocker 2, includes:
step 101: receiving fingerprint unlocking request information;
in this step, the fingerprint unlocker 2 receives the fingerprint unlocking request information sent by the fingerprint controller 1. In fig. 3, the fingerprint unlock request information is DT 1.
Step 102: responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time;
in the invention, the fingerprint unlocking request information additionally stipulates that the time information is required to be contained besides the fingerprint information to be identified, so that even if the fingerprint information of a user is stolen, an attacker cannot know the required time information, so that the attacker cannot forge and send correct fingerprint unlocking request information to the fingerprint unlocking device 2 in a remote attack scene, the electronic equipment cannot be unlocked smoothly, and the information security of the electronic equipment is ensured. In fig. 3, the fingerprint information is D1, and the first time is T1; if the fingerprint unlocking request information DT1 is encrypted, the step may be performed by first decrypting and then performing information separation processing.
As an alternative embodiment, after receiving the fingerprint unlocking request information (step 101), the method may include:
step 102': and refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
At this time, in a remote attack scene, since the attacker cannot know the time information required by the fingerprint unlocking request information, the attacker cannot forge and send correct fingerprint unlocking request information to the fingerprint unlocking device 2, so that the electronic device cannot be unlocked smoothly, and the information security of the electronic device is ensured.
Step 103: acquiring the current timing time of a timer 3 preset in the electronic equipment, wherein the current timing time is a second time;
in this step, the fingerprint unlocker 2 separates the fingerprint unlocking request information into fingerprint information and time information, and then obtains the current timing time (second time) of the timer 3 preset in the electronic device. In fig. 3, the second time is T2.
Step 104: in response to the difference value between the second time and the first time being smaller than a preset fingerprint effective time interval, comparing the fingerprint information with the prestored fingerprint information;
in fig. 3, the preset fingerprint effective time interval is T3, and in this step, when T2-T1< T3, the fingerprint information D1 is compared with the prestored fingerprint information D2, and a specific comparison algorithm may be implemented by using a conventional algorithm in the art, which is not described herein again.
In the fingerprint input stage (when used for the first time), the fingerprint controller 1 may prompt the user to set a fingerprint valid time interval (i.e., a preset fingerprint valid time interval), and store the fingerprint valid time interval in the memory B area, where the preset fingerprint valid time interval T3 is preferably less than or equal to 2 s; then, the user inputs the fingerprint, and the fingerprint can be stored in the area A of the memory after being encrypted. The fingerprint is only encrypted conventionally and no time information is added. The preset fingerprint valid time interval T3 and the user fingerprint data D2 are stored in the memory in an area, and under the condition that the outside is unclear, the stolen data are fingerprints and time intervals, but not fingerprints, and cannot be directly used, so that the safety of data storage is improved.
As an alternative embodiment, after acquiring the current timing time of a timer preset in the electronic device (step 103), the method may include:
step 104': and refusing unlocking in response to the fact that the difference value of the second time and the first time is larger than or equal to a preset fingerprint effective time interval.
In FIG. 3, this step is to refuse unlocking when T2-T1 ≧ T3.
Step 105: and if the fingerprint information comparison is passed, an unlocking instruction is sent.
As an alternative embodiment, after comparing the fingerprint information with the pre-stored fingerprint information (step 104) in response to the difference between the second time and the first time being less than the preset fingerprint valid time interval, the method may include:
step 105': and if the fingerprint information comparison fails, refusing to unlock.
In this step, if the fingerprint information comparison fails, unlocking is rejected, and the result can be fed back to the fingerprint controller 1.
As another alternative, it is conceivable that if the attacker knows the composition rule of the fingerprint unlocking request information, the fingerprint unlocking request information may be forged by acquiring the system time of the electronic device, so to increase the forging difficulty, the timing time of the timer 3 is preferably different from the system time of the electronic device, so as to further increase the security of the electronic device. Also, the timer 3 is preferably a specially configured timer, which does not provide an interface to the outside and is invisible to the outside, so as to prevent an attacker from remotely reading the timing time of the timer 3.
As another alternative embodiment, the fingerprint unlocking request information may be obtained by the fingerprint controller 1 of the electronic device acquiring the fingerprint information of the user and the current timing time of the timer 3 when the user presses the collected fingerprint, the current timing time being an initial time, and then combining the acquired fingerprint information of the user and the initial time to generate, and specifically, before the fingerprint unlocking request information is received (step 101), the method steps performed by the fingerprint controller 1 may include:
step 1001: when a user presses an acquired fingerprint, the fingerprint controller 1 acquires fingerprint information of the user and the current timing time of the timer 3, wherein the current timing time is initial time;
in this step, when the user needs to unlock, the finger presses the collected fingerprint, and the fingerprint controller 1 reads the time information of the timer 3. In fig. 3, the fingerprint information of the user thus collected is D0, and the current counting time (i.e., initial time) of the timer 3 is T0.
Step 1002: the fingerprint controller 1 combines the acquired fingerprint information of the user with the initial time to generate the fingerprint unlocking request information.
In fig. 3, after collecting the fingerprint data of the user, the fingerprint controller 1 merges the fingerprint information D0 and the time information T0 (or encrypts the data if necessary) to generate DT1 as the fingerprint unlock request information, and the fingerprint unlock request information DT1 carries time information for subsequent transmission to the fingerprint unlocker 2.
Thus, after the step 1001 and the step 1002, the technical scheme of the embodiment of the invention does not affect the normal use experience of the user for the user who collects the fingerprint on site for verification, but can achieve a good evading effect for the remote attack situation.
To sum up, the fingerprint unlocking method provided by the embodiment of the invention is applied to electronic equipment, firstly receives fingerprint unlocking request information, then responds to the fact that the fingerprint unlocking request information contains time information, separates the fingerprint unlocking request information into the fingerprint information and the time information, the time information is first time, then obtains the current timing time of a timer preset in the electronic equipment, the current timing time is second time, responds to the fact that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval, compares the fingerprint information with the fingerprint information stored in advance, and finally sends an unlocking instruction if the fingerprint information comparison is passed. Therefore, the embodiment of the invention provides a fingerprint management mechanism with timeliness, the fingerprint safety of a user is protected by adding time information/timeliness to fingerprint unlocking request information, even if an attacker steals the fingerprint information of the user, the attacker cannot know the time information required by the fingerprint unlocking request information, so that the attacker cannot forge and send correct fingerprint unlocking request information to a fingerprint unlocking device in a remote attack scene, the electronic equipment cannot be unlocked smoothly, the information safety of the electronic equipment is ensured, and the safety is greatly improved. Therefore, the embodiment of the invention can prevent remote attack and has high safety.
Fig. 3 is a flowchart illustrating a specific example of the fingerprint unlocking method of the present invention, wherein the related steps are described above, and thus are not repeated herein, and only the related 4 times T0 to T3 are described as follows:
t0 is the current time of the internal timer when the user touches the collected fingerprint during unlocking, and the value of the current time is uncertain;
the value of T1 is consistent with that of T0, T0 is encrypted after being synthesized with fingerprint data, and T1 is obtained when the data is decrypted, wherein T0 is data processed by the fingerprint controller 1 and T1 is data processed by the fingerprint unlocker 2 only for distinguishing;
t2 is the current time of the internal timer, which is read again after the data packet is decrypted and the time and fingerprint data in the data packet are separated, and its value is [ T0, T0+ T3) (i.e. T0 ═ T1 ═ T2< T0+ T3);
t3 is the time interval between unlocking within the valid time set by the user (the maximum time allowed for the user to press the fingerprint until the end of the fingerprint comparison, which is the timer time inside the fingerprint module, not the time of the external system), and generally takes the value T3 ═ 2 s.
On the other hand, an embodiment of the present invention provides a fingerprint unlocking device, which is applied to an electronic device, and as shown in fig. 4, the fingerprint unlocking device may include:
the receiving module 11 is configured to receive fingerprint unlocking request information;
the separation module 12 is configured to, in response to that the fingerprint unlocking request information includes time information, separate the fingerprint unlocking request information into fingerprint information and time information, where the time information is first time;
an obtaining module 13, configured to obtain a current timing time of a timer preset in the electronic device, where the current timing time is a second time;
a comparison module 14, configured to compare the fingerprint information with pre-stored fingerprint information in response to that a difference between the second time and the first time is smaller than a preset fingerprint valid time interval;
and the unlocking module 15 is used for sending an unlocking instruction if the fingerprint information comparison is passed.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Preferably, the apparatus comprises:
and the first unlocking unit is used for refusing unlocking in response to the fact that the fingerprint unlocking request information does not contain time information.
Preferably, the apparatus comprises:
and the second unlocking unit is used for refusing to unlock in response to the fact that the difference value of the second time and the first time is larger than or equal to the preset fingerprint effective time interval.
Preferably, the apparatus comprises:
and the third unlocking unit is used for refusing to unlock if the fingerprint information comparison fails.
Preferably, the timing time of the timer is different from the system time of the electronic device;
and/or the timer does not provide an interface to the outside and is not visible to the outside.
Preferably, the preset fingerprint valid time interval is less than or equal to 2 s.
Preferably, the fingerprint unlocking request information is obtained by acquiring, by a fingerprint controller of the electronic device, fingerprint information of a user and current timing time of the timer when the user presses an acquired fingerprint, where the current timing time is initial time, and then combining the acquired fingerprint information of the user and the initial time.
An embodiment of the present invention further provides an electronic device, fig. 5 is a schematic structural diagram of an embodiment of the electronic device of the present invention, and a flow of the embodiment shown in fig. 2 of the present invention may be implemented, as shown in fig. 5, where the electronic device may include: the device comprises a shell 41, a processor 42, a memory 43, a circuit board 44 and a power circuit 45, wherein the circuit board 44 is arranged inside a space enclosed by the shell 41, and the processor 42 and the memory 43 are arranged on the circuit board 44; a power supply circuit 45 for supplying power to each circuit or device of the electronic apparatus; the memory 43 is used for storing executable program code; the processor 42 executes a program corresponding to the executable program code by reading the executable program code stored in the memory 43, for performing the method described in any of the method embodiments described above.
The specific execution process of the above steps by the processor 42 and the steps further executed by the processor 42 by running the executable program code may refer to the description of the embodiment shown in fig. 2 of the present invention, and are not described herein again.
The electronic device exists in a variety of forms, including but not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA, MID, and UMPC devices, etc., such as ipads.
(3) A portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio, video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic equipment with a data interaction function.
The embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the method steps described in any of the above method embodiments.
Embodiments of the invention also provide an application program, which is executed to implement the method provided by any one of the method embodiments of the invention.
It is to be noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on differences from other embodiments. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment. For convenience of description, the above devices are described separately in terms of functional division into various units/modules. Of course, the functionality of the units/modules may be implemented in one or more software and/or hardware implementations of the invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
It should be understood that the above-mentioned embodiments of the present invention are only examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention, and it will be obvious to those skilled in the art that other variations or modifications may be made on the basis of the above description, and all embodiments may not be exhaustive, and all obvious variations or modifications may be included within the scope of the present invention.
Claims (10)
1. A fingerprint unlocking method is applied to electronic equipment and is characterized by comprising the following steps:
receiving fingerprint unlocking request information;
responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time;
acquiring the current timing time of a timer preset in the electronic equipment, wherein the current timing time is a second time;
in response to the difference value between the second time and the first time being smaller than a preset fingerprint effective time interval, comparing the fingerprint information with the prestored fingerprint information;
and if the fingerprint information comparison is passed, an unlocking instruction is sent.
2. The method according to claim 1, wherein after receiving the fingerprint unlocking request information, the method comprises:
and refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
3. The method according to claim 1, wherein after acquiring the current timing time of the timer preset in the electronic device, the method comprises:
and refusing unlocking in response to the fact that the difference value of the second time and the first time is larger than or equal to a preset fingerprint effective time interval.
4. The method of claim 1, wherein the comparing the fingerprint information with the pre-stored fingerprint information in response to the difference between the second time and the first time being less than the preset fingerprint validity time interval comprises:
and if the fingerprint information comparison fails, refusing to unlock.
5. The method according to any of claims 1-4, wherein the timer times at a different time than a system time of the electronic device;
and/or the timer does not provide an interface to the outside and is not visible to the outside.
6. The method according to any of claims 1-4, wherein the predetermined fingerprint validity time interval is less than or equal to 2 s.
7. The method according to any one of claims 1 to 4, wherein the fingerprint unlocking request information is generated by a fingerprint controller of the electronic device acquiring fingerprint information of the user and a current timing time of the timer when the user presses the collected fingerprint, and the current timing time is an initial time, and then combining the acquired fingerprint information of the user and the initial time.
8. The utility model provides a fingerprint unlocking device, is applied to electronic equipment, its characterized in that includes:
the receiving module is used for receiving fingerprint unlocking request information;
the separation module is used for responding to the fact that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into the fingerprint information and the time information, wherein the time information is first time;
the acquisition module is used for acquiring the current timing time of a timer preset in the electronic equipment, and the current timing time is second time;
the comparison module is used for responding that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval, and comparing the fingerprint information with the fingerprint information stored in advance;
and the unlocking module is used for sending an unlocking instruction if the fingerprint information comparison is passed.
9. An electronic device, characterized in that the electronic device comprises: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the method of any of the above claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores one or more programs which are executable by one or more processors to implement the method of any of the preceding claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210617264.6A CN114969705B (en) | 2022-06-01 | 2022-06-01 | Fingerprint unlocking method and device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210617264.6A CN114969705B (en) | 2022-06-01 | 2022-06-01 | Fingerprint unlocking method and device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114969705A true CN114969705A (en) | 2022-08-30 |
CN114969705B CN114969705B (en) | 2024-08-16 |
Family
ID=82958717
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210617264.6A Active CN114969705B (en) | 2022-06-01 | 2022-06-01 | Fingerprint unlocking method and device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114969705B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105069343A (en) * | 2015-08-26 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method, fingerprint verification apparatus and terminal |
CN106020418A (en) * | 2016-05-16 | 2016-10-12 | 广东欧珀移动通信有限公司 | Method and apparatus for reducing power consumption of mobile terminal, and mobile terminal |
CN106951768A (en) * | 2017-05-10 | 2017-07-14 | 广东欧珀移动通信有限公司 | The ageing control method of unlocked by fingerprint, device, mobile terminal and storage medium |
CN107315938A (en) * | 2017-06-26 | 2017-11-03 | 上海斐讯数据通信技术有限公司 | A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device |
US20170344786A1 (en) * | 2016-05-27 | 2017-11-30 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Electronic device with fingerprint identification function and fingerprint identification method |
WO2018145241A1 (en) * | 2017-02-07 | 2018-08-16 | 廖建强 | Method and device for electronic payment based on fingerprint information |
US10078743B1 (en) * | 2013-01-31 | 2018-09-18 | Narus, Inc. | Cross identification of users in cyber space and physical world |
US20180268121A1 (en) * | 2016-03-10 | 2018-09-20 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal |
CN108563934A (en) * | 2018-03-09 | 2018-09-21 | 青岛海信移动通信技术股份有限公司 | A kind of method and device of unlocked by fingerprint |
CN108710809A (en) * | 2018-03-21 | 2018-10-26 | 清华大学 | Method of controlling security, the apparatus and system of processor |
CN109409126A (en) * | 2018-10-22 | 2019-03-01 | 郑州云海信息技术有限公司 | The guard method of data and device in distributed file storage system |
US20190100166A1 (en) * | 2016-07-20 | 2019-04-04 | Tencent Technology (Shenzhen) Company Limited | Data processing method and device, and system |
CN110162952A (en) * | 2019-05-30 | 2019-08-23 | 努比亚技术有限公司 | Face unlocking method, device and readable storage medium storing program for executing based on the time difference |
CN110955873A (en) * | 2018-09-25 | 2020-04-03 | 华勤通讯技术有限公司 | Fingerprint unlocking method of mobile terminal and mobile terminal |
CN111310138A (en) * | 2020-01-17 | 2020-06-19 | 珠海格力电器股份有限公司 | Method and device for protecting equipment information security, storage medium and electronic equipment |
-
2022
- 2022-06-01 CN CN202210617264.6A patent/CN114969705B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10078743B1 (en) * | 2013-01-31 | 2018-09-18 | Narus, Inc. | Cross identification of users in cyber space and physical world |
CN105069343A (en) * | 2015-08-26 | 2015-11-18 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint verification method, fingerprint verification apparatus and terminal |
US20180268121A1 (en) * | 2016-03-10 | 2018-09-20 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal |
CN106020418A (en) * | 2016-05-16 | 2016-10-12 | 广东欧珀移动通信有限公司 | Method and apparatus for reducing power consumption of mobile terminal, and mobile terminal |
US20170344786A1 (en) * | 2016-05-27 | 2017-11-30 | Fu Tai Hua Industry (Shenzhen) Co., Ltd. | Electronic device with fingerprint identification function and fingerprint identification method |
US20190100166A1 (en) * | 2016-07-20 | 2019-04-04 | Tencent Technology (Shenzhen) Company Limited | Data processing method and device, and system |
WO2018145241A1 (en) * | 2017-02-07 | 2018-08-16 | 廖建强 | Method and device for electronic payment based on fingerprint information |
CN106951768A (en) * | 2017-05-10 | 2017-07-14 | 广东欧珀移动通信有限公司 | The ageing control method of unlocked by fingerprint, device, mobile terminal and storage medium |
CN107315938A (en) * | 2017-06-26 | 2017-11-03 | 上海斐讯数据通信技术有限公司 | A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device |
CN108563934A (en) * | 2018-03-09 | 2018-09-21 | 青岛海信移动通信技术股份有限公司 | A kind of method and device of unlocked by fingerprint |
CN108710809A (en) * | 2018-03-21 | 2018-10-26 | 清华大学 | Method of controlling security, the apparatus and system of processor |
CN110955873A (en) * | 2018-09-25 | 2020-04-03 | 华勤通讯技术有限公司 | Fingerprint unlocking method of mobile terminal and mobile terminal |
CN109409126A (en) * | 2018-10-22 | 2019-03-01 | 郑州云海信息技术有限公司 | The guard method of data and device in distributed file storage system |
CN110162952A (en) * | 2019-05-30 | 2019-08-23 | 努比亚技术有限公司 | Face unlocking method, device and readable storage medium storing program for executing based on the time difference |
CN111310138A (en) * | 2020-01-17 | 2020-06-19 | 珠海格力电器股份有限公司 | Method and device for protecting equipment information security, storage medium and electronic equipment |
Non-Patent Citations (1)
Title |
---|
杨霞;刘志伟;雷航;: "基于TrustZone的指纹识别安全技术研究与实现", 计算机科学, no. 07, 15 July 2016 (2016-07-15) * |
Also Published As
Publication number | Publication date |
---|---|
CN114969705B (en) | 2024-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102523213B (en) | Server and terminal authenticating method and server and terminal | |
US10187383B2 (en) | Method of pushing passwords, and pushing system | |
CN108683667B (en) | Account protection method, device, system and storage medium | |
EP1396824A3 (en) | Authentication method, system and apparatus of an electronic value | |
CN107437016B (en) | Application control method and related product | |
CN110399708A (en) | A kind of dual-identity authentication method, apparatus and electronic equipment | |
US20220150243A1 (en) | Authentication server, and non-transitory storage medium | |
CN104253818A (en) | Server and terminal authentication method, server, terminal | |
CN105830079A (en) | Authentication information management system, authentication information management device, program, recording medium, and authentication information management method | |
CN111862432A (en) | Entrance guard verification method, entrance guard device, server and system | |
WO2016062200A1 (en) | Fingerprint authentication method and apparatus, and server | |
CN108566371B (en) | Social authentication method, system and terminal equipment | |
JPWO2009075180A1 (en) | Authentication device, authentication system, authentication method and program | |
CN110619228B (en) | File decryption method, file encryption method, file management system and storage medium | |
EP3748980A1 (en) | Interactive method and apparatus based on user action information, and electronic device | |
CN114969705A (en) | Fingerprint unlocking method and device, electronic equipment and storage medium | |
CN114581091A (en) | Identity authentication method and device, computer equipment and storage medium | |
US20230108664A1 (en) | Method for verifying liveness, and server using the same | |
CN111581622A (en) | Information processing method and device and electronic equipment | |
CN110971609A (en) | Anti-cloning method of DRM client certificate, storage medium and electronic equipment | |
CN111104653A (en) | User operation processing method and device, electronic equipment and readable storage medium | |
CN105224885A (en) | A kind of data processing method and terminal | |
CN113254904B (en) | Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification | |
CN115103356A (en) | Computer security verification system, method, mobile terminal and readable storage medium | |
CN112580009A (en) | Method and device for authenticating user identity in big data system and related products |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |