KR20150034074A - Setting security method, electronic apparatus and computer-readable storage using fingerprint authentication and other security setting method - Google Patents
Setting security method, electronic apparatus and computer-readable storage using fingerprint authentication and other security setting method Download PDFInfo
- Publication number
- KR20150034074A KR20150034074A KR20140046991A KR20140046991A KR20150034074A KR 20150034074 A KR20150034074 A KR 20150034074A KR 20140046991 A KR20140046991 A KR 20140046991A KR 20140046991 A KR20140046991 A KR 20140046991A KR 20150034074 A KR20150034074 A KR 20150034074A
- Authority
- KR
- South Korea
- Prior art keywords
- fingerprint
- user
- electronic device
- security
- registered
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
Abstract
A method of setting security of an electronic device using patterns and fingerprints according to the present invention is a method of setting security of electronic devices using patterns and fingerprints, Receiving a user fingerprint through the fingerprint sensor from the user; Determining whether the input specific pattern and the fingerprint coincide with the specific pattern and the fingerprint registered in advance; And releasing the lock of the electronic device when the input specific pattern and the fingerprint match the previously registered specific pattern and the fingerprint.
Description
The present invention relates to a security setting method using fingerprints, an electronic device and a recording medium, and more particularly, to a method of enhancing security in an electronic device by using a touch drag, a password input or a motion input method and fingerprint recognition .
2. Description of the Related Art In recent years, various additional functions utilizing personal information such as mobile banking have been provided as well as communication functions such as telephone or text message transmission service through a mobile communication terminal. Accordingly, the need for a locking device of a mobile communication terminal is becoming more important.
Recently, in order to improve the locking effect, a terminal equipped with a lock device through fingerprint recognition is being developed in earnest.
In order to mount such an electronic device in a small-sized mobile communication terminal, the size of the sensor must be minimized. If necessary, a sliding sensor, which detects fingerprints on a bar- Method 'fingerprint sensor or an' area type 'fingerprint sensor capable of recognizing a fingerprint even with a small sensing area is actively being developed.
However, such a fingerprint sensor is also not completely free from security problems. For example, in the case of a capacitive type fingerprint sensor, a fingerprint is picked up from the surface of a fingerprint sensor using a transparent sheet, and then the fingerprint is copied to a conductive material to form a false finger. It is possible to unlock the electronic device having the security setting (Lock).
Accordingly, a method for enhancing the security of a user who uses an electronic device more effectively and conveniently by combining security setting functions through fingerprint recognition as well as other types of security setting functions (e.g., pattern recognition, password, etc.) need.
SUMMARY OF THE INVENTION The present invention has been made to solve the above-mentioned problems, and it is an object of the present invention to provide a fingerprint authentication method and a fingerprint authentication method in which a user sets security in an electronic device by combining a fingerprint and other security setting functions (pattern recognition, The security of the user can be easily released, thereby providing a method that increases the security of the user but does not inconvenience and inconvenience the user.
To achieve the above object, An embodiment of the present invention relates to a method of setting security in an electronic device using patterns and fingerprint recognition, and a method of setting security of an electronic device using patterns and fingerprints, Receiving a user fingerprint through the fingerprint sensor from the user within a set time; Determining whether the input specific pattern and the fingerprint coincide with the specific pattern and the fingerprint registered in advance; And releasing the lock of the electronic device when the input specific pattern and the fingerprint match the previously registered specific pattern and the fingerprint.
To achieve the above object, A method of setting security of an electronic device using a PIN number and a fingerprint according to another embodiment of the present invention includes: transmitting at least one PIN number and at least one fingerprint as a security password among a predetermined number of security passwords by a user Registering based on a set order; Receiving the PIN number and the fingerprint from the user according to the order in the set time; Determining whether the input PIN number and the input fingerprint match the registered PIN number, the registered fingerprint, and the order; And releasing the lock of the electronic device when the result of the determination is in agreement with the registered PIN number, the registered fingerprint, and the order.
To achieve the above object, A method of setting security of an electronic device using a motion and a fingerprint according to another embodiment of the present invention includes: receiving a specific motion through a motion sensor from a user; ; Determining whether the input specific motion and the fingerprint coincide with pre-registered motion and pre-registered fingerprints, respectively; And releasing the lock of the electronic device when the input specific motion matches the fingerprint.
According to an embodiment of the present invention, in addition to a security setting function including a pattern, a PIN number, and a motion, a fingerprint authentication method can be used to set security in an electronic device. Therefore, There is an effect that the security can be easily released and the electronic device can be used.
1 to 7 are views for explaining an electronic apparatus according to an embodiment of the present invention.
1 is a diagram showing the overall configuration of an electronic apparatus according to an embodiment of the present invention.
Fig. 2 shows an example of a fragmentary fingerprint image obtained by the
3 is a block diagram for explaining a configuration of an electronic device according to an embodiment of the present invention.
4 is an exemplary diagram for explaining a security setting method according to an embodiment of the present invention.
5 is an exemplary diagram for explaining a security setting method according to another embodiment of the present invention.
6 is a diagram for explaining a configuration of an electronic apparatus according to another embodiment of the present invention.
7 is a diagram for explaining a configuration of an electronic apparatus according to another embodiment of the present invention.
8 is a diagram for explaining a combination of the PIN number and the fingerprint input shown in FIG.
9 is a diagram for explaining a configuration of an electronic device according to another embodiment of the present invention.
The following detailed description of the invention refers to the accompanying drawings, which illustrate, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different, but need not be mutually exclusive. For example, certain features, structures, and characteristics described herein may be implemented in other embodiments without departing from the spirit and scope of the invention in connection with an embodiment. It is also to be understood that the position or arrangement of the individual components within each disclosed embodiment may be varied without departing from the spirit and scope of the invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is to be limited only by the appended claims, along with the full scope of equivalents to which such claims are entitled, if properly explained. In the drawings, like reference numerals refer to the same or similar functions throughout the several views.
Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings, so that those skilled in the art can easily carry out the present invention.
1 is a diagram showing the overall configuration of an electronic apparatus according to an embodiment of the present invention.
Referring to FIG. 1, the
The
1, the
The
The
2 shows an example of a fragmentary fingerprint image obtained by the slide type
For example, according to one embodiment, when the user moves his / her thumb against the
That is, the fingerprint image of the user is obtained sequentially in a sequential manner although they are fragmentary. The short fingerprint images read from the
According to another embodiment, if the user touches the finger to the
According to an embodiment of the present invention, the registered fingerprint image can be used as a means for verifying the legitimacy of the user by comparing the registered fingerprint image with the previously registered fingerprint image. That is, a registered fingerprint image of the user may be stored in a database (not shown) of the
According to another embodiment of the present invention, the registered fingerprint image may be compared with one or more previously registered fingerprint images to function as a command for performing a specific operation.
For example, specific operations may be matched and stored for the fingerprint of each finger of the user, and if the registered fingerprint image obtained by the
3 is a block diagram for explaining a configuration of an electronic device according to an embodiment of the present invention. 4 is a view for explaining a security setting method according to an embodiment of the present invention, and FIG. 5 is an exemplary view for explaining a security setting method according to another embodiment of the present invention.
3 to 5, an
The
On the other hand, the
The
The
More specifically, the
In the above description, it has been described that the matching of the fingerprint images is performed by the
6 is a view for explaining a configuration of an electronic apparatus according to another embodiment of the present invention.
In the electronic device according to another embodiment of the present invention, the
7 is a diagram for explaining a configuration of an electronic apparatus according to another embodiment of the present invention. 8 is a diagram for explaining a combination of the PIN number and fingerprint input shown in FIG.
3 and 7, the
In one embodiment, as shown in FIG. 8, after two PIN numbers are input, the remaining fingerprint authentication may be performed twice. The PIN number, the PIN number, the order of the fingerprint, or the order of the fingerprint, the PIN number, the fingerprint, the fingerprint, and the PIN number in other embodiments.
The fingerprint sensor unit 210 senses fingerprints of a finger moving in a sliding manner or an irregular manner, reads fragmentary fingerprint images, and then integrates the fingerprint images into a single image to implement a complete fingerprint image. And performs recognition. Then, the fingerprint sensor unit 210 transmits information on the complete fingerprint image to the
The
More specifically, when the PIN number and the fingerprint are sequentially input from the user through the
In the above description, it has been described that the fingerprint sensor unit 210 matches the pieces of fingerprint images. However, the matching of fingerprint images is not limited to the fingerprint sensor unit 210, and the security controller 103 ). ≪ / RTI >
9 is a diagram for explaining a configuration of an electronic device according to another embodiment of the present invention.
3 and 9, the motion sensor located near the display unit 301 or the display unit receives a specific motion input from the user at a distance from the display unit 301 by a certain distance. The user screen for receiving a specific motion from the user may be a preset initial screen. When the user sequentially inputs a motion through the node in time and space, the user receives a specific motion corresponding to the motion and inputs the motion to the
On the other hand, after the user completes the motion input, the display unit 301 may display the guidance display G as shown in FIG. 4 or 6 to induce the fingerprint recognition process by the
The
The
7, the
In the above description, it has been described that the
It will be understood by those skilled in the art that the foregoing description of the present invention is for illustrative purposes only and that those of ordinary skill in the art can readily understand that various changes and modifications may be made without departing from the spirit or essential characteristics of the present invention. will be. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
Furthermore, the foregoing description of the invention may be embodied in a recording medium readable by a computer or similar device using, for example, software, hardware, or a combination thereof, as described in the various embodiments described herein.
According to a hardware implementation, the embodiments described herein may be implemented as application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing devices (DSPDs), programmable logic devices (PLDs), field programmable gate arrays May be implemented using at least one of processors, controllers, micro-controllers, microprocessors, and electrical units for performing functions. In some cases, May be implemented by a control unit (not shown).
According to a software implementation, embodiments such as procedures or functions may be implemented with separate software modules that perform at least one function or operation. The software code may be implemented by a software application written in a suitable programming language. Further, the software code is stored in the memory unit and can be executed by the control unit.
The scope of the present invention is defined by the appended claims, and all changes or modifications derived from the meaning and scope of the claims and their equivalents should be construed as being included within the scope of the present invention.
100, 200, 300: Electronic device
110, 210, and 310:
Claims (3)
Receiving a user fingerprint through the fingerprint sensor from the user within a predetermined time after receiving a specific pattern from the user;
Determining whether the input specific pattern and the fingerprint coincide with the specific pattern and the fingerprint registered in advance; And
And releasing the lock of the electronic device when the input specific pattern and the fingerprint coincide with the previously registered specific pattern and the fingerprint.
A method for securing an electronic device using patterns and fingerprints.
Registering at least one PIN number and at least one fingerprint as a security password among a predetermined number of security passwords based on an order set by a user;
Receiving the PIN number and the fingerprint from the user according to the order in the set time;
Determining whether the input PIN number and the input fingerprint match the registered PIN number, the registered fingerprint, and the order; And
And releasing the lock of the electronic device when the determined PIN number matches the registered fingerprint and the sequence.
A method for setting security of an electronic device using a PIN number and a fingerprint.
Receiving a user fingerprint through the fingerprint sensor from the user within a predetermined time after receiving a specific motion from the user through the motion sensor;
Determining whether the input specific motion and the fingerprint coincide with previously registered motions and previously registered fingerprints, respectively; And
And releasing the lock of the electronic device when the input specific motion matches the fingerprint.
A method for setting security of an electronic device using motion and fingerprint.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020130113524 | 2013-09-24 | ||
KR20130113524 | 2013-09-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20150034074A true KR20150034074A (en) | 2015-04-02 |
Family
ID=53031111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR20140046991A KR20150034074A (en) | 2013-09-24 | 2014-04-18 | Setting security method, electronic apparatus and computer-readable storage using fingerprint authentication and other security setting method |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20150034074A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10387739B2 (en) | 2015-10-21 | 2019-08-20 | Samsung Electronics Co., Ltd. | Method and device for complex authentication |
-
2014
- 2014-04-18 KR KR20140046991A patent/KR20150034074A/en not_active Application Discontinuation
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10387739B2 (en) | 2015-10-21 | 2019-08-20 | Samsung Electronics Co., Ltd. | Method and device for complex authentication |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR102180226B1 (en) | Electronic device and method for securing using complex biometrics | |
US9430084B2 (en) | Apparatus and method for executing functions related to handwritten user input on lock screen | |
CN104778397B (en) | Information processor and its method | |
US8543833B2 (en) | User identification with biokinematic input | |
CN101809581B (en) | Embedded authentication systems in an electronic device | |
KR20170025802A (en) | Method and apparatus for authentication based on fingerprint recognition | |
Sahami Shirazi et al. | Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks | |
Rogowski et al. | User authentication for mobile devices | |
CN108431821B (en) | User interface for mobile device | |
JP4734088B2 (en) | User authentication apparatus and control method thereof | |
US20200201977A1 (en) | Method for authenticating a first user and corresponding first device and system | |
JP2014006706A (en) | Electronic apparatus and program | |
Kamaishi et al. | Biometric authentication by handwriting using leap motion | |
ES2835317T3 (en) | Method and system for authenticating identity using a variable numeric keypad | |
Shuwandy et al. | BAWS3TS: Browsing authentication web-based smartphone using 3D touchscreen sensor | |
KR102014408B1 (en) | Method and computer program for user authentication using image touch password | |
KR20140042316A (en) | User device, method of using hidden page of the same and computer-readable recording medium | |
KR20150034074A (en) | Setting security method, electronic apparatus and computer-readable storage using fingerprint authentication and other security setting method | |
KR20130117371A (en) | Method to unlock screen and perform secret task by finger tapping for touch screen devices | |
JP6852508B2 (en) | Mobile terminal devices, their authentication methods, and programs | |
KR20140036582A (en) | Log-in method, user device and computer-readable storage using fingerprint | |
KR20150029251A (en) | Method for securing object of electronic device and the electronic device therefor | |
CN109583168A (en) | Solve lock control method and electronic device | |
US10691833B2 (en) | Method and an apparatus for activating a predetermined function | |
Ponnusamy | Mobile Authentication using Hybrid Modalities (MAHM) in Pervasive Computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |