WO2014042476A1 - File management method using fingerprint, user terminal and recording medium - Google Patents

File management method using fingerprint, user terminal and recording medium Download PDF

Info

Publication number
WO2014042476A1
WO2014042476A1 PCT/KR2013/008340 KR2013008340W WO2014042476A1 WO 2014042476 A1 WO2014042476 A1 WO 2014042476A1 KR 2013008340 W KR2013008340 W KR 2013008340W WO 2014042476 A1 WO2014042476 A1 WO 2014042476A1
Authority
WO
WIPO (PCT)
Prior art keywords
fingerprint
file
lock
method
user
Prior art date
Application number
PCT/KR2013/008340
Other languages
French (fr)
Korean (ko)
Inventor
박승용
서종철
주효민
조유숙
김재한
조성미
Original Assignee
크루셜텍 주식회사
크루셜소프트 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to KR1020120102450A priority Critical patent/KR20140035758A/en
Priority to KR10-2012-0102450 priority
Priority to KR10-2012-0102858 priority
Priority to KR1020120102858A priority patent/KR20140039346A/en
Priority to KR10-2012-0108946 priority
Priority to KR1020120108946A priority patent/KR101462227B1/en
Application filed by 크루셜텍 주식회사, 크루셜소프트 주식회사 filed Critical 크루셜텍 주식회사
Publication of WO2014042476A1 publication Critical patent/WO2014042476A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

According to one embodiment of the present invention, provided is a file management method using a fingerprint in a user terminal, comprising (a) a step of taking, as an input, the fingerprint of a user through the fingerprint sensor unit arranged in the user terminal; and (b) a step of setting locking for a specific file selected by the user upon completion of authentication on the input fingerprint.

Description

File Management Method Using Fingerprints, User Terminal and Recording Media

The present invention relates to a file management method using a fingerprint, a user terminal and a recording medium, and more particularly, to a method of managing a file using a fingerprint, a user terminal and a recording medium.

Recently, various mobile communication terminals have been provided with various additional functions that utilize personal information such as mobile banking as well as communication functions such as telephone or text message transmission services. Accordingly, the need for a locking device of the mobile communication terminal is more important.

Existing locks applied to mobile terminals are mostly using passwords. For example, a locking device is applied to a telephone function, an additional function, or an international telephone function, and in order to use the function, the user must enter a corresponding password to use the function.

However, this method was inconvenient in that the password becomes useless when the password is exposed, the password must be changed periodically to secure stability, and the user must remember the password from the user's point of view.

Therefore, in recent years, in order to supplement this method and improve the locking effect, a terminal equipped with a locking device through fingerprint recognition has been developed in earnest.

In order to mount such an electronic device in a mobile communication terminal that is manufactured in a small size, the size of the sensor must be minimized. According to this need, the sliding sensor recognizes a fingerprint as if a user scratches a finger on a bar-shaped sensor. The development of fingerprint sensors is underway.

On the other hand, as the fingerprint recognition sensor is mounted on the mobile communication terminal, efforts have been made to integrate with other functions.

An object of the present invention is to provide a method of managing a file using a fingerprint of a user, a user terminal and a recording medium using the same.

According to an embodiment of the present invention for achieving the above object, in a file management method using a fingerprint in a user terminal, (a) receiving a user's fingerprint through the fingerprint sensor unit provided in the user terminal and ( b) when the authentication of the input fingerprint is completed, providing a file management method using a fingerprint, including setting a lock on a specific file selected by the user.

In the step (b), when the specific file is a specific application, executing the specific application for a use time when authentication of the input fingerprint is completed, and executing the specific application when the use time elapses. It may include the step of stopping.

After stopping execution of the specific application, the method may further include requesting a fingerprint input for extension time and re-authentication to extend the use time of the specific application.

Before the step (a), the method may further include matching and storing the fingerprint with the specific application.

Prior to the step (a), the method may further include displaying a check box corresponding to the file displayed on the screen when the file lock request is made.

The step (b) may include setting a lock on the selected file by matching the input fingerprint with one or more files selected through the check box.

The method may further include displaying a lock state on the screen with respect to the file in which the lock is set.

Displaying the locked file on the screen, if a lock release target is selected by the user among the locked files displayed on the screen, receiving a fingerprint for unlocking the selected file and the input fingerprint If this is authenticated, the method may further include releasing the lock of the file in which the lock is set.

The unlocking of the locked file may include releasing the locking of the plurality of locked files if the target file for releasing the lock is plural.

The step (a) may include receiving a first fingerprint of the user through the fingerprint sensor unit while the touch is maintained on the specific file in the file list displayed on the screen, and the step (b) may include: The method may include setting a lock on the touched file by using the inputted first fingerprint.

And after setting the lock on the file, if the second fingerprint of the user input by the fingerprint sensor unit matches the first fingerprint, releasing the lock on the locked file.

The step (b) may include setting a lock when the pre-registered fingerprint and the first fingerprint match.

On the other hand, a recording medium for managing a file using a fingerprint of the present invention for solving the above problems can execute the method according to any one of the above steps.

On the other hand, according to another embodiment of the present invention, the fingerprint sensor unit for sensing the user's fingerprint and, if the authentication of the sensed fingerprint is completed, comprising a lock management unit for setting a lock on a specific file selected by the user A user terminal is provided.

The lock management unit, when the specific file is a specific application, when the authentication of the sensed fingerprint is completed, the application execution unit for executing the application for the use time and when the use time elapses, for the specific application It may include an application execution stop unit for stopping the execution.

It may include a fingerprint registration unit for matching and storing the fingerprint with the specific application.

The application execution stopper may request a fingerprint input for extension time and re-authentication to extend the use time of the specific application.

The apparatus may further include a check box display unit that displays a check box corresponding to a file displayed on the screen when the file lock request is made.

The lock manager may include a file lock manager that locks the selected file by matching the at least one file selected through the check box with the sensed fingerprint.

The file lock manager may display a lock state on the screen with respect to the file in which the lock is set.

When the lock release target is selected by the user among the files in which the lock is set, the fingerprint sensor unit may receive and sense a fingerprint for releasing the lock of the selected file.

When the sensed fingerprint is authenticated, the file lock manager may release the lock of the file in which the lock is set. If the target file for releasing the lock is plural, the file lock manager may release the lock of the plurality of files in which the lock is set.

The fingerprint sensor unit may sense the first fingerprint of the user while the touch is maintained on the specific file among the file list displayed on the screen, and may sense the second fingerprint of the user after setting a lock on the file. .

The lock manager may be configured to set a lock on the touched file with the sensed first fingerprint and the second fingerprint sensed by the fingerprint sensor unit when the lock corresponds to the first fingerprint. It may include a file unlocking unit for releasing the lock on the set file.

The file lock setting unit may set a lock when a pre-registered fingerprint matches the first fingerprint.

According to the present invention, it is possible to easily manage locking and unlocking of a file using a fingerprint.

In addition, the fingerprint of a specific person is very effective in terms of file access security.

In addition, the lock on the file can be easily set by simply recognizing the fingerprint while the touch is maintained on the specific file, and the lock can be easily released only by fingerprint recognition on the locked file.

In addition, by using the fingerprint of the parent to limit the use of certain applications, such as game applications or cartoon applications, it is possible to prevent the use of children indiscriminate applications.

The effects of the present invention are not limited to the above-described effects, but should be understood to include all the effects deduced from the configuration of the invention described in the detailed description or claims of the present invention.

1 is a view showing the structure of a user terminal according to an embodiment of the present invention.

FIG. 2 shows an example of a fragmentary fingerprint image obtained by the slide type fingerprint sensor shown in FIG. 1.

3 is a block diagram showing the basic configuration of a user terminal according to the present invention.

4 is a block diagram showing the configuration of a user terminal according to an embodiment of the present invention.

5 is a flowchart illustrating a method of limiting application usage using a fingerprint according to an embodiment of the present invention.

6 is a diagram illustrating an example of restricting the use of an application using a fingerprint according to an embodiment of the present invention.

7 is a block diagram showing the configuration of a user terminal according to another embodiment of the present invention.

8 is a flowchart illustrating a file usage restriction method using a fingerprint according to another embodiment of the present invention.

9 is a diagram illustrating an example of restricting the use of a file using a fingerprint according to another embodiment of the present invention.

10 is a block diagram showing a configuration of a user terminal according to another embodiment of the present invention.

11 illustrates a file lock setting according to another embodiment of the present invention.

12 illustrates a file lock setting according to another embodiment of the present invention.

DETAILED DESCRIPTION The following detailed description of the invention refers to the accompanying drawings that show, by way of illustration, specific embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It should be understood that the various embodiments of the present invention are different but need not be mutually exclusive. For example, certain shapes, structures, and characteristics described herein may be embodied in other embodiments without departing from the spirit and scope of the invention with respect to one embodiment. In addition, it is to be understood that the location or arrangement of individual components within each disclosed embodiment may be changed without departing from the spirit and scope of the invention. The following detailed description, therefore, is not to be taken in a limiting sense, and the scope of the present invention, if properly described, is defined only by the appended claims, along with the full range of equivalents to which such claims are entitled. Like reference numerals in the drawings refer to the same or similar functions throughout the several aspects.

DETAILED DESCRIPTION Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily implement the present invention.

1 is a view showing the structure of a user terminal according to an embodiment of the present invention.

Referring to FIG. 1, the user terminal 100 may include a fingerprint sensor unit 110 at least in part.

In the drawing, the fingerprint sensor unit 110 is illustrated as being formed at one side edge of the user terminal 100, but it is not outside the scope of the present invention even if formed in any position.

The user terminal 100 according to an exemplary embodiment may be a digital device that performs a desired operation by performing predetermined data processing.

The user terminal 100 may include an input unit and a display unit 101, and may provide a user with a state about an operation performed by a user's predetermined operation command through the input unit through the display unit 101.

In FIG. 1, although the display unit 101 of the user terminal 100 is implemented as a touch screen method and functions as an input unit at the same time, the input unit is implemented as a keyboard or keypad method, for example. It may be provided separately from.

The user terminal 100 according to an embodiment is a digital device having a computing capability by mounting a microprocessor and having a memory means such as a tablet PC, a smartphone, a personal computer, a workstation, a PDA, a web pad, a mobile phone, a navigation device, and the like. It should be understood as a term encompassing.

The fingerprint sensor unit 110 according to an embodiment may be implemented as a slide type or an area type. 1 and 2 illustrate the slide type fingerprint sensor as an example, but is not limited thereto. The slide type fingerprint sensor 110 reads fragmentary fingerprint images by sensing a fingerprint of a finger moving in a sliding manner, and then matches the fragmented fingerprint images into a single image to implement a fingerprint recognition in a manner that realizes an intact fingerprint image. Perform. On the other hand, in the case of an area-type fingerprint sensor, a single fingerprint image is sensed by sensing a fingerprint that is fixed on the sensor without collecting a fragment fingerprint image and matching the image into a single image. Performs fingerprint recognition.

FIG. 2 shows an example of a fragmentary fingerprint image obtained by the slide type fingerprint sensor shown in FIG. 1.

For example, when the user moves the thumb against the fingerprint sensor unit 110 in a sliding manner, partial partial images P1 to P4 are obtained continuously.

That is, the fingerprint images of the user are acquired sequentially in a fragmentary but continuous form. The fragment fingerprint images read from the fingerprint sensor 110 are matched to one fingerprint image.

According to an embodiment, the matched fingerprint image may be used as a means for verifying the validity of the corresponding user by comparing with the registered fingerprint image.

That is, the registered fingerprint image of the user may be stored in a database (not shown) of the user terminal 100, and the fingerprint image acquired through the fingerprint sensor 110 is compared with the fingerprint image stored in the database. User authentication can be performed.

According to another exemplary embodiment, the matched fingerprint image may be compared with one or more registered fingerprint images to function as a command for performing a specific operation.

For example, specific operations may be matched and stored with respect to the fingerprint of each finger of the user, and if the matched fingerprint image acquired by the fingerprint sensor 110 matches the fingerprint image of the specific finger, the specific matched with the fingerprint image may be matched. The operation can be done. This is referred to herein as a 'quick execution' function.

For example, the first application may be driven when the thumb fingerprint of the true user is recognized, and the user may preset the second application when the index finger fingerprint of the true user is recognized.

Thereafter, if the user moves the thumb to the fingerprint sensor unit 110 in a sliding manner, if the matched fingerprint image obtained by the fingerprint sensor unit 110 matches the fingerprint image of the pre-registered thumb, matching is performed. Operation, that is, driving operation of the first application, is performed.

3 is a block diagram showing the basic configuration of a user terminal according to the present invention.

Referring to FIG. 3, the user terminal 100 according to the present invention includes a fingerprint sensor unit 110 and a lock manager 120.

The fingerprint sensor unit 110 may sense the fingerprint from the user's finger, and a detailed description thereof will be omitted since it has been described above.

When the lock manager 120 completes the authentication of the input fingerprint, the lock manager 120 sets a lock on a specific file. Here, the specific file may include one or more of an image, a video, a sound source, and a document file. In addition, the specific file may also include a specific application displayed on the screen.

For example, if a specific file is a specific application, the lock manager 120 may execute the specific application for a use time when authentication of the input fingerprint is completed, and stop executing the specific application when the use time elapses. (See FIG. 4), one or more files selected through a check box prior to fingerprint entry may be matched with the input fingerprint to lock the selected file (see FIG. 7). As another example, when the fingerprint is input by the user while the touch is maintained on the specific file, the lock manager 120 may set a lock on the specific file touched by the input fingerprint (see FIG. 10). To this end, the lock management unit 120 may further include one or more components to lock a specific file according to the authentication of the input fingerprint, which will be described later with reference to FIGS. 4, 7 and 10. .

4 is a block diagram showing the configuration of a user terminal according to an embodiment of the present invention. In FIG. 4, an example of executing or stopping execution of a specific application when a specific file is a specific application will be described.

The user terminal 100 according to an exemplary embodiment of the present invention may include a fingerprint sensor unit 110, a fingerprint register unit 112, an input unit 115, an application execution unit 121, and an application execution stop unit 122. .

When describing each component, the fingerprint sensor 110 may sense a fingerprint input for use of a specific application in which a usage time is set, and a detailed description thereof will be omitted since it has been described above.

The fingerprint register 112 may match and store a fingerprint sensed by the fingerprint sensor 110 and a specific application.

For example, if a parent's fingerprint (for example, a father) is matched with a child's game application and stored with the time of use, the game application will only be authenticated using the father's fingerprint. The game starts, and the game runs only for the set usage time. However, the use time is extended only when re-authenticated through the father's fingerprint, and the suspended game application can be executed again only during the extended time.

For reference, one or more fingerprints may be registered for one specific application.

As an example of the game application, a father and a mother's fingerprints may be registered for one game application, in which case the father may use the child's game application using the mother's fingerprint when he or she is not with the child. Can be.

On the other hand, the input unit 115 may receive a use time for a specific application from the user, and as described above, the display unit 101 is implemented in a touch screen manner to simultaneously perform the role of the input unit 115 as itself. It may be.

In addition, the input unit 115 may be implemented separately from the display unit 101 by being implemented by, for example, a keyboard or a keypad.

Meanwhile, when the authentication of the fingerprint sensed by the fingerprint sensor unit 110 is completed, the application execution unit 121 may execute a specific application during the usage time input through the input unit 115.

In addition, the application execution unit 121 may execute the specific application again for the extended time, when the fingerprint for the extended time and the re-authentication is input to the specific application whose execution time has elapsed.

Meanwhile, when the usage time input through the input unit 115 elapses, the application execution stop unit 122 may stop execution of a specific application executed by the application execution unit 121.

Thereafter, the application execution stop unit 122 may display an interface for requesting fingerprint input for extension time and re-authentication to extend the use time of the specific application, and when a fingerprint for extension time and re-authentication is input, The application executing unit 121 may execute the specific application again for the input extension time.

Meanwhile, the application execution unit 121 and the application execution stop unit 122 may be components included in the lock management unit 120 shown in FIG. 3, but are not limited thereto and may replace the lock management unit 120.

5 is a flowchart illustrating a method of limiting application usage using a fingerprint according to an embodiment of the present invention.

For reference, the method of limiting application usage using the fingerprint illustrated in FIG. 5 may be performed by the user terminal 100, and the user terminal 100 may be read by a computer in which a program for executing the steps illustrated in FIG. 5 is recorded. A possible recording medium is provided so that the steps shown in FIG. 5 can be executed by the recording medium.

Hereinafter, a case in which a game application can be applied between a parent and a child will be described as an example, and the user terminal 100 may be a child's smartphone.

First, the user terminal 100 matches and stores a game application and a parental fingerprint inputted for use of the game application (S401).

For reference, the fingerprint of any one of the father and the mother may match the game application, and the fingerprints of both the father and the mother may each match the game application.

After S401, when the corresponding game application is selected by the child (that is, a command for executing the game application is input), the user terminal 100 displays an interface for requesting setting of the use time of the corresponding game application and fingerprint authentication on the screen. It may be (S402).

The game application is not yet running.

After S402, when the usage time of the game application and the fingerprint of the parent are input, the user terminal 100 authenticates the input fingerprint and executes the corresponding game application for the input usage time (S403).

After S403, when the set usage time has elapsed, the user terminal 100 stops the game application being executed and displays an interface on the screen in operation S404.

Here, the interface displayed on the screen may include an extension time setting area for extending the game, a fingerprint authentication request message for extending the game, and a game ending button for ending the game in the current state.

After S404, if the game time is further extended, the user terminal 100 may repeat the steps of S402 to S404.

6 is a diagram illustrating an example of restricting the use of an application using a fingerprint according to an embodiment of the present invention.

For reference, FIG. 6 is a state where a mother's fingerprint is matched and stored with respect to a game application installed in a child's smartphone. That is, the mother's fingerprint needs to be input in order for the game application to run on the child's smartphone.

As shown in (a) of FIG. 6, when the corresponding game application is selected by the child, the user terminal 100 sets the use time and the mother of the corresponding game application, as shown in FIG. 6 (b). The interface for requesting fingerprint authentication may be displayed on the screen.

Thereafter, the user terminal 100 executes the game application for the set use time, and when the set use time elapses, as shown in FIG. 6C, the execution of the game application is stopped, and the use time for extending the game. An interface including a setting area 510, a fingerprint authentication request message 520 for extending the game, and a game ending button 530 for ending the game in the current state may be displayed on the screen.

If the child wants to further extend the game time, the user terminal 100 can be extended by one more hours of the game time through the fingerprint authentication of the mother, the game end button is selected without further extending the game time In this case, the user terminal 100 may terminate the game application.

7 is a block diagram showing the configuration of a user terminal according to another embodiment of the present invention.

The user terminal 100 according to another exemplary embodiment of the present invention may include a check box display unit 105, a fingerprint sensor unit 110, and a file lock management unit 123.

For reference, the file of the present invention is not limited to file extensions such as image files, video files, compressed files, document files, and can include all files.

Referring to each component, on the other hand, when the lock on the file is requested, the check box display unit 105 may display a check box corresponding to the file displayed on the screen.

Here, the lock request for the file may be performed by selecting a specific menu or by selecting a specific key, or may be performed when the file to be locked is touched for a specific time.

When a plurality of files exist in one folder, the check box display unit 105 may display a check box for all files in the folder with a single lock request, and the user may select a desired lock target using the displayed check box. You can select more than one file.

Meanwhile, the fingerprint sensor 110 may sense a fingerprint inputted to set a lock on one or more files selected through the check box, and sense a fingerprint inputted to release a file in which the lock is set later. have.

The detailed description of the fingerprint sensing has been described above and thus will be omitted.

Meanwhile, the file lock manager 123 may set a lock on the selected file by matching the file selected through the check box with the fingerprint sensed by the fingerprint sensor 110 and may display a lock state of the file on which the lock is set. have.

In this case, when there are a plurality of files selected through the check box, the file lock management unit 123 may match the plurality of selected files with the sensed fingerprint and simultaneously perform lock setting for the plurality of files.

In addition, the file lock management unit 123 may release the lock of the file when the lock is requested to be unlocked, and in this case, when the lock of the plurality of files is requested, the plurality of files may be unlocked. You can unlock the file at the same time.

The file lock manager 123 may be a component included in the lock manager 120 illustrated in FIG. 3, but is not limited thereto.

8 is a flowchart illustrating a file usage restriction method using a fingerprint according to another embodiment of the present invention.

For reference, the method of limiting the use of a file using a fingerprint illustrated in FIG. 8 may be performed by the user terminal 100, and the user terminal 100 may read a computer in which a program for executing the steps illustrated in FIG. 8 is recorded. A possible recording medium is provided so that the steps shown in FIG. 8 can be executed by the recording medium.

First, when a file lock is requested, the user terminal 100 displays a check box corresponding to the file displayed on the screen (S801).

Here, the lock request for the file may be performed by selecting a specific menu or by selecting a specific hot key, or may be performed when a file to be locked is touched for a specific time.

After S801, when one or more files are selected as a lock target through a check box, the user terminal 100 receives a fingerprint for setting a lock on the selected one or more files (S802).

After S802, the user terminal 100 sets the lock on the file selected in S401 by matching the selected file with the input fingerprint, and displays the lock state on the screen for the file in which the lock is set (S803).

After S803, when a lock release target is selected from among the files in which the lock is set, the user terminal 100 receives a fingerprint for releasing the lock of the selected file and senses it (S804).

After S804, when authentication of the sensed fingerprint is completed, the user terminal 100 releases the lock of the locked file (S805).

In this case, when there are a plurality of target files to release the lock, the user terminal 100 may release the lock of the plurality of files in which the lock is set.

9 is a diagram illustrating an example of restricting the use of a file using a fingerprint according to another embodiment of the present invention.

For reference, FIG. 9 illustrates a case where a plurality of image files exist in one folder.

When the lock on the file is requested, the user terminal 100 displays a check box for each image file existing in the folder, as shown in FIG.

For reference, the lock request for the file may be performed by selecting a specific menu or by selecting a specific hot key, and may be performed when the file to be locked is touched for a specific time.

In the case of FIG. 9, any one of a plurality of images existing in one folder is touched for a specific time.

Subsequently, as shown in FIG. 9B, when a plurality of files (A, E, G, H images) to be locked are selected through a check box and a fingerprint is input, the user terminal 100 is inputted. Match the fingerprint with a plurality of selected files to lock the files.

Thereafter, as illustrated in FIG. 9C, the user terminal 100 may display a locked state of a plurality of files (A, E, G, and H images) in which the lock is set.

Although not shown in FIG. 9, when a file displaying a locked state is selected and a fingerprint is input, the user terminal 100 may unlock the file.

10 is a block diagram showing a configuration of a user terminal according to another embodiment of the present invention.

The user terminal 100 according to another exemplary embodiment of the present invention may include a fingerprint sensor unit 110, a file lock setting unit 124, and a file lock release unit 125.

The fingerprint sensor 110 may recognize a fingerprint input by a user, and a detailed description thereof will be omitted since it has been described above.

The fingerprint sensor 110 may recognize a fingerprint input by the user while the user's touch is maintained on a specific file among a file list displayed on the display unit 101 (hereinafter, referred to as a 'screen') of the user terminal 100. Can be.

Here, the specific file may include one or more of an image, a video, a sound source, and a document file. In addition, the specific file may also include a specific application displayed on the screen.

Specifically, the display unit 101 according to an embodiment of the present invention may be a touch screen-based screen, while the user touches and selects a specific file and maintains a touch within a specified range of the selected specific file. The unit 110 may recognize a fingerprint input by a user.

At this time, if the fingerprint is not recognized, it may be terminated without proceeding to the next procedure, or the fingerprint may be input again from the user.

For reference, a touch on a specific file may use one finger to lock the file, and the input fingerprint may use another finger. Of course, it may be possible to touch and fingerprint input a specific file with one hand.

The file lock setting unit 124 may set a lock on the file touched as the lock target.

In this case, the file lock setting unit 124 may set the lock on the touched file after the file lock menu is selected from the work menu, or set the lock on the touched file immediately without selecting the menu.

That is, while the user touches a specific file on the screen of the user terminal 100, if the fingerprint is recognized by the fingerprint sensor unit 110 by inputting a fingerprint, the file lock setting unit 124 uses the recognized fingerprint. It is possible to set a lock on a file touched by. Here, the meaning of the state of touching a specific file is as described above.

At this time, the file lock setting unit 124 may set a lock on the file when the registered fingerprint and the fingerprint recognized by the fingerprint sensor 110 match with the registered fingerprint.

Therefore, according to an embodiment of the present invention, a lock on a file may be set by a user who has registered a fingerprint, and the file may be stored every time the fingerprint is recognized by the fingerprint sensor unit 110 even when the fingerprint is not registered. Locked with the recognized fingerprint may allow multiple users to individually lock each file.

Meanwhile, the file unlocking unit 125 may release the lock on the locked file if the fingerprint recognized by the fingerprint sensor 110 matches the fingerprint used in setting the lock after setting the lock on the file. .

Here, the locked file may be displayed on the screen of the user terminal 100 and may be touched after the file unlocking menu is selected among the work menus or may be directly touched without selecting a menu. In this case, the fingerprint sensor 110 may recognize a fingerprint input by the user while the locked file is being touched, or may recognize a fingerprint input by the user after the locked file is touched.

Meanwhile, the file lock setting unit 124 and the file unlocking unit 125 may be components included in the lock management unit 120 shown in FIG. 3, but are not limited thereto and may replace the lock management unit 120. It may be.

11 illustrates a file lock setting according to another embodiment of the present invention. Here, FIG. 11 relates to a lock setting for an image file stored in a digital camera.

First, FIG. 11A illustrates a screen of the user terminal 100 in which a file list is displayed. Here, the file list may be displayed in the form of a thumbnail of each file.

Thereafter, as shown in FIG. 11B, the user may touch a specific file I in the file list.

Then, as shown in (c) of FIG. 11, when the user's fingerprint is input to the fingerprint sensor unit 110 while the user touches a specific file (I), the user's fingerprint shown in FIG. As described above, the lock is set on the specific file I touched by the user and an image indicating that the lock is set may be separately displayed so that the contents of the file I may not be viewed.

Thereafter, when the user touches a locked file in the file list and inputs a fingerprint in the fingerprint sensor unit 110, the lock on the file touched by the user is released and the contents of the invisible file are locked as before. Can be seen.

12 illustrates a file lock setting according to another embodiment of the present invention.

Here, FIG. 12 relates to a lock setting for a specific application displayed on the screen of the smartphone.

Referring to FIG. 12, a user touches a specific application displayed on the screen of the user terminal 100 using one finger and inputs a fingerprint to the fingerprint sensor unit 110 using another finger.

Here, when a fingerprint is input by the user, the fingerprint sensor unit 110 recognizes the input fingerprint, and the file lock setting unit 124 is a specific application that the user touches with the fingerprint recognized by the fingerprint sensor unit 110. You can set a lock on.

12 illustrates a case in which a specific application is touched by using one finger, but the present invention is not limited thereto, and the present invention is also applicable in the case of touching by using two or more fingers. For example, the user touches the first application and the second application displayed on the screen of the user terminal 100 using the thumb and the index finger of the left hand, respectively, and the fingerprint sensor unit 110 using any finger of the right hand. When the fingerprint is input to the fingerprint sensor 110, the fingerprint sensor 110 recognizes the input fingerprint, and the file lock setting unit 124 is the first application that the user touches with the fingerprint recognized by the fingerprint sensor 110. It is possible to set a lock on the second application.

Thereafter, when the user touches the locked first application and the second application and inputs the fingerprint to the fingerprint sensor 110, the lock on the first application and the second application touched by the user may be released.

Embodiments according to the present invention described above may be implemented in the form of program instructions that may be executed by various computer components, and may be recorded in a computer-readable recording medium. The computer-readable recording medium may include program instructions, data files, data structures, etc. alone or in combination. Program instructions recorded on the computer-readable recording medium may be those specially designed and configured for the present invention, or may be known and available to those skilled in the computer software arts. Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tape, optical recording media such as CD-ROMs, DVDs, and magneto-optical media such as floptical disks. media), and hardware devices specifically configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like. Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like. The hardware device may be configured to operate as one or more software modules to perform the process according to the invention, and vice versa.

The foregoing description of the present invention is intended for illustration, and it will be understood by those skilled in the art that the present invention may be easily modified in other specific forms without changing the technical spirit or essential features of the present invention. will be. Therefore, it should be understood that the embodiments described above are exemplary in all respects and not restrictive. For example, each component described as a single type may be implemented in a distributed manner, and similarly, components described as distributed may be implemented in a combined form.

The scope of the present invention is represented by the following claims, and it should be construed that all changes or modifications derived from the meaning and scope of the claims and their equivalents are included in the scope of the present invention.

Claims (25)

  1. In the file management method using a fingerprint in the user terminal,
    (a) receiving a user's fingerprint through a fingerprint sensor provided in the user terminal;
    (b) when the authentication of the input fingerprint is completed, setting a lock on a specific file selected by the user.
  2. According to claim 1, wherein step (b),
    If the specific file is a specific application, executing the specific application for a use time when authentication of the input fingerprint is completed; and
    If the use time elapses, stopping execution of the specific application.
  3. The method of claim 2,
    After stopping execution for the specific application, requesting a fingerprint input for extension time and re-authentication to extend the usage time of the specific application.
  4. The method of claim 2,
    Before step (a) above,
    Matching and storing the fingerprint with the specific application, File management method using a fingerprint.
  5. The method of claim 1, wherein before step (a),
    If the file lock request, further comprising the step of displaying a check box corresponding to the file displayed on the screen, File management method using a fingerprint.
  6. The method of claim 5,
    In step (b),
    And setting a lock on the selected file by matching the input fingerprint with one or more files selected through the check box.
  7. The method of claim 6,
    And displaying a lock state on the screen with respect to the locked file.
  8. The method of claim 6,
    Displaying the locked file on the screen
    Receiving a fingerprint for releasing the lock of the selected file if an object to be unlocked is selected by the user among locks on the screen;
    And if the input fingerprint is authenticated, unlocking the locked file.
  9. The method of claim 8, wherein the unlocking of the locked file comprises:
    If the plurality of target files for releasing the lock are released, releasing the locking of the plurality of locked files.
  10. The method of claim 1,
    The step (a) may include receiving a first fingerprint of the user through the fingerprint sensor while the touch is maintained on the specific file in the file list displayed on the screen.
    The step (b) includes the step of setting a lock on the touched file using the inputted first fingerprint, file management method using a fingerprint.
  11. The method of claim 10,
    After setting the lock on the file, if the second fingerprint of the user input by the fingerprint sensor unit coincides with the first fingerprint, releasing the lock on the locked file. How to manage your files.
  12. The method of claim 10, wherein step (b) comprises:
    And setting a lock when a pre-registered fingerprint and the first fingerprint coincide with each other.
  13. A computer-readable recording medium having recorded thereon a program for executing the method according to any one of claims 1 to 12.
  14. Fingerprint sensor unit for sensing the fingerprint of the user and
    And a lock manager to set a lock on a specific file selected by the user when authentication of the sensed fingerprint is completed.
  15. The method of claim 14,
    The lock management unit,
    When the specific file is a specific application, when the authentication of the sensed fingerprint is completed, the application execution unit for executing the specific application for the use time and
    And an application execution stop unit for stopping execution of the specific application when the usage time elapses.
  16. The method of claim 15,
    And a fingerprint registration unit for matching and storing the specific application and the fingerprint.
  17. The method of claim 15,
    The application execution stop unit requests a fingerprint input for extension time and re-authentication to extend the use time of the specific application.
  18. The method of claim 14,
    And a check box display unit which displays a check box corresponding to a file displayed on a screen when a file lock request is made.
  19. The method of claim 18, wherein the lock management unit,
    And a file lock manager configured to lock the selected file by matching the sensed fingerprint with one or more files selected through the check box.
  20. The method of claim 19,
    The file lock management unit displays a lock state on the screen with respect to the file in which the lock is set.
  21. The method of claim 19,
    The fingerprint sensor unit receives and senses a fingerprint for releasing the lock of the selected file when the lock release target is selected by the user.
  22. The method of claim 21,
    When the sensed fingerprint is authenticated, the file lock management unit releases the lock of the file in which the lock is set, and releases the lock of the plurality of files in which the lock is set when there are a plurality of target files for releasing the lock. .
  23. The method of claim 14,
    The fingerprint sensor unit senses the first fingerprint of the user while the touch is maintained on the specific file among the file list displayed on the screen, and after setting the lock on the file, the user that senses the second fingerprint of the user. terminal.
  24. The method of claim 23,
    The lock management unit,
    A file lock setting unit configured to set a lock on the touched file with the sensed first fingerprint;
    And a file unlocking unit for releasing the lock on the locked file when the second fingerprint sensed by the fingerprint sensor unit matches the first fingerprint.
  25. The method of claim 23,
    The file lock setting unit sets a lock when a pre-registered fingerprint matches the first fingerprint.
PCT/KR2013/008340 2012-09-14 2013-09-16 File management method using fingerprint, user terminal and recording medium WO2014042476A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
KR1020120102450A KR20140035758A (en) 2012-09-14 2012-09-14 Application using restriction method, user device and computer-readable storage using fingerprint
KR10-2012-0102450 2012-09-14
KR10-2012-0102858 2012-09-17
KR1020120102858A KR20140039346A (en) 2012-09-17 2012-09-17 File using restriction method, user device and computer-readable storage using fingerprint
KR1020120108946A KR101462227B1 (en) 2012-09-28 2012-09-28 File management method, device and computer-readable storage using fingerprint
KR10-2012-0108946 2012-09-28

Publications (1)

Publication Number Publication Date
WO2014042476A1 true WO2014042476A1 (en) 2014-03-20

Family

ID=50278484

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2013/008340 WO2014042476A1 (en) 2012-09-14 2013-09-16 File management method using fingerprint, user terminal and recording medium

Country Status (1)

Country Link
WO (1) WO2014042476A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
CN104408387A (en) * 2014-12-10 2015-03-11 成都思邦力克科技有限公司 Anti-filching tablet personal computer
CN104917881A (en) * 2015-04-29 2015-09-16 努比亚技术有限公司 Multi-mode mobile terminal and implementation method thereof
WO2016039529A1 (en) * 2014-09-11 2016-03-17 삼성전자 주식회사 Method for controlling lock status of application and electronic device supporting same
CN105426087A (en) * 2015-12-30 2016-03-23 上海摩软通讯技术有限公司 Mobile terminal and slide instruction generation method thereof

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060094436A (en) * 2005-02-24 2006-08-29 삼성전자주식회사 Method for qualifying access of user application in portable terminal
US20110291798A1 (en) * 2010-05-28 2011-12-01 Suridx, Inc. Wireless Encrypted Control of Physical Access Systems
KR20120019637A (en) * 2010-08-26 2012-03-07 동명대학교산학협력단 Application program locking and unlocking apparatus and method in smart phone

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20060094436A (en) * 2005-02-24 2006-08-29 삼성전자주식회사 Method for qualifying access of user application in portable terminal
US20110291798A1 (en) * 2010-05-28 2011-12-01 Suridx, Inc. Wireless Encrypted Control of Physical Access Systems
KR20120019637A (en) * 2010-08-26 2012-03-07 동명대학교산학협력단 Application program locking and unlocking apparatus and method in smart phone

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
A.POCOVNICU: 'Biometric Security for Cell Phones' THE PROC. OF INFORMATICA ECONOMICA vol. 13, no. 1, 2009, pages 57 - 63 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
WO2016039529A1 (en) * 2014-09-11 2016-03-17 삼성전자 주식회사 Method for controlling lock status of application and electronic device supporting same
CN104408387A (en) * 2014-12-10 2015-03-11 成都思邦力克科技有限公司 Anti-filching tablet personal computer
CN104917881A (en) * 2015-04-29 2015-09-16 努比亚技术有限公司 Multi-mode mobile terminal and implementation method thereof
CN105426087A (en) * 2015-12-30 2016-03-23 上海摩软通讯技术有限公司 Mobile terminal and slide instruction generation method thereof
CN105426087B (en) * 2015-12-30 2019-04-12 上海摩软通讯技术有限公司 Mobile terminal and its slip instruction generation method

Similar Documents

Publication Publication Date Title
EP2306364A1 (en) Method, device and computer program product for switching the locked state of an electronic device
EP2713298A1 (en) Display apparatus and method for operating the same
TWI533230B (en) User identification with biokinematic input
WO2011068374A2 (en) Method and apparatus for providing user interface of portable device
WO2012018212A2 (en) Touch-sensitive device and touch-based folder control method thereof
EP2422256B1 (en) Finger recognition for authentication and graphical user interface input
WO2013125910A1 (en) Method and system for authenticating user of a mobile device via hybrid biometics information
US8149089B2 (en) Method for unlocking a locked computing device and computing device thereof
WO2010137859A2 (en) Apparatus and method for unlocking a locking mode of portable terminal
WO2010140849A2 (en) Method for providing uis by user and device applied therewith
WO2015083895A1 (en) Smart watch and control method thereof
WO2013100699A1 (en) Method, apparatus, and computer-readable recording medium for authenticating a user
WO2013032187A1 (en) Mobile terminal for performing screen unlock based on motion and method thereof
CN103886237A (en) Control method and system for electronic device with fingerprint sensor and touch screen
WO2011004960A2 (en) Multi-touch-type character input method
CN103257826A (en) Method and system for mobile terminal to achieve navigation key function based on fingerprint identification
WO2013176515A1 (en) Multiple display method with multiple communication terminals, machine-readable storage medium and communication terminal
WO2013115558A1 (en) Method of operating multi-touch panel and terminal supporting the same
CN103440445A (en) Electronic equipment unlocking control method and system
WO2014073886A1 (en) Electronic device and method for controlling payment function of input means
WO2014081076A1 (en) Head mount display and method for controlling the same
WO2014112804A1 (en) Mobile device and method for displaying information
WO2013067935A1 (en) Method and system for authenticating user's identity and equipment used therein
WO2017067293A1 (en) Method and device for fingerprint unlocking and terminal
WO2014088350A1 (en) Display device and method of controlling the same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13837935

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct app. not ent. europ. phase

Ref document number: 13837935

Country of ref document: EP

Kind code of ref document: A1