WO2017016115A1 - Procédé et dispositif de contrôle d'accès - Google Patents

Procédé et dispositif de contrôle d'accès Download PDF

Info

Publication number
WO2017016115A1
WO2017016115A1 PCT/CN2015/095785 CN2015095785W WO2017016115A1 WO 2017016115 A1 WO2017016115 A1 WO 2017016115A1 CN 2015095785 W CN2015095785 W CN 2015095785W WO 2017016115 A1 WO2017016115 A1 WO 2017016115A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
fingerprint
resource
space
user
Prior art date
Application number
PCT/CN2015/095785
Other languages
English (en)
Chinese (zh)
Inventor
刘东海
许奕波
张碧君
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017016115A1 publication Critical patent/WO2017016115A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to the field of information processing technologies, and more particularly to an access control method and apparatus.
  • the number of applications installed in the terminal is increasing, and a large amount of user data is generated in the process of using the application by the user.
  • some may involve the user's relatively private data, and the user does not want others to obtain the private data when using the terminal.
  • different access rights of different users to the accessible resources in the terminal may be set on the terminal, for example, different applications or storage spaces accessible by different users.
  • the terminal sets different access rights for different users, if the user needs to use a specific resource within the access right of the terminal, the user may need to input the account and password first, and then find the corresponding application icon after the terminal passes the verification. By clicking on complex operations such as icons, it is possible to access specific resources, resulting in a complicated and cumbersome user access process.
  • the present application provides an access control method and apparatus to improve the convenience of a user accessing resources in a terminal.
  • an access control method including:
  • the target resource space Determining, from the at least one resource space in which the target user has access rights, a target resource space corresponding to the target fingerprint, and triggering access to the target resource by the target fingerprint in the target resource space, where the resource The space is composed of a part or all of the resources of the accessible resource in the terminal, and the target resource is a part or all of the resources in the target resource space;
  • the target resource space corresponding to the target fingerprint is determined from the at least one resource space in which the target user has access rights, and the target resource is triggered by the target fingerprint in the target resource space.
  • the target resource Determining, from the at least one resource space in which the target user has access rights, a target resource space corresponding to the target fingerprint, and triggering access by the target fingerprint in the target resource space, based on the preset configuration information.
  • the target resource where the configuration information includes: a correspondence between different fingerprints of the user and resources in the resource space in at least one resource space in which the user has access rights.
  • the target resource includes at least one target application, and/or at least one target storage space;
  • accessing the target resource includes:
  • the target storage space is accessed.
  • the method further includes:
  • the prompt information is output, and the prompt information is used to prompt the user to enter the fingerprint, and the configured fingerprint can trigger the access. Resources.
  • the method before the matching the target fingerprint that matches the fingerprint to be identified, the method further includes:
  • the target fingerprint matching the fingerprint to be identified is matched from the preset fingerprint database, including:
  • the target fingerprint matching the fingerprint feature is matched.
  • an embodiment of the present application further provides an access control apparatus, including:
  • a fingerprint acquiring unit configured to acquire a currently input fingerprint to be recognized
  • a fingerprint matching unit configured to match, from a preset fingerprint database, a target fingerprint that matches the fingerprint to be identified
  • a user determining unit configured to determine a target user to which the target fingerprint belongs
  • the resource matching unit determines, from the at least one resource space in which the target user has access rights, the target resource space corresponding to the target fingerprint, and triggers the target resource to be accessed by the target fingerprint in the target resource space, where
  • the resource space is composed of a part or all of resources of the accessible resource in the terminal, where the target resource is part or all of the resources in the target resource space;
  • An access unit for accessing the target resource An access unit for accessing the target resource.
  • the device further comprises:
  • a data configuration unit configured to store preset configuration information, where the configuration information includes: a correspondence between different fingerprints of the user and resources in the resource space in at least one resource space in which the user has access rights;
  • the resource matching unit includes:
  • a resource matching subunit configured to determine, according to the configuration information stored in the data configuration unit, a target resource space corresponding to the target fingerprint from at least one resource space in which the target user has access rights, and The target resource is triggered by the target fingerprint in the target resource space.
  • the target resource determined by the resource matching unit includes: at least one target application, and/or at least one target storage space;
  • the access unit includes:
  • a first access subunit configured to run the target application when the target resource is the target application
  • a second access subunit configured to access the target storage space when the target resource is a target storage space.
  • the method further includes:
  • a prompting unit configured to output prompt information when the target fingerprint matching the fingerprint to be identified is not matched from the preset fingerprint database, the prompt information is used to prompt the user to enter the fingerprint, and configure the fingerprint to be entered Resources that can trigger access.
  • the method further includes:
  • a feature extraction unit configured to extract a fingerprint feature of the fingerprint to be recognized before the fingerprint matching unit configures the target fingerprint
  • the fingerprint matching unit includes:
  • the fingerprint matching subunit is configured to match, from the preset fingerprint database, a target fingerprint that matches the fingerprint feature.
  • the target fingerprint is matched from the fingerprint database, and after the target user to which the target fingerprint belongs is determined, the target user can be obtained from the target user.
  • the at least one resource space having access rights determines a target resource space corresponding to the target fingerprint and a target resource in the target resource space that is triggered by the user, and accesses the target resource. In this way, the user only needs to perform fingerprint input once, and can access the target resource that needs to be accessed, which simplifies the access operation and improves the convenience of accessing resources.
  • FIG. 1 is a schematic flow chart of an embodiment of an access control method according to the present application.
  • FIG. 2 is a block diagram showing an embodiment of an access control device of the present application.
  • FIG. 1 a schematic flowchart of an embodiment of an application running method of the present application is shown.
  • the method in this embodiment may include:
  • the method of the present application can be applied to any device having a fingerprint recognition function, such as a touch screen mobile phone, a fingerprint authentication device, or the like.
  • the user can trigger the fingerprint identification device to perform fingerprint recognition by inputting a fingerprint in the fingerprint input area of the fingerprint recognition device.
  • the fingerprint image detected by the terminal is referred to as the fingerprint to be recognized in the embodiment of the present invention.
  • the resource space is composed of a part or all resources of the accessible resources in the terminal, and the target resource space belongs to the at least one resource space.
  • the target resource is part or all of the resource in the target resource space.
  • the target resource may be the target resource space, and the target fingerprint may trigger access to the target resource space.
  • the resource space corresponding to the target fingerprint is referred to as a target resource space, and the resource corresponding to the target fingerprint in the target resource space is referred to as a target resource.
  • the accessible resource in the terminal may be divided into multiple resource spaces, and each resource space is composed of some or all of the accessible resources.
  • the resource space that the user can access is at least one resource space in the terminal, and the resource space corresponding to different users may be different, and the user can only access resources in the resource space with access rights.
  • the resource space in the embodiment of the present application can also be understood as a domain commonly known to those skilled in the art.
  • the accessible resource on the terminal can be understood as an area on the terminal that can be operated by the user.
  • the user can set the terminal in the accessible resource of the terminal, or implement the special resource through the accessible resource.
  • the accessible resource may be: multiple applications set by the terminal, at least one storage space, and the like.
  • a user can be uniquely identified by the fingerprint, so that the user who currently operates the terminal can be determined by the fingerprint without requiring the user to input a complicated login operation such as a username and password. .
  • the target resource in the resource space that the user wants to access may be quickly operated after the user has the at least one resource space with the access right.
  • Each finger of the user triggers access to the target resource in the target resource space, so that the user can accurately locate the resource to be accessed without the user having to find and click an icon.
  • a target resource can be located, so that the target resource can be directly triggered without user operation.
  • the manner of accessing the target resource may be the same as the existing mode, and details are not described herein again.
  • the target fingerprint is matched from the fingerprint database, and after the target user to which the target fingerprint belongs is determined, at least one of the access rights may be obtained from the target user.
  • the target resource space the target resource space corresponding to the target fingerprint and the target resource in the target resource space triggered by the target fingerprint are determined, and the target resource is triggered to be accessed. In this way, the user only needs to perform fingerprint input once, and can directly access the target resource in the target resource space, which simplifies the input operation of resource access and improves the convenience of resource access.
  • determining a target resource space corresponding to the target fingerprint, and a manner in which the target resource in the target resource space is triggered by the target fingerprint may be multiple.
  • the terminal may determine, according to the user's access habit, that the currently input fingerprint needs to access the target resource space to which the target resource belongs, such as the access frequency of each part of the resource space of the user, and the operation mode of the user. And determining a target resource space that is currently accessed by the target finger and a target resource within the target resource space.
  • the resource space that the different users have access rights on the terminal may be set according to requirements, and the resources that the same user triggers access through the fingerprints of different fingers may also be preset.
  • the user can set resources in the resource space corresponding to different fingers.
  • the correspondence between the user's finger and the resource space and the resource may be configured, and the configuration information is stored.
  • the target resource space corresponding to the target fingerprint may be determined according to the configuration information, and the target resource space corresponding to the target fingerprint is determined, and the target resource space is determined by the target
  • the fingerprint triggers the target resource of the access, where the configuration information includes at least: a correspondence between different fingerprints of the user and resources in the resource space in at least one resource space in which the user has access rights.
  • the configuration information in the configuration information may be in various forms, and is not limited thereto.
  • the resources accessible in the terminal may include applications, storage spaces, and the like.
  • the resource space in which the target user has access rights may also be composed of at least one application; and/or at least one storage space, where the storage space may be part or all of the storage space in the accessible resource in the terminal.
  • the target resource determined from the target resource space may be an application or multiple applications; or, is a part of the storage space; of course, the target resource may also include at least one application and at least a part of the storage space. .
  • the storage space included in the target resource is referred to as a target storage space.
  • the target resource when accessing the target resource, it may include:
  • the target application is run when the target resource is the target application.
  • the target storage space is accessed.
  • the configuration information includes at least one resource space within the access rights of the user A, the user B, and the user C, and the target resources in the resource space corresponding to the finger fingerprints of the three users.
  • the resource space in which the user A has access rights includes: a security resource space and a game resource space, wherein the security resource space may include multiple applications related to terminal or user information security, or store user information. Storage space and more.
  • the game resource space may include a plurality of game applications, or a storage area for storing various user data in the game application, and the like.
  • the user can know that the left middle finger corresponds to the private short message application in the secure resource space, so that the terminal uses the secure resource space as the target resource space and triggers access to the secure resource. Private SMS app in space.
  • a fingerprint may correspond to a resource space, and inputting the fingerprint may enter the resource space, and is not limited to only a part of the resource space. Resources are accessed.
  • accessing the target resource may directly enter the target resource space to which the target resource belongs and access the target resource without inputting into the resource space.
  • Required login account and password may be to open the target resource, for example, when the target resource is an application, the application may be opened; when the target resource is data stored in a storage space, the storage may be directly entered into the storage space. So that you can read and write data directly.
  • accessing the target resource may also be directly logging in to the application without inputting an application account or password.
  • the prompt information may also be output.
  • the prompt information is used to prompt the user to enter a fingerprint and configure an application that can be triggered by the fingerprint.
  • the manner of matching the target fingerprint from the fingerprint database may be any existing manner. Specifically, the fingerprint feature of the fingerprint to be identified may be extracted first; In the fingerprint database, the target fingerprint matching the fingerprint feature is matched.
  • the present application also provides an application running device.
  • FIG. 2 is a schematic structural diagram of an embodiment of an application running device according to the present application.
  • the device in this embodiment may include:
  • the fingerprint obtaining unit 201 is configured to acquire the currently input fingerprint to be recognized
  • the fingerprint matching unit 202 is configured to match, from the preset fingerprint database, a target fingerprint that matches the fingerprint to be identified;
  • a user determining unit 203 configured to determine a target user to which the target fingerprint belongs
  • the resource matching unit 204 determines a target resource space corresponding to the target fingerprint from at least one resource space in which the target user has access rights, and triggers access to the target resource by the target fingerprint in the target resource space.
  • the resource space is composed of a part or all of the resources of the accessible resource in the terminal, where the target resource is part or all of the resources in the target resource space;
  • the access unit 205 is configured to access the target resource.
  • the device further includes:
  • a data configuration unit configured to store preset configuration information, where the configuration information includes: a correspondence between different fingerprints of the user and resources in the resource space in at least one resource space in which the user has access rights;
  • the resource matching unit includes:
  • a resource matching subunit configured to determine, according to the configuration information stored in the data configuration unit, a target resource space corresponding to the target fingerprint from at least one resource space in which the target user has access rights, and The target resource is triggered by the target fingerprint in the target resource space.
  • the target resource that is determined by the resource matching unit includes:
  • At least one target application and/or at least one target storage space
  • the access unit can include:
  • a first access subunit configured to run the target application when the target resource is the target application
  • a second access subunit configured to access the target storage space when the target resource is a target storage space.
  • the method may further include:
  • a prompting unit configured to output prompt information when the target fingerprint matching the fingerprint to be identified is not matched from the preset fingerprint database, where the prompt information is used to prompt the user to enter a fingerprint, and configured to input the fingerprint A resource that can trigger access.
  • the device may further include:
  • a feature extraction unit configured to extract a fingerprint feature of the fingerprint to be recognized before the fingerprint matching unit configures the target fingerprint
  • the fingerprint matching unit includes:
  • the fingerprint matching subunit is configured to match, from the preset fingerprint database, a target fingerprint that matches the fingerprint feature.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Collating Specific Patterns (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Biomedical Technology (AREA)
  • Storage Device Security (AREA)

Abstract

La présente invention concerne un procédé et un dispositif de contrôle d'accès. Le procédé comprend les étapes consistant à : acquérir une empreinte digitale à reconnaître actuellement entrée ; apparier à partir d'une bibliothèque d'empreintes digitales prédéfinie une empreinte digitale cible correspondant à l'empreinte digitale à reconnaître ; déterminer un utilisateur cible auquel appartient l'empreinte digitale cible ; à partir d'au moins un espace de ressources auquel l'utilisateur cible a une autorisation d'accès, déterminer un espace de ressources cible auquel correspond l'empreinte digitale cible et une ressource cible à laquelle l'accès est déclenché par l'empreinte digitale cible dans l'espace de ressources cible ; et accéder à la ressource cible. Le procédé et le dispositif augmentent le degré de commodité pour un utilisateur pour accéder à un espace de ressources spécifique sur un terminal.
PCT/CN2015/095785 2015-07-30 2015-11-27 Procédé et dispositif de contrôle d'accès WO2017016115A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510459223.9A CN105656873B (zh) 2015-07-30 2015-07-30 一种访问控制方法和装置
CN201510459223.9 2015-07-30

Publications (1)

Publication Number Publication Date
WO2017016115A1 true WO2017016115A1 (fr) 2017-02-02

Family

ID=56481648

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/095785 WO2017016115A1 (fr) 2015-07-30 2015-11-27 Procédé et dispositif de contrôle d'accès

Country Status (2)

Country Link
CN (1) CN105656873B (fr)
WO (1) WO2017016115A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106599811B (zh) * 2016-11-29 2019-11-05 苏州虚现数字科技有限公司 一种vr头显的面部表情追踪方法
CN108848104B (zh) * 2018-07-02 2021-06-01 北京阿尔山金融科技有限公司 信息管理方法及装置
CN111193714B (zh) * 2019-12-06 2022-10-04 武汉极意网络科技有限公司 一种验证码打码平台自动化追踪方法及系统
CN114741677B (zh) * 2022-03-18 2023-05-02 深圳技师学院 一种基于用户行为指纹分配数据访问权限的方法及装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593597A (zh) * 2013-11-15 2014-02-19 青岛尚慧信息技术有限公司 一种智能移动终端的手电筒控制方法
CN103902867A (zh) * 2012-12-26 2014-07-02 联想(北京)有限公司 一种信息保护方法及电子设备
CN103914641A (zh) * 2013-01-04 2014-07-09 贝伦企业股份有限公司 指纹管理方法及系统
CN103984888A (zh) * 2014-05-23 2014-08-13 深圳市中兴移动通信有限公司 一种协助用户激活指纹绑定的应用程序的方法及装置
US20140270420A1 (en) * 2013-03-15 2014-09-18 Apple Inc. Finger biometric sensor providing coarse matching of ridge flow data using histograms and related methods

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902867A (zh) * 2012-12-26 2014-07-02 联想(北京)有限公司 一种信息保护方法及电子设备
CN103914641A (zh) * 2013-01-04 2014-07-09 贝伦企业股份有限公司 指纹管理方法及系统
US20140270420A1 (en) * 2013-03-15 2014-09-18 Apple Inc. Finger biometric sensor providing coarse matching of ridge flow data using histograms and related methods
CN103593597A (zh) * 2013-11-15 2014-02-19 青岛尚慧信息技术有限公司 一种智能移动终端的手电筒控制方法
CN103984888A (zh) * 2014-05-23 2014-08-13 深圳市中兴移动通信有限公司 一种协助用户激活指纹绑定的应用程序的方法及装置

Also Published As

Publication number Publication date
CN105656873B (zh) 2019-05-14
CN105656873A (zh) 2016-06-08

Similar Documents

Publication Publication Date Title
US9817956B2 (en) User authentication and data encryption
EP3005211B1 (fr) Gestion de ressources fondée sur des données biométriques
US20170270289A1 (en) User-authentication gestures
CN107223254B (zh) 用于隐藏设置处理的方法、用户装置和存储介质
TWI628556B (zh) 電子裝置的解鎖系統及方法
WO2015197008A1 (fr) Procédé et terminal d'authentification biométrique
WO2016155072A1 (fr) Procédé et appareil pour cacher et ouvrir des applications
WO2017035965A1 (fr) Procédé, dispositif et terminal de commande tactile basés sur une reconnaissance d'empreintes digitales
US9288669B2 (en) Mobile touch authentication refresh
JP2013506210A (ja) システムのバイオメトリックセキュリティの向上
WO2017016115A1 (fr) Procédé et dispositif de contrôle d'accès
WO2017020386A1 (fr) Procédé et appareil de vérification d'empreinte digitale
KR20150038453A (ko) 모바일 디바이스 애플리케이션을 위한 플러거블 인증 메커니즘
US9548865B2 (en) Token authentication for touch sensitive display devices
US9686274B2 (en) Informed implicit enrollment and identification
TW201531876A (zh) 應用軟體的登入系統及方法
US20180137268A1 (en) Authentication screen
KR20080085763A (ko) 지문 등록, 어플리케이션의 로그인 방법 설정 및어플리케이션에 로그인하기 위한 시스템 및 방법
WO2018107727A1 (fr) Procédé et dispositif de traitement d'informations, et terminal
Teh et al. Recognizing your touch: Towards strengthening mobile device authentication via touch dynamics integration
WO2018107761A1 (fr) Procédé de traitement d'informations et appareil électronique
WO2015184894A2 (fr) Procédé et dispositif de mise en œuvre d'un mode de connexion multiutilisateur
WO2017071498A1 (fr) Procédé et dispositif d'authentification d'identité
RU2751095C2 (ru) Предоставление доступа к структурированным сохраненным данным
Kumar et al. A graphical password based authentication based system for mobile devices

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15899467

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15899467

Country of ref document: EP

Kind code of ref document: A1