CN104992092A - Method, device and system for fingerprint information verification - Google Patents

Method, device and system for fingerprint information verification Download PDF

Info

Publication number
CN104992092A
CN104992092A CN201510335207.9A CN201510335207A CN104992092A CN 104992092 A CN104992092 A CN 104992092A CN 201510335207 A CN201510335207 A CN 201510335207A CN 104992092 A CN104992092 A CN 104992092A
Authority
CN
China
Prior art keywords
terminal
print information
finger print
function
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510335207.9A
Other languages
Chinese (zh)
Inventor
高毅
葛云源
王振淦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510335207.9A priority Critical patent/CN104992092A/en
Publication of CN104992092A publication Critical patent/CN104992092A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)

Abstract

The disclosure relates to a method, a device and a system for fingerprint information verification, which belong to the technical field of computers. The method comprises that a fingerprint verification request sent by a first terminal when the first terminal detects a verification triggering event corresponding to a first treatment is received; by a local fingerprint detection component, first fingerprint information input currently is detected; and if the first fingerprint information is matched with standard fingerprint information which is stored in advance, information about the successful verification will be sent to the first terminal. By applying the method, the device and the system for the fingerprint information verification provided by the disclosure, efficiency of operating the first terminal can be increased.

Description

A kind of methods, devices and systems verifying finger print information
Technical field
The disclosure is directed to field of computer technology, especially about a kind of methods, devices and systems verifying finger print information.
Background technology
Along with the development of computer technology, the terminal such as mobile phone, panel computer is widely used, the kind of the application program in corresponding terminal is more and more, function is more and more abundanter, the multifunctionality of terminal brings great convenience to the life of people, and such as people can carry out quick payment by mobile phone.People, for the use of terminal, cause storing a large amount of personal information in terminal, and therefore, the personal information in protection terminal seems very important.
At present; the method of the personal information in protection terminal is often by fingerprint recognition; first a finger print information is prestored in the terminal; when terminal is used, terminal obtains the finger print information of user, judges that whether the finger print information obtained is consistent with the finger print information stored; if consistent; then user can be unlocked and be used this terminal, if inconsistent, then user can not be unlocked.
Realizing in process of the present disclosure, inventor finds at least there is following problem:
Based on above-mentioned guard method; only have user finger print information being stored in advance in terminal just can use this terminal; if the household of user, friend hold the terminal of this user; and when wanting to unlock and use this terminal; need to hold this terminal and go to this user at one's side, carry out unlocked by fingerprint by this user, could operate this terminal; thus, cause the operating efficiency of this terminal comparatively low.
Summary of the invention
In order to overcome Problems existing in correlation technique, present disclose provides a kind of methods, devices and systems verifying finger print information.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, provide a kind of method verifying finger print information, described method comprises:
Receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
By the fingerprint detection parts of this locality, detect the first finger print information of current input;
If described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
Optionally, described method also comprises:
The fingerprint receiving the transmission of described first terminal arranges instruction, by described fingerprint detection parts, detects the second finger print information of current input, described second finger print information is stored as described reference finger information.
According to the second aspect of disclosure embodiment, provide a kind of method verifying finger print information, described method comprises:
When the checking trigger event of the first process correspondence being detected, send fingerprint authentication request to the second terminal;
Receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Perform described first process.
Optionally, described first process, comprises unlocking screen process.
Optionally, described method also comprises:
If receive the authentication failed message that described second terminal sends, then perform unlocking screen process, and obtain the local function privilege table prestored;
When receiving the first operational order of corresponding first application program first function, according to described function privilege table, determine whether described first application program first function is the function that restriction uses;
Be after the function of restriction use in described first application program first function, refuse described first operational order, otherwise, perform described first operational order.
Optionally, described method also comprises:
Receive that described second terminal sends be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises;
The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use, is recorded in described function privilege table respectively.
According to the third aspect of disclosure embodiment, provide a kind of second terminal, described second terminal comprises:
Receiver module, for receiving the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
Detection module, for by local fingerprint detection parts, detects the first finger print information of current input;
Sending module, if for described first finger print information and the reference finger information match prestored, then sends to described first terminal and is proved to be successful message.
Optionally, described receiver module, also for:
The fingerprint receiving the transmission of described first terminal arranges instruction, by described fingerprint detection parts, detects the second finger print information of current input, described second finger print information is stored as described reference finger information.
According to the fourth aspect of disclosure embodiment, provide a kind of first terminal, described first terminal comprises:
Sending module, for when the checking trigger event of the first process correspondence being detected, sends fingerprint authentication request to the second terminal;
Receiver module, for receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Processing module, for performing described first process.
Optionally, described first process, comprises unlocking screen process.
Optionally, described processing module, also for:
After the authentication failed message receiving described second terminal transmission, perform unlocking screen process, and obtain the local function privilege table prestored;
When receiving the first operational order of corresponding first application program first function, according to described function privilege table, determine whether described first application program first function is the function that restriction uses;
If described first application program first function is the function that restriction uses, then refuse described first operational order, otherwise, perform described first operational order.
Optionally, described first terminal also comprises priority assignation module, for:
Receive that described second terminal sends be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises;
The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use, is recorded in described function privilege table respectively.
According to the 5th aspect of disclosure embodiment, provide a kind of device verifying finger print information, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
By the fingerprint detection parts of this locality, detect the first finger print information of current input;
If described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
According to the 6th aspect of disclosure embodiment, provide a kind of device verifying finger print information, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
When the checking trigger event of the first process correspondence being detected, send fingerprint authentication request to the second terminal;
Receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Perform described first process.
According to the 7th aspect of disclosure embodiment, provide a kind of system verifying finger print information, described system comprises first terminal and the second terminal, wherein:
Described first terminal, for when the checking trigger event of the first process correspondence being detected, fingerprint authentication request is sent to described second terminal, receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message, perform described first process;
Described second terminal, for receiving the fingerprint authentication request that described first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect described first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect:
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if the first finger print information and the reference finger information match prestored, then send to first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in instructions and to form the part of this instructions, shows and meets embodiment of the present disclosure, and is used from instructions one and explains principle of the present disclosure.In the accompanying drawings:
Fig. 1 is a kind of process flow diagram verifying the method for finger print information according to an exemplary embodiment;
Fig. 2 is a kind of process flow diagram verifying the method for finger print information according to an exemplary embodiment;
Fig. 3 is the schematic diagram of the application scenarios according to an exemplary embodiment;
Fig. 4 is a kind of process flow diagram verifying the method for finger print information according to an exemplary embodiment;
Fig. 5 is the interface display schematic diagram according to an exemplary embodiment;
Fig. 6 is the structural representation of a kind of second terminal according to an exemplary embodiment;
Fig. 7 is the structural representation of a kind of first terminal according to an exemplary embodiment;
Fig. 8 is the structural representation of a kind of first terminal according to an exemplary embodiment;
Fig. 9 is the structural representation of a kind of second terminal according to an exemplary embodiment;
Figure 10 is the structural representation of a kind of first terminal according to an exemplary embodiment.
By above-mentioned accompanying drawing, illustrate the embodiment that the disclosure is clear and definite more detailed description will be had hereinafter.These accompanying drawings and text description be not in order to limited by any mode the disclosure design scope, but by reference to specific embodiment for those skilled in the art illustrate concept of the present disclosure.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
Embodiment one
Disclosure embodiment provides a kind of method verifying finger print information, and the method can be realized jointly by first terminal, the second terminal.
As shown in Figure 1, in the method, the treatment scheme of the second terminal can comprise following step:
In a step 101, the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected is received.
In a step 102, by the fingerprint detection parts of this locality, detect the first finger print information of current input;
In step 103, if the first finger print information and the reference finger information match prestored, then send to first terminal and be proved to be successful message.
As shown in Figure 2, in the method, the treatment scheme of first terminal can comprise following step:
In step 201, when the checking trigger event of the first process correspondence being detected, send fingerprint authentication request to the second terminal.
In step 202., receive the second terminal by its fingerprint detection parts detect current input the first finger print information and the first finger print information with prestore reference finger information match time feed back be proved to be successful message.
In step 203, the first process is performed.
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if the first finger print information and the reference finger information match prestored, then send to first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Embodiment two
Disclosure embodiment provides a kind of method verifying finger print information, and the method can be realized jointly by first terminal, the second terminal, and corresponding application scenarios figure as shown in Figure 3.Wherein, first terminal can be the mobile terminal such as mobile phone, panel computer, and the second terminal can be portable intelligent device, and being such as intelligent watch, Intelligent bracelet, smart pen, intelligent necklace etc., also can be the mobile terminal such as mobile phone, panel computer.Processor, storer, transceiver can be provided with in first terminal, processor may be used for finger print information checking request and processes accordingly the operation of terminal user, storer may be used for the data storing data and the generation needed in above-mentioned processing procedure, transceiver may be used for receiving and sending data, can be bluetooth component.Processor, storer, transceiver can be provided with in second terminal, the finger print information that processor may be used for detecting carries out fingerprint recognition process, storer may be used for the data storing data and the generation needed in above-mentioned processing procedure, transceiver may be used for receiving and sending data, can be bluetooth component.Second terminal can also be provided with fingerprint detection parts, may be used for the finger print information detecting user's input.In the present embodiment, take first terminal as mobile phone, the second terminal is example for Intelligent bracelet, carry out the detailed description of scheme, other situation is similar with it, and the present embodiment is not repeated.
As shown in Figure 4, the treatment scheme of the method can comprise following step:
In step 401, first terminal, when the checking trigger event of the first process correspondence being detected, sends fingerprint authentication request to the second terminal.
Wherein, the first process can be any process that first terminal can perform, and can be unlocking screen process, also can be that application unlocks process, can also be that certain pays the confirmation payment processes of class application program, etc.Checking trigger event can be the event of the fingerprint authentication process triggering corresponding first process, such as, checking trigger event can be that first terminal switches to the event of display locking screen interface by screen closed condition, again such as, for the situation locking screen interface of first terminal being provided with fingerprint recognition button, checking trigger event can be the event that user clicks key range.
In force; first terminal is provided with multiple application program; when owner's (can be called first user) of first terminal uses the application program on first terminal; the personal information of some secrets can be preserved; for the personal information in protection first terminal, in the system program in first terminal, fingerprint identification function can be set.First terminal can bind another terminal (can be described as the second terminal), can be obtained the finger print information of first user by the second terminal.Concrete binding procedure can be: first user can be clicked system program and arrange fingerprint recognition setting options in the page, first terminal ejection fingerprint recognition will be triggered the page is set, wherein show terminal binding button, the second terminal of fingerprint recognition is carried out for binding auxiliary first terminal, first user can click this terminal binding button, first terminal will be triggered and eject terminal selection window, wherein can show the terminal iidentification that this locality can detect all terminals of Bluetooth signal, first user can select one to want the terminal iidentification of second terminal of carrying out binding (can be the current terminal set up bluetooth with first terminal and be connected wherein, also can be that other is not set up bluetooth and is connected but the terminal that its Bluetooth signal can be detected with first terminal), select can also show in interface to determine button, after selection, first user can be clicked and determine button, it is binding terminal that first terminal then can record the second terminal, the terminal iidentification of the second terminal is stored in this locality.In addition, server can be provided with at network side, as the background server of fingerprint identification function, first terminal can pass through its account and this server of password login, first terminal record second terminal is after binding terminal, can also be connected by bluetooth, the account and the password that first terminal are logged in this server send to the second terminal, and the second terminal also can pass through this account and this server of password login.
Under the screen of first terminal is in closed condition, when the second user (can be same user with first user, may not be same user) when to press on first terminal fuselage for showing the button of locking screen interface, first terminal will show locking screen interface.As shown in Figure 5, in the locking screen interface of first terminal, the button carrying out fingerprint recognition can be provided with, second user can click this button in first terminal screen-unblocking interface, first terminal then can detect the click commands (the checking trigger event of the first process correspondence namely being detected) of the second user, and then can be communicated with second terminal of binding in advance by bluetooth connection, send fingerprint authentication request to the second terminal.Or, first terminal also can be pressed on first terminal fuselage for showing the button of locking screen interface the second user, during display locking screen interface, connected by bluetooth and communicate with second terminal of binding in advance, fingerprint authentication request is sent to the second terminal, in this case, the checking trigger event that locking screen interface is the first process correspondence is shown.
In addition, when first terminal and the second terminal distant, when bluetooth cannot connect, first terminal can also send fingerprint authentication request by wireless network to above-mentioned server, server will receive the fingerprint authentication request that first terminal sends, after receiving fingerprint authentication request, fingerprint authentication request forward is given the second terminal using same account to log in first terminal by server again.
In step 402, the second terminal receives the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected.
In force, after second terminal receives fingerprint authentication request, local fingerprint detection parts can be opened, meanwhile, cue can be sent, as vibrations, luminescence or sounding etc., can also on screen display reminding information, as " someone wants the terminal XXX using you, row fingerprint input that come in " (wherein " XXX " can be terminal iidentification), carry out fingerprint input operation to point out first user in the second terminal.
In step 403, the second terminal, by local fingerprint detection parts, detects the first finger print information of current input.
Wherein, finger print information can be fingerprint image.
In force, can arrange and Memory Reference finger print information in the second terminal in advance, verify for the finger print information inputted user, concrete method to set up will be explained in detail later.
When first user perceives above-mentioned cue, or when seeing information, if first user allows the user (i.e. the second user) of positive carry first terminal to operate first terminal, finger when arranging reference finger information can be placed on the fingerprint detection parts of the second terminal, if first user does not allow the user operation first terminal of positive carry first terminal, can other finger beyond finger when arranging reference finger information be placed on the fingerprint detection parts of the second terminal, and then, second terminal can obtain corresponding finger print information (i.e. the first finger print information) by fingerprint detection parts.Such as, if first user is when Memory Reference finger print information, input be the finger print information of left index finger, when first user allows the second user operation first terminal, the finger print information of left index finger can be inputted, when first user does not allow the second user operation first terminal, the finger print information of the arbitrary finger except left index finger can be inputted.
In step 404, if the first finger print information and the reference finger information match prestored, the second terminal then sends to first terminal and is proved to be successful message.
In force, second terminal is after the first finger print information that first user inputs being detected, the similarity of the fingerprint image in the first finger print information and the fingerprint image in reference finger information can be calculated, if the similarity calculated is greater than the threshold value pre-set, then can think the first finger print information and the reference finger information match prestored, otherwise, do not match.If the first finger print information that fingerprint detection parts detect and reference finger information match, then the second terminal can be connected by bluetooth or be proved to be successful message by above-mentioned server to first terminal transmission.
Optionally, if the first finger print information does not mate with the described reference finger information prestored, then authentication failed message can be sent to first terminal.
In step 405, first terminal receive the second terminal by its fingerprint detection parts detect current input the first finger print information and the first finger print information with prestore reference finger information match time feed back be proved to be successful message.
In a step 406, first terminal performs the first process.
In force, if first terminal receive second terminal send be proved to be successful message, the first process that checking trigger event is corresponding can be performed, for the situation that the first process is unlocking screen process, when first terminal receive second terminal send be proved to be successful message time, can unlock screen.
Optionally, send the situation of authentication failed message to first terminal for the second terminal, corresponding process can be as follows: first terminal, after the authentication failed message receiving the second terminal transmission, performs unlocking screen process, and obtains the local function privilege table prestored; When receiving the first operational order of corresponding first application program first function, according to function privilege table, determine whether the first application program first function is the function that restriction uses; If the first application program first function is the function that restriction uses, then refuse the first operational order, otherwise, perform the first operational order.
Wherein, as shown in table 1, function privilege table can be used to the list of the rights of using of the function that records application program comprises, can record in function privilege table the mark of each application program, its function comprised and fingerprint authentication request failure user to the rights of using of each function (comprise unrestricted use and limit use).Such as, can record in function privilege table and pay the mark (as F etc.) of class application program and the function of correspondence, the function of such as connection data network function of surfing the Net, operation bank card and check the function of remaining sum, the content comprised in function privilege table is: F: connection data network function of surfing the Net, unrestricted use; The function of operation bank card, restriction uses; Check the function of remaining sum, restriction uses.
Table 1
In force, when first terminal receives the authentication failed message of the second terminal transmission, will process be unlocked the same, and obtain the function privilege table prestored at first terminal.After first terminal unlocking screen, user can operate first terminal, can use the application program that first terminal is installed.User is when operating certain application program (can be called the first application program) on first terminal, first terminal will receive the operational order (can be called the first operational order) to certain function (can be called the first function) in this application program that user triggers, inquire about the function privilege table got, if what record in function privilege table be the rights of using of the first application program first function is unrestricted use, then first terminal performs the operation of user, if what record in function privilege table be the rights of using of the first application program first function is that restriction uses, then first terminal refuses the first operational order, if there is no the rights of using of record first application program first function in function privilege table, then perform the first operational order.
Optionally, can arrange the rights of using of its function after each application program is installed, corresponding process can be as follows: receive described second terminal send be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises; The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use is recorded in described function privilege table respectively.
In force, first terminal receive second terminal send be proved to be successful message time, the screen of first terminal unlocks, be in released state, user can operate arbitrarily first terminal, the application program that first terminal namely can be used to install and the function of correspondence thereof, also can on first terminal set up applications.When user is on first terminal during set up applications, after installation, first terminal can show priority assignation window at desktop, the part or all of function that this application program wherein comprising installation comprises, and the rights of using setting options that each function is corresponding, user can arrange the function of unrestricted use and the function of restriction use in priority assignation window.Can also show in priority assignation window and determine button and cancel button, after user is provided with, can click and determine button, the function of the function that the restriction that user will arrange by first terminal uses and unrestricted use is recorded in function privilege table respectively, if user does not want that the application program to installing carries out priority assignation, can click the cancellation button in priority assignation window, the limit cancelling display arranges window.
In disclosure embodiment, the process pre-setting reference finger information in the second terminal can be as follows: the fingerprint receiving first terminal transmission arranges instruction, by fingerprint detection parts, detect the second finger print information of current input, the second finger print information is stored as reference finger information.
Wherein, reference finger information is the reference information for carrying out mating checking in fingerprint authentication process to the finger print information of user's input.
In force, after the second terminal binding that first terminal and first user are held, first user can be clicked fingerprint recognition and arrange reference finger information setting options in the page, first terminal ejection reference finger information will be triggered the page is set, wherein show storage button, first user can click storage button, first terminal will be triggered communicated with second terminal of binding in advance by bluetooth connection, send fingerprint to the second terminal and instruction is set, the fingerprint that second terminal will receive first terminal transmission arranges instruction, local fingerprint detection parts can be opened, simultaneously, cue can be sent, as vibrations, luminescence or sounding etc., can also on screen display reminding information, as " arranged reference finger information, row fingerprint input that come in ", fingerprint input operation is carried out in the second terminal to point out first user.First user perceives above-mentioned cue, or when seeing information, a finger can be placed on fingerprint detection parts, input the second finger print information.When second terminal detects the second finger print information that first user inputs, it can be used as reference finger information, be stored in this locality.
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Embodiment three
Based on identical technical conceive, the disclosure embodiment still provides a kind of second terminal, and as shown in Figure 6, described second terminal comprises:
Receiver module 610, for receiving the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
Detection module 620, for by local fingerprint detection parts, detects the first finger print information of current input;
Sending module 630, if for described first finger print information and the reference finger information match prestored, then sends to described first terminal and is proved to be successful message.
Optionally, described sending module 630, also for:
If the first described finger print information does not mate with the described reference finger information prestored, then send authentication failed message to described first terminal.
Optionally, described first process, comprises unlocking screen process.
Optionally, described receiver module 610, also for:
The fingerprint receiving the transmission of described first terminal arranges instruction, by described fingerprint detection parts, detects the second finger print information of current input, described second finger print information is stored as described reference finger information.
Based on identical technical conceive, the embodiment of the present invention additionally provides a kind of first terminal, and as shown in Figure 7, described first terminal comprises:
Sending module 710, for when the checking trigger event of the first process correspondence being detected, sends fingerprint authentication request to the second terminal;
Receiver module 720, for receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Processing module 730, for performing described first process.
Optionally, described first process, comprises unlocking screen process.
Optionally, described processing module 730, also for:
After the authentication failed message receiving described second terminal transmission, perform unlocking screen process, and obtain the local function privilege table prestored;
When receiving the first operational order of corresponding first application program first function, according to described function privilege table, determine whether described first application program first function is the function that restriction uses;
If described first application program first function is the function that restriction uses, then refuse described first operational order, otherwise, perform described first operational order.
Optionally, as shown in Figure 8, described first terminal also comprises priority assignation module 740, for:
Receive that described second terminal sends be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises;
The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use, is recorded in described function privilege table respectively.
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Embodiment four
Based on identical technical conceive, the disclosure embodiment still provides a kind of system verifying finger print information, and described system comprises first terminal and the second terminal, wherein:
Described first terminal, for when the checking trigger event of the first process correspondence being detected, fingerprint authentication request is sent to described second terminal, receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message, then perform described first process;
Described second terminal, for receiving the fingerprint authentication request that described first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect described first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Embodiment five
The structural representation of a kind of second terminal that disclosure embodiment also illustrates.This terminal can be Intelligent bracelet etc.
With reference to Fig. 9, terminal 900 can comprise following one or more assembly: processing components 902, storer 904, power supply module 906, multimedia groupware 908, audio-frequency assembly 910, the interface 912 of I/O (I/O), sensor module 914, and communications component 916.
The integrated operation of the usual control terminal 900 of processing components 902, such as with display, call, data communication, camera operation and record operate the operation be associated.Treatment element 902 can comprise one or more processor 920 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 902 can comprise one or more module, and what be convenient between processing components 902 and other assemblies is mutual.Such as, processing element 902 can comprise multi-media module, mutual with what facilitate between multimedia groupware 908 and processing components 902.
Storer 904 is configured to store various types of data to be supported in the operation of terminal 900.The example of these data comprises for any application program of operation in terminal 900 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 904 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that electric power assembly 906 is terminal 900 provide electric power.Electric power assembly 906 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for audio output apparatus 900 and be associated.
Multimedia groupware 908 is included in the screen providing an output interface between described terminal 900 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 908 comprises a front-facing camera and/or post-positioned pick-up head.When terminal 900 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 910 is configured to export and/or input audio signal.Such as, audio-frequency assembly 910 comprises a microphone (MIC), and when audio output apparatus 900 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 904 further or be sent via communications component 916.
I/O interface 912 is for providing interface between processing components 902 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 914 comprises one or more sensor, for providing the state estimation of various aspects for terminal 900.Such as, sensor module 914 can detect the opening/closing state of terminal 900, the relative positioning of assembly, such as described assembly is display and the keypad of terminal 900, the position of all right sense terminals 900 of sensor module 914 or terminal 900 1 assemblies changes, the presence or absence that user contacts with terminal 900, the temperature variation of terminal 900 orientation or acceleration/deceleration and terminal 900.Sensor module 914 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 914 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 914 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 916 is configured to the communication being convenient to wired or wireless mode between terminal 900 and other equipment.Terminal 900 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 916 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communication component 916 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, terminal 900 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 904 of instruction, above-mentioned instruction can perform said method by the processor 920 of terminal 900.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of terminal, make terminal can perform the method for carrying out information transmission, the method comprises:
Receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
By the fingerprint detection parts of this locality, detect the first finger print information of current input;
If described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
Optionally, described method also comprises:
If the first described finger print information does not mate with the described reference finger information prestored, then send authentication failed message to described first terminal.
Optionally, described first process, comprises unlocking screen process.
Optionally, described method also comprises:
The fingerprint receiving the transmission of described first terminal arranges instruction, by described fingerprint detection parts, detects the second finger print information of current input, described second finger print information is stored as described reference finger information.
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Embodiment six
The structural representation of a kind of first terminal that disclosure embodiment also illustrates.This terminal can be mobile phone etc.
With reference to Figure 10, terminal 1000 can comprise following one or more assembly: processing components 1002, storer 1004, power supply module 1006, multimedia groupware 1008, audio-frequency assembly 1010, the interface 1012 of I/O (I/O), sensor module 1014, and communications component 1016.
The integrated operation of the usual control terminal 1000 of processing components 1002, such as with display, call, data communication, camera operation and record operate the operation be associated.Treatment element 1002 can comprise one or more processor 1020 to perform instruction, to complete all or part of step of above-mentioned method.In addition, processing components 1002 can comprise one or more module, and what be convenient between processing components 1002 and other assemblies is mutual.Such as, processing element 1002 can comprise multi-media module, mutual with what facilitate between multimedia groupware 1008 and processing components 1002.
Storer 1004 is configured to store various types of data to be supported in the operation of terminal 1000.The example of these data comprises for any application program of operation in terminal 1000 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 1004 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
The various assemblies that electric power assembly 1006 is terminal 1000 provide electric power.Electric power assembly 1006 can comprise power-supply management system, one or more power supply, and other and the assembly generating, manage and distribute electric power for audio output apparatus 1000 and be associated.
Multimedia groupware 1008 is included in the screen providing an output interface between described terminal 1000 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises one or more touch sensor with the gesture on sensing touch, slip and touch panel.Described touch sensor can the border of not only sensing touch or sliding action, but also detects the duration relevant to described touch or slide and pressure.In certain embodiments, multimedia groupware 1008 comprises a front-facing camera and/or post-positioned pick-up head.When terminal 1000 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 1010 is configured to export and/or input audio signal.Such as, audio-frequency assembly 1010 comprises a microphone (MIC), and when audio output apparatus 1000 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal received can be stored in storer 1004 further or be sent via communications component 1016.
I/O interface 1012 is for providing interface between processing components 1002 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 1014 comprises one or more sensor, for providing the state estimation of various aspects for terminal 1000.Such as, sensor module 1014 can detect the opening/closing state of terminal 1000, the relative positioning of assembly, such as described assembly is display and the keypad of terminal 1000, the position of all right sense terminals 1000 of sensor module 1014 or terminal 1000 assemblies changes, the presence or absence that user contacts with terminal 1000, the temperature variation of terminal 1000 orientation or acceleration/deceleration and terminal 1000.Sensor module 1014 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 1014 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 1014 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 1016 is configured to the communication being convenient to wired or wireless mode between terminal 1000 and other equipment.Terminal 1000 can access the wireless network based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communication component 1016 receives from the broadcast singal of external broadcasting management system or broadcast related information via broadcast channel.In one exemplary embodiment, described communication component 1016 also comprises near-field communication (NFC) module, to promote junction service.Such as, can based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, terminal 1000 can be realized, for performing said method by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components.
In the exemplary embodiment, additionally provide a kind of non-transitory computer-readable recording medium comprising instruction, such as, comprise the storer 1004 of instruction, above-mentioned instruction can perform said method by the processor 1020 of terminal 1000.Such as, described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc.
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is performed by the processor of terminal, make terminal can perform the method for carrying out information transmission, the method comprises:
When the checking trigger event of the first process correspondence being detected, send fingerprint authentication request to the second terminal;
Receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Perform described first process.
Optionally, described first process, comprises unlocking screen process.
Optionally, described method also comprises:
After the authentication failed message receiving described second terminal transmission, perform unlocking screen process, and obtain the local function privilege table prestored;
When receiving the first operational order of corresponding first application program first function, according to described function privilege table, determine whether described first application program first function is the function that restriction uses;
If described first application program first function is the function that restriction uses, then refuse described first operational order, otherwise, perform described first operational order.
Optionally, described method also comprises:
Receive that described second terminal sends be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises;
The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use, is recorded in described function privilege table respectively.
In disclosure embodiment, receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect the first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.Like this, the household of user, friend hold the first terminal of this user, and when wanting to unlock and use first terminal, can be done to unlock first terminal in the second terminal drilling by this user, hold first terminal go to this user at one's side without the need to the friend of user, household, just can unlock first terminal, to carry out subsequent operation, thus, improve the operating efficiency to first terminal.
Those skilled in the art, at consideration instructions and after putting into practice disclosed herein disclosing, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Instructions and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (15)

1. verify a method for finger print information, it is characterized in that, described method comprises:
Receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
By the fingerprint detection parts of this locality, detect the first finger print information of current input;
If described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
2. method according to claim 1, is characterized in that, described method also comprises:
The fingerprint receiving the transmission of described first terminal arranges instruction, by described fingerprint detection parts, detects the second finger print information of current input, described second finger print information is stored as described reference finger information.
3. verify a method for finger print information, it is characterized in that, described method comprises:
When the checking trigger event of the first process correspondence being detected, send fingerprint authentication request to the second terminal;
Receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Perform described first process.
4. method according to claim 3, is characterized in that, described first process, comprises unlocking screen process.
5. method according to claim 4, is characterized in that, described method also comprises:
After the authentication failed message receiving described second terminal transmission, perform unlocking screen process, and obtain the local function privilege table prestored;
When receiving the first operational order of corresponding first application program first function, according to described function privilege table, determine whether described first application program first function is the function that restriction uses;
If described first application program first function is the function that restriction uses, then refuse described first operational order, otherwise, perform described first operational order.
6. method according to claim 5, is characterized in that, described method also comprises:
Receive that described second terminal sends be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises;
The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use, is recorded in described function privilege table respectively.
7. second terminal, is characterized in that, described second terminal comprises:
Receiver module, for receiving the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
Detection module, for by local fingerprint detection parts, detects the first finger print information of current input;
Sending module, if for described first finger print information and the reference finger information match prestored, then sends to described first terminal and is proved to be successful message.
8. the second terminal according to claim 7, is characterized in that, described receiver module, also for:
The fingerprint receiving the transmission of described first terminal arranges instruction, by described fingerprint detection parts, detects the second finger print information of current input, described second finger print information is stored as described reference finger information.
9. a first terminal, is characterized in that, described first terminal comprises:
Sending module, for when the checking trigger event of the first process correspondence being detected, sends fingerprint authentication request to the second terminal;
Receiver module, for receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Processing module, for performing described first process.
10. first terminal according to claim 9, is characterized in that, described first process, comprises unlocking screen process.
11. first terminals according to claim 10, is characterized in that, described processing module, also for:
After the authentication failed message receiving described second terminal transmission, perform unlocking screen process, and obtain the local function privilege table prestored;
When receiving the first operational order of corresponding first application program first function, according to described function privilege table, determine whether described first application program first function is the function that restriction uses;
If described first application program first function is the function that restriction uses, then refuse described first operational order, otherwise, perform described first operational order.
12. first terminals according to claim 11, is characterized in that, described first terminal also comprises priority assignation module, for:
Receive that described second terminal sends be proved to be successful message after, perform unlocking screen process, when after the installation completing the second application program, display priority assignation window, described priority assignation window comprises each function that described second application program comprises;
The function of the function that the restriction chosen in each function user comprised in described second application program uses and unrestricted use, is recorded in described function privilege table respectively.
13. 1 kinds of devices verifying finger print information, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the fingerprint authentication request that first terminal sends when the checking trigger event of the first process correspondence being detected;
By the fingerprint detection parts of this locality, detect the first finger print information of current input;
If described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
14. 1 kinds of devices verifying finger print information, is characterized in that, comprising:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
When the checking trigger event of the first process correspondence being detected, send fingerprint authentication request to the second terminal;
Receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message;
Perform described first process.
15. 1 kinds of systems verifying finger print information, it is characterized in that, described system comprises first terminal and the second terminal, wherein:
Described first terminal, for when the checking trigger event of the first process correspondence being detected, fingerprint authentication request is sent to described second terminal, receive described second terminal by its fingerprint detection parts detect current input the first finger print information and described first finger print information with prestore reference finger information match time feed back be proved to be successful message, perform described first process;
Described second terminal, for receiving the fingerprint authentication request that described first terminal sends when the checking trigger event of the first process correspondence being detected, by the fingerprint detection parts of this locality, detect described first finger print information of current input, if described first finger print information and the reference finger information match prestored, then send to described first terminal and be proved to be successful message.
CN201510335207.9A 2015-06-16 2015-06-16 Method, device and system for fingerprint information verification Pending CN104992092A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510335207.9A CN104992092A (en) 2015-06-16 2015-06-16 Method, device and system for fingerprint information verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510335207.9A CN104992092A (en) 2015-06-16 2015-06-16 Method, device and system for fingerprint information verification

Publications (1)

Publication Number Publication Date
CN104992092A true CN104992092A (en) 2015-10-21

Family

ID=54303905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510335207.9A Pending CN104992092A (en) 2015-06-16 2015-06-16 Method, device and system for fingerprint information verification

Country Status (1)

Country Link
CN (1) CN104992092A (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631294A (en) * 2015-12-29 2016-06-01 广东欧珀移动通信有限公司 Screen unlocking method and user terminals
CN105718779A (en) * 2016-01-20 2016-06-29 广东欧珀移动通信有限公司 Application program login method and user terminal
CN106067002A (en) * 2016-05-27 2016-11-02 广东欧珀移动通信有限公司 A kind of finger print information processing method and user terminal
CN106096362A (en) * 2016-06-01 2016-11-09 联想(北京)有限公司 A kind of control method and electronic equipment
CN106095289A (en) * 2016-05-31 2016-11-09 广东欧珀移动通信有限公司 A kind of method of unlocked by fingerprint and terminal
CN106133736A (en) * 2016-06-27 2016-11-16 北京小米移动软件有限公司 Fingerprint authentication method and device
CN106411957A (en) * 2016-12-05 2017-02-15 吉林师范大学 Fingerprint identification based Internet trustful platform and the use method thereof
CN106446653A (en) * 2016-09-30 2017-02-22 北京小米移动软件有限公司 Application authority management method and device and electronic equipment
CN106548055A (en) * 2016-10-17 2017-03-29 福州领头虎软件有限公司 A kind of exchange method and system based on finger print information
CN106658502A (en) * 2016-12-28 2017-05-10 太仓红码软件技术有限公司 Intelligent wireless local area reservation access method based on fingerprint authentication
CN106951752A (en) * 2016-01-06 2017-07-14 希姆通信息技术(上海)有限公司 The unlocking system and method for mobile terminal
CN107295194A (en) * 2017-07-18 2017-10-24 广东欧珀移动通信有限公司 Unlocking processing method and related product
CN107315938A (en) * 2017-06-26 2017-11-03 上海斐讯数据通信技术有限公司 A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device
CN108416197A (en) * 2017-02-09 2018-08-17 北京小米移动软件有限公司 Unlock the method and device of mobile terminal
WO2019033241A1 (en) * 2017-08-14 2019-02-21 深圳市汇顶科技股份有限公司 Terminal device, optical fingerprint recognition module, and terminal device operating method
CN109376519A (en) * 2018-10-24 2019-02-22 维沃移动通信有限公司 A kind of unlocked by fingerprint method and terminal device
CN110852163A (en) * 2019-10-08 2020-02-28 云知声智能科技股份有限公司 Binding method and device
CN111078095A (en) * 2018-10-18 2020-04-28 深圳市鹰硕技术有限公司 Intelligent writing device and method based on RFID technology
WO2022089599A1 (en) * 2020-10-29 2022-05-05 华为技术有限公司 Shared data distribution method and electronic devices

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714285A (en) * 2013-12-20 2014-04-09 上海卓悠网络科技有限公司 NFC-based method and device for achieving mobile terminal access right control
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
CN104200143A (en) * 2014-09-04 2014-12-10 广东欧珀移动通信有限公司 Method and system for inputting password into intelligent mobile terminal rapidly through wearable device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103714285A (en) * 2013-12-20 2014-04-09 上海卓悠网络科技有限公司 NFC-based method and device for achieving mobile terminal access right control
CN104182871A (en) * 2014-02-19 2014-12-03 钟一鸣 Mobile payment system and smart wristband
CN104200143A (en) * 2014-09-04 2014-12-10 广东欧珀移动通信有限公司 Method and system for inputting password into intelligent mobile terminal rapidly through wearable device

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631294B (en) * 2015-12-29 2018-09-04 广东欧珀移动通信有限公司 A kind of unlocking screen method and user terminal
CN105631294A (en) * 2015-12-29 2016-06-01 广东欧珀移动通信有限公司 Screen unlocking method and user terminals
CN106951752A (en) * 2016-01-06 2017-07-14 希姆通信息技术(上海)有限公司 The unlocking system and method for mobile terminal
CN105718779A (en) * 2016-01-20 2016-06-29 广东欧珀移动通信有限公司 Application program login method and user terminal
CN105718779B (en) * 2016-01-20 2019-02-05 Oppo广东移动通信有限公司 A kind of application program login method and user terminal
CN106067002A (en) * 2016-05-27 2016-11-02 广东欧珀移动通信有限公司 A kind of finger print information processing method and user terminal
CN106067002B (en) * 2016-05-27 2019-06-11 Oppo广东移动通信有限公司 A kind of finger print information processing method and user terminal
CN106095289A (en) * 2016-05-31 2016-11-09 广东欧珀移动通信有限公司 A kind of method of unlocked by fingerprint and terminal
CN106095289B (en) * 2016-05-31 2019-06-21 Oppo广东移动通信有限公司 A kind of method and terminal of unlocked by fingerprint
CN106096362A (en) * 2016-06-01 2016-11-09 联想(北京)有限公司 A kind of control method and electronic equipment
CN106096362B (en) * 2016-06-01 2020-07-24 联想(北京)有限公司 Control method and electronic equipment
CN106133736B (en) * 2016-06-27 2019-02-22 北京小米移动软件有限公司 Fingerprint authentication method and device
CN106133736A (en) * 2016-06-27 2016-11-16 北京小米移动软件有限公司 Fingerprint authentication method and device
CN106446653A (en) * 2016-09-30 2017-02-22 北京小米移动软件有限公司 Application authority management method and device and electronic equipment
CN106548055A (en) * 2016-10-17 2017-03-29 福州领头虎软件有限公司 A kind of exchange method and system based on finger print information
CN106411957A (en) * 2016-12-05 2017-02-15 吉林师范大学 Fingerprint identification based Internet trustful platform and the use method thereof
CN106658502A (en) * 2016-12-28 2017-05-10 太仓红码软件技术有限公司 Intelligent wireless local area reservation access method based on fingerprint authentication
CN106658502B (en) * 2016-12-28 2020-10-02 西安智财全技术转移中心有限公司 Intelligent wireless local area network reserved access method based on fingerprint authentication
CN108416197A (en) * 2017-02-09 2018-08-17 北京小米移动软件有限公司 Unlock the method and device of mobile terminal
CN107315938A (en) * 2017-06-26 2017-11-03 上海斐讯数据通信技术有限公司 A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device
CN107295194A (en) * 2017-07-18 2017-10-24 广东欧珀移动通信有限公司 Unlocking processing method and related product
WO2019033241A1 (en) * 2017-08-14 2019-02-21 深圳市汇顶科技股份有限公司 Terminal device, optical fingerprint recognition module, and terminal device operating method
CN111078095A (en) * 2018-10-18 2020-04-28 深圳市鹰硕技术有限公司 Intelligent writing device and method based on RFID technology
CN109376519A (en) * 2018-10-24 2019-02-22 维沃移动通信有限公司 A kind of unlocked by fingerprint method and terminal device
CN109376519B (en) * 2018-10-24 2021-01-08 维沃移动通信有限公司 Fingerprint unlocking method and terminal equipment
CN110852163A (en) * 2019-10-08 2020-02-28 云知声智能科技股份有限公司 Binding method and device
WO2022089599A1 (en) * 2020-10-29 2022-05-05 华为技术有限公司 Shared data distribution method and electronic devices

Similar Documents

Publication Publication Date Title
CN104992092A (en) Method, device and system for fingerprint information verification
CN104951682A (en) Privacy protection method and device
CN104992091A (en) Method and apparatus for accessing terminal end
CN104933556A (en) Mode setting method and apparatus
CN105100222A (en) Method and device for providing object retrieving information
CN106097494A (en) The method for unlocking of smart lock and device
CN105224195A (en) Terminal operation method and device
CN104008348A (en) Application program control method, application program control device and terminal
CN104933351A (en) Information security processing method and information security processing device
CN104468524A (en) Permission verification method and device
CN105450841A (en) Method and device of terminal guard against theft
CN104216742A (en) Upgrade control method and device based on password
CN105072079A (en) Account logon method, account logon device and terminal device
CN104615240A (en) Terminal unlocking method and device
CN105468767A (en) Method and device for acquiring calling card information
CN104601441A (en) Authority control method for group chat and instant messaging client
CN105677214A (en) Application management method and apparatus
CN105791309A (en) Method, device and system for executing business processing
CN105049963A (en) Terminal control method and device, and terminal
CN106204011A (en) NFC payment and device
CN104933555A (en) Mode setting method and apparatus
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN104331228A (en) Screen locking method and device
CN105407070A (en) Logging-in authorization method and device
CN104391712A (en) Shutdown method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151021