CN105809005A - Method for locking or unlocking computer screen based on fingerprints - Google Patents
Method for locking or unlocking computer screen based on fingerprints Download PDFInfo
- Publication number
- CN105809005A CN105809005A CN201610190398.9A CN201610190398A CN105809005A CN 105809005 A CN105809005 A CN 105809005A CN 201610190398 A CN201610190398 A CN 201610190398A CN 105809005 A CN105809005 A CN 105809005A
- Authority
- CN
- China
- Prior art keywords
- steps
- fingerprint
- user
- screen
- enter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/84—Protecting input, output or interconnection devices output devices, e.g. displays or monitors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
Abstract
The invention discloses a method for locking or unlocking a computer screen based on fingerprints. The method comprises the following steps of establishing a local server, extracting fingerprint information, obtaining user settings, establishing a cloud server and enabling screen to be locked or unlocked. The method for locking or unlocking the computer screen based on the fingerprints has the following advantages that the fingerprints serve as a key for locking or unlocking the screen of a personal computer, security is achieved, and the cost is low; multiple layers of secondary validation user protection and an emergency mode are added for providing a more secure and convenient unlocking technology and identity authentication method; an active system protection mode is adopted; according to a use scene, protection is set to be automatically hidden at the bottom layer which cannot be sensed by a user, and soundless protection is achieved.
Description
Technical field
The present invention relates to field of information security technology, particularly to a kind of method based on Fingerprint Lock locking/unlocking computer screen.
Background technology
Fingerprint (FingerPrint): refer to the recessed uneven streakline produced of finger tips positive surface skin epirelief of people.The regular arrangement of streakline forms different stricture of vagina types.The starting point of streakline, terminal, binding site and bifurcation, be called the details (minutiae) of fingerprint.Everyone fingerprint is different on pattern, breakpoint and cross point, is unique, and constant throughout one's life.
Fingerprint identification technology (FingerprintIdentificationTechnology): be read fingerprint image by imaging equipment, then the characteristic taken the fingerprint with computer identification software, it is identified result, to determine the biometrics identification technology of everyone identity of fingerprint finally by match cognization algorithm.Fingerprint identification technology relates generally to fingerprint image acquisition, fingerprint image process, feature extraction, data preserve, the comparison of eigenvalue with the process such as mate.
We are frequently encountered need situation away from keyboard when using PC.General user can be directly off, will not screen locking, now, be easiest to occur computer data stolen, destroyed, cause the privacy of individual or company and secret to reveal;Some user can use Windows or other related softwares and mode, lock-screen.But all there are the following problems for these:
Must manually input password or drafting unlocks pattern and could unlock screen, troublesome poeration.And if password and locking pattern are set to excessively simple, it is easy to be cracked;If being set to too complicated, not only remembering costly, being also easy to forget;
Only one layer of locking protection, it is impossible to the user meeting higher demand for security realizes safer data protection;
The apparatus bound such as bluetooth, IC-card is used to unlock, the situations such as the equipment of being frequently encountered leaves behind, loses, stolen.
Summary of the invention
The present invention is directed to the defect of prior art, it is provided that a kind of method based on Fingerprint Lock locking/unlocking computer screen, above-mentioned prior art Problems existing can be efficiently solved.
A kind of method based on Fingerprint Lock locking/unlocking computer screen, comprises the following steps:
101: set up local service end.Local service end includes: fingerprint identification module, memory module, authentication module, screen locking module, mouse-keyboard monitoring module, time monitoring module;
Described fingerprint identification module: by fingerprint Identification sensor, obtains fingerprint image, extracts fingerprint feature information by image procossing;
Memory module: encryption storage fingerprint feature information, the urgent password of user setup and safe email, user's binding the data such as third party's account information, and obtain cloud server terminal instruction when being necessary, revise relevant information;
Authentication module: obtain finger print information, compares with finger print information reserved in memory module, provides judged result;
Screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, send instruction;
102: take the fingerprint information, comprises the following steps:
1021: first pass through fingerprint collecting equipment and obtain the required image identifying fingerprint;
1022: the fingerprint image gathered is carried out following pretreatment: picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation, frequence estimation image binaryzation, image thinning;
1023: from pretreated image, obtain the crestal line data of fingerprint;
1024: from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction.
103: obtain information-setting by user, then encryption is stored in the memory module of local service end;
104: set up cloud server terminal.Cloud server terminal is used for encrypting in storage 103 steps, the safe email of user setup and user computer identifier information;
When cloud server terminal obtains the information that forgets Password that user side sends, it is judged that confirm user, in the safe email then set to this user, sending an envelope content is reset the mail of safety verification code needed for urgent password;Safety verification code obtains after being verified, and the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module deletes urgent password;
105: enable screen locking/unblock.
As preferably, information-setting by user described in 103 steps includes:
Urgent password: for cannot be carried out fingerprint be verified when, unlock screen;
Safe email: when for forgetting urgent password, obtains safety verification code by mailbox and unlocks screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows is without the free time of operation, and overtime will lock screen automatically;
Secondary verification password: the fingerprint recognition of the user setup of higher demand for security pass through after checking password;
Third party authorizes account: user, by binding other open third party's accounts, realizes third party's account mandate and unlocks.
As preferably, the detailed step of described step 105 is as follows:
201: during start, start screen locking;
202: read fingerprint, the required image identifying fingerprint is obtained by fingerprint collecting equipment, carry out pretreatment, obtain the crestal line data of fingerprint, then, from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction;
203: will read the finger print information collected in 202, the finger print information reserved with local service end memory module is compared checking;It is verified, enters 204 steps;Checking does not pass through, and enters 205 steps;
204: obtain user's configuration information before this, if it has, enter 213 steps;If it did not, enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, enter 206 steps;If unbound, enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;208 steps are entered after having inputted;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, and enters 204 steps;Do not pass through, enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;It is verified, enters 204 steps;Checking does not pass through, and enters 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to appointment mailbox corresponding to user computer identifier;211 steps are entered after completing;
211: whether the safety verification code of checking local service end subscriber input is true.It is verified, enters 204 steps;Checking does not pass through, and enters 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: whether the two-pass cipher of checking local service end subscriber input is true.It is verified, enters 212 steps;Checking does not pass through, and enters 201 steps;
215: judge user's whether manual locking computer screen.If it is, enter 216 steps;If it does not, enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;If there being operation, enter 218 steps;Without operation, enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if the mouse-keyboard silence period, length was not less than predetermined time period, enter 218 steps;If it does, enter 216 steps.
Compared with prior art it is an advantage of the current invention that:
1, using fingerprint as lock locking/unlocking personal computer screens key: when using for the first time, user's typing finger print information;During unblock, user has only to checking fingerprint, so that it may be unlocked the operation of screen;This is by ripe at present and that Costco Wholesale is cheap biometrics identification technology fingerprint identification technology.Owing to each fingerprint is different, even between ten fingers of same person, fingerprint is also clearly distinguished from, and the fingerprint of a people is unique, and remains unchanged throughout one's life.Therefore, fingerprint can user's identity authentication, and be absent from losing, situation about leaving behind.
2, the user's protection and the emergency mode that increase the checking of multilamellar secondary provide safer, unlocking technology and identity identifying method more easily: binding third party's account: use third party's account (such as wechat, microblogging, QQ) to authorize login to carry out secondary identity authentication.This method compensate for when fingerprint is replicated, the leak of computer security defence;And using third party's account (such as wechat, microblogging, QQ) to authorize login authentication, operation is same convenient.Urgent password/safe email is set: is conveniently destroyed or temporarily cannot use at fingerprint under special emergency such as (as finger injuries is wrapped up), also can unlock computer.
3, system actively protected mode is adopted.According to the scene used, protection setting is become automatically, be hidden in user's perception less than bottom, accomplish that protection is noiseless.
Accompanying drawing explanation
Fig. 1 is the main flow chart of the embodiment of the present invention;
Fig. 2 is the detail flowchart of step 105 in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearly understand, by the following examples, the present invention is described in further details.
As it is shown in figure 1, a kind of method based on Fingerprint Lock locking/unlocking computer screen, comprise the following steps:
101: setting up local service end, local service end includes: fingerprint identification module, memory module, authentication module, screen locking module, mouse-keyboard monitoring module, time monitoring module;
Wherein: fingerprint identification module: by fingerprint Identification sensor, obtain fingerprint image, extract fingerprint feature information by image procossing;
Memory module: encryption storage fingerprint feature information, the urgent password of user setup and safe email, user's binding the information such as third party's account, and obtain high in the clouds instruction when being necessary, revise relevant information;
Authentication module: obtain finger print information, compares with finger print information reserved in memory module, provides judged result;
Screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, send instruction.
102: take the fingerprint information, comprises the following steps:
1021: first pass through fingerprint collecting equipment and obtain the required image identifying fingerprint;
1022: the fingerprint image gathered is carried out following pretreatment: picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation, frequence estimation image binaryzation (gray value of pixel each in fingerprint image is set to 0 or 255), image thinning;
1023: from pretreated image, obtain the crestal line data of fingerprint;
1024: from the crestal line data of fingerprint, take the fingerprint and identify required characteristic point: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction.
103: obtain user setup, obtain information-setting by user, then encryption is stored in the memory module of local service end;
Described information-setting by user includes:
Urgent password: when for cannot be carried out fingerprint authentication, unlocks screen;
Safe email: when for forgetting urgent password, obtains safety verification code by mailbox and unlocks screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows, without the free time of operation, exceedes free time, will lock screen automatically;
Secondary verification password: the fingerprint recognition of the user setup of higher demand for security pass through after checking password;
Third party authorizes account: user, by binding other open third party's accounts (such as wechat, QQ, microblogging), realizes third party's account mandate and unlocks.
104: set up cloud server terminal, cloud server terminal is used for encrypting in storage 103 steps, the safe email of user setup and user computer identifier information;
When cloud server terminal obtains the information that forgets Password that user side sends, it is judged that confirm user, in the safe email then set to this user, sending an envelope content is reset the mail of safety verification code needed for urgent password;Safety verification code obtains after being verified, and the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module deletes urgent password;
105: enable screen locking/unblock.
As in figure 2 it is shown, the detailed step of described step 105 is as follows:
201: during start, start screen locking;
202: read fingerprint.The required image identifying fingerprint is obtained by fingerprint collecting equipment, carry out pretreatment, obtain the crestal line data of fingerprint, then, from the crestal line data of fingerprint, take the fingerprint and identify required characteristic point: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction;
203: checking.To read the finger print information collected in 202, the finger print information reserved with local service end memory module is compared checking;It is verified, enters 204 steps;Checking does not pass through, and enters 205 steps;
204: two-pass cipher judges.Obtain user's configuration information before this, if it has, enter 213 steps;If it did not, enter 212 steps;
205: whether bind third party's account, start local service end, carry out third party's account binding validatation;If binding, enter 206 steps;If unbound, enter 207 steps;
206: third party's account logs in, show relevant tripartite's Account Logon entrance (if barcode scanning then shows Quick Response Code, if account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame);208 steps are entered after completing;
207: urgent password unlocks, and shows urgent Password Input frame, enters 209 steps;
208: authority checking, by third party's account open platform, checking authorizes;Mandate is passed through, and enters 204 steps;Do not pass through, enter 207 steps;
209: urgent password authentification, start local service end authentication module, checking that the urgent password got is compared;It is verified, enters 204 steps;Checking does not pass through, and enters 210 steps;
210: safe email unlocks, obtain user computer identifier, by cloud server terminal, send safety verification code to appointment mailbox corresponding to user computer identifier;211 steps are entered after completing;
211: safety verification code is verified, whether the safety verification code of checking local service end subscriber input is true.It is verified, enters 204 steps;Checking does not pass through, and enters 201 steps;
212: unlock screen, local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain two-pass cipher, obtain the two-pass cipher of user's input, enter 214 steps;
214: two-pass cipher is verified, whether the two-pass cipher of checking local service end subscriber input is true.It is verified, enters 212 steps;Checking does not pass through, and enters 201 steps;
215: manual locking judges, it is judged that user's whether manual locking computer screen.If it is, enter 216 steps;If it does not, enter 217 steps;
216: lock-screen, start local service end screen locking module, lock-screen;
217: whether mouse-keyboard has operation judges, enable local service end mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;If there being operation, enter 218 steps;Without operation, enter 219 steps;
218: unlock screen, keep screen not lock-out state;
219: whether exceed and judge automatic locking time, enable local service end time monitoring module: if the mouse-keyboard silence period, length was not less than predetermined time period, enter 218 steps;If it does, enter 216 steps.
Those of ordinary skill in the art is it will be appreciated that embodiment described here is to aid in the implementation of the reader understanding present invention, it should be understood that protection scope of the present invention is not limited to such special statement and embodiment.Those of ordinary skill in the art can make various other various concrete deformation and combination without departing from essence of the present invention according to these technology disclosed by the invention enlightenment, and these deformation and combination remain in protection scope of the present invention.
Claims (3)
1. the method based on Fingerprint Lock locking/unlocking computer screen, it is characterised in that comprise the following steps:
101: set up local service end.Local service end includes: fingerprint identification module, memory module, authentication module, screen locking module, mouse-keyboard monitoring module, time monitoring module;
Described fingerprint identification module: by fingerprint Identification sensor, obtains fingerprint image, extracts fingerprint feature information by image procossing;
Memory module: encryption storage fingerprint feature information, the urgent password of user setup and safe email, user's binding the data such as third party's account information, and obtain cloud server terminal instruction when being necessary, revise relevant information;
Authentication module: obtain finger print information, compares with finger print information reserved in memory module, provides judged result;
Screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, send instruction;
102: take the fingerprint information, comprises the following steps:
1021: first pass through fingerprint collecting equipment and obtain the required image identifying fingerprint;
1022: the fingerprint image gathered is carried out following pretreatment: picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation, frequence estimation image binaryzation, image thinning;
1023: from pretreated image, obtain the crestal line data of fingerprint;
1024: from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction.
103: obtain information-setting by user, then encryption is stored in the memory module of local service end;
104: set up cloud server terminal.Cloud server terminal is used for encrypting in storage 103 steps, the safe email of user setup and user computer identifier information;
When cloud server terminal obtains the information that forgets Password that user side sends, it is judged that confirm user, in the safe email then set to this user, sending an envelope content is reset the mail of safety verification code needed for urgent password;Safety verification code obtains after being verified, and the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module deletes urgent password;
105: enable screen locking/unblock.
2. a kind of method based on Fingerprint Lock locking/unlocking computer screen according to claim 1, it is characterised in that information-setting by user described in 103 steps includes:
Urgent password: for cannot be carried out fingerprint be verified when, unlock screen;
Safe email: when for forgetting urgent password, obtains safety verification code by mailbox and unlocks screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows is without the free time of operation, and overtime will lock screen automatically;
Secondary verification password: the fingerprint recognition of the user setup of higher demand for security pass through after checking password;
Third party authorizes account: user, by binding other open third party's accounts, realizes third party's account mandate and unlocks.
3. a kind of method based on Fingerprint Lock locking/unlocking computer screen according to claim 2, it is characterised in that the detailed step of described step 105 is as follows:
201: during start, start screen locking;
202: read fingerprint, the required image identifying fingerprint is obtained by fingerprint collecting equipment, carry out pretreatment, obtain the crestal line data of fingerprint, then, from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction;
203: will read the finger print information collected in 202, the finger print information reserved with local service end memory module is compared checking;It is verified, enters 204 steps;Checking does not pass through, and enters 205 steps;
204: obtain user's configuration information before this, if it has, enter 213 steps;If it did not, enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, enter 206 steps;If unbound, enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;208 steps are entered after having inputted;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, and enters 204 steps;Do not pass through, enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;It is verified, enters 204 steps;Checking does not pass through, and enters 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to appointment mailbox corresponding to user computer identifier;211 steps are entered after completing;
211: whether the safety verification code of checking local service end subscriber input is true, is verified, enters 204 steps;Checking does not pass through, and enters 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: whether the two-pass cipher of checking local service end subscriber input is true, is verified, enters 212 steps;Checking does not pass through, and enters 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not, enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;If there being operation, enter 218 steps;Without operation, enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if the mouse-keyboard silence period, length was not less than predetermined time period, enter 218 steps;If it does, enter 216 steps.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610190398.9A CN105809005A (en) | 2016-03-29 | 2016-03-29 | Method for locking or unlocking computer screen based on fingerprints |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610190398.9A CN105809005A (en) | 2016-03-29 | 2016-03-29 | Method for locking or unlocking computer screen based on fingerprints |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105809005A true CN105809005A (en) | 2016-07-27 |
Family
ID=56455034
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610190398.9A Pending CN105809005A (en) | 2016-03-29 | 2016-03-29 | Method for locking or unlocking computer screen based on fingerprints |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105809005A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106569586A (en) * | 2016-11-11 | 2017-04-19 | 奇酷互联网络科技(深圳)有限公司 | Terminal device and method and apparatus thereof for turning off screen |
CN106716429A (en) * | 2016-08-31 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Monitoring method and device, and electronic equipment |
CN106845181A (en) * | 2017-01-17 | 2017-06-13 | 联想(北京)有限公司 | The acquisition methods and electronic equipment of a kind of password |
CN106886400A (en) * | 2017-01-06 | 2017-06-23 | 山东华软金盾软件股份有限公司 | A kind of windows system screens locking means |
CN107145771A (en) * | 2017-04-11 | 2017-09-08 | 北京小米移动软件有限公司 | application program unlocking method, device and terminal |
CN107578499A (en) * | 2017-08-23 | 2018-01-12 | 合肥龙图腾信息技术有限公司 | A kind of high security digital finger-print encryption tripper and method |
CN108846272A (en) * | 2018-07-13 | 2018-11-20 | 厦门美图移动科技有限公司 | Using method for managing security, device and electronic equipment |
CN108985024A (en) * | 2017-06-04 | 2018-12-11 | 苹果公司 | In response to attempting to access that the authentication techniques of sensitive information |
CN110268406A (en) * | 2017-02-09 | 2019-09-20 | 微软技术许可有限责任公司 | Cipher safety |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
US20150067827A1 (en) * | 2013-08-29 | 2015-03-05 | Pantech Co., Ltd. | Apparatus and method for setting a user-defined pattern for an application |
CN105260635A (en) * | 2015-08-31 | 2016-01-20 | 宇龙计算机通信科技(深圳)有限公司 | Identity verifying method and system based on fingerprint for mobile terminal |
-
2016
- 2016-03-29 CN CN201610190398.9A patent/CN105809005A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719955A (en) * | 2009-11-26 | 2010-06-02 | 中山大学 | Intelligent terminal system with fingerprint identification and information processing method |
US20150067827A1 (en) * | 2013-08-29 | 2015-03-05 | Pantech Co., Ltd. | Apparatus and method for setting a user-defined pattern for an application |
CN105260635A (en) * | 2015-08-31 | 2016-01-20 | 宇龙计算机通信科技(深圳)有限公司 | Identity verifying method and system based on fingerprint for mobile terminal |
Non-Patent Citations (4)
Title |
---|
张国平: "《windows(98/2000/Me/NT/XP/2003)奇技赢巧大搜捕》", 31 March 2004 * |
星光科技: "《笔记本电脑综合应用 高职高专》", 31 July 2008 * |
邱士星: "基于Android手机的指纹识别技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
陈丹丹: "互联网通行证***的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106716429A (en) * | 2016-08-31 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Monitoring method and device, and electronic equipment |
CN106569586A (en) * | 2016-11-11 | 2017-04-19 | 奇酷互联网络科技(深圳)有限公司 | Terminal device and method and apparatus thereof for turning off screen |
CN106886400A (en) * | 2017-01-06 | 2017-06-23 | 山东华软金盾软件股份有限公司 | A kind of windows system screens locking means |
CN106845181A (en) * | 2017-01-17 | 2017-06-13 | 联想(北京)有限公司 | The acquisition methods and electronic equipment of a kind of password |
CN110268406A (en) * | 2017-02-09 | 2019-09-20 | 微软技术许可有限责任公司 | Cipher safety |
CN110268406B (en) * | 2017-02-09 | 2023-06-16 | 微软技术许可有限责任公司 | Password security |
CN107145771A (en) * | 2017-04-11 | 2017-09-08 | 北京小米移动软件有限公司 | application program unlocking method, device and terminal |
CN108985024A (en) * | 2017-06-04 | 2018-12-11 | 苹果公司 | In response to attempting to access that the authentication techniques of sensitive information |
US11537699B2 (en) | 2017-06-04 | 2022-12-27 | Apple Inc. | Authentication techniques in response to attempts to access sensitive information |
CN107578499A (en) * | 2017-08-23 | 2018-01-12 | 合肥龙图腾信息技术有限公司 | A kind of high security digital finger-print encryption tripper and method |
CN108846272A (en) * | 2018-07-13 | 2018-11-20 | 厦门美图移动科技有限公司 | Using method for managing security, device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105809005A (en) | Method for locking or unlocking computer screen based on fingerprints | |
US11431704B2 (en) | Method of authentication, server and electronic identity device | |
WO2021021374A1 (en) | Systems and methods of identification verification using hybrid near-field communication and optical authentication | |
CN111903104A (en) | Method and system for performing user authentication | |
US10410040B2 (en) | Fingerprint lock control method and fingerprint lock system | |
CN104834853B (en) | A kind of personal identification method, device and information security type duplicator | |
CN106710032B (en) | Entrance guard opening method and device | |
WO2018014322A1 (en) | Residential intelligent door lock system and control method thereof | |
CN107733868A (en) | Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium | |
CN108038363A (en) | Improve the method and device of Terminal security | |
CN106650361A (en) | Unblocking method and device | |
CN107038509A (en) | Self-service registration-management system | |
JP2007206816A (en) | Admittance system | |
CN115758398A (en) | Access control data processing method and device, access control system and storage medium | |
US20220114247A1 (en) | Biometric Authenticated Content | |
WO2018006332A1 (en) | Intelligent entrance guard management method and system based on mobile terminal | |
WO2018006318A1 (en) | Method and system for using intelligent entrance guard on basis of mobile terminal | |
CN113627898A (en) | Human resource website information management system and method | |
CN107516371B (en) | Verification and identification method and hotel intelligent card system | |
JP4571426B2 (en) | Authentication system | |
US8392721B2 (en) | Method and system to electronically identify and verify an individual presenting himself for such identification and verification | |
CN110084947B (en) | Access control information updating method and device | |
WO2018006349A1 (en) | Method and system for verifying user entry based on picture password | |
WO2018006326A1 (en) | Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password | |
CN105975841A (en) | Method for locking/ unlocking computer screen on the basis of softdog |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160727 |