CN105809005A - Method for locking or unlocking computer screen based on fingerprints - Google Patents

Method for locking or unlocking computer screen based on fingerprints Download PDF

Info

Publication number
CN105809005A
CN105809005A CN201610190398.9A CN201610190398A CN105809005A CN 105809005 A CN105809005 A CN 105809005A CN 201610190398 A CN201610190398 A CN 201610190398A CN 105809005 A CN105809005 A CN 105809005A
Authority
CN
China
Prior art keywords
steps
fingerprint
user
screen
enter
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610190398.9A
Other languages
Chinese (zh)
Inventor
梁效宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Original Assignee
SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd filed Critical SICHUAN XLY INFORMATION SAFETY TECHNOLOGY Co Ltd
Priority to CN201610190398.9A priority Critical patent/CN105809005A/en
Publication of CN105809005A publication Critical patent/CN105809005A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a method for locking or unlocking a computer screen based on fingerprints. The method comprises the following steps of establishing a local server, extracting fingerprint information, obtaining user settings, establishing a cloud server and enabling screen to be locked or unlocked. The method for locking or unlocking the computer screen based on the fingerprints has the following advantages that the fingerprints serve as a key for locking or unlocking the screen of a personal computer, security is achieved, and the cost is low; multiple layers of secondary validation user protection and an emergency mode are added for providing a more secure and convenient unlocking technology and identity authentication method; an active system protection mode is adopted; according to a use scene, protection is set to be automatically hidden at the bottom layer which cannot be sensed by a user, and soundless protection is achieved.

Description

A kind of method based on Fingerprint Lock locking/unlocking computer screen
Technical field
The present invention relates to field of information security technology, particularly to a kind of method based on Fingerprint Lock locking/unlocking computer screen.
Background technology
Fingerprint (FingerPrint): refer to the recessed uneven streakline produced of finger tips positive surface skin epirelief of people.The regular arrangement of streakline forms different stricture of vagina types.The starting point of streakline, terminal, binding site and bifurcation, be called the details (minutiae) of fingerprint.Everyone fingerprint is different on pattern, breakpoint and cross point, is unique, and constant throughout one's life.
Fingerprint identification technology (FingerprintIdentificationTechnology): be read fingerprint image by imaging equipment, then the characteristic taken the fingerprint with computer identification software, it is identified result, to determine the biometrics identification technology of everyone identity of fingerprint finally by match cognization algorithm.Fingerprint identification technology relates generally to fingerprint image acquisition, fingerprint image process, feature extraction, data preserve, the comparison of eigenvalue with the process such as mate.
We are frequently encountered need situation away from keyboard when using PC.General user can be directly off, will not screen locking, now, be easiest to occur computer data stolen, destroyed, cause the privacy of individual or company and secret to reveal;Some user can use Windows or other related softwares and mode, lock-screen.But all there are the following problems for these:
Must manually input password or drafting unlocks pattern and could unlock screen, troublesome poeration.And if password and locking pattern are set to excessively simple, it is easy to be cracked;If being set to too complicated, not only remembering costly, being also easy to forget;
Only one layer of locking protection, it is impossible to the user meeting higher demand for security realizes safer data protection;
The apparatus bound such as bluetooth, IC-card is used to unlock, the situations such as the equipment of being frequently encountered leaves behind, loses, stolen.
Summary of the invention
The present invention is directed to the defect of prior art, it is provided that a kind of method based on Fingerprint Lock locking/unlocking computer screen, above-mentioned prior art Problems existing can be efficiently solved.
A kind of method based on Fingerprint Lock locking/unlocking computer screen, comprises the following steps:
101: set up local service end.Local service end includes: fingerprint identification module, memory module, authentication module, screen locking module, mouse-keyboard monitoring module, time monitoring module;
Described fingerprint identification module: by fingerprint Identification sensor, obtains fingerprint image, extracts fingerprint feature information by image procossing;
Memory module: encryption storage fingerprint feature information, the urgent password of user setup and safe email, user's binding the data such as third party's account information, and obtain cloud server terminal instruction when being necessary, revise relevant information;
Authentication module: obtain finger print information, compares with finger print information reserved in memory module, provides judged result;
Screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, send instruction;
102: take the fingerprint information, comprises the following steps:
1021: first pass through fingerprint collecting equipment and obtain the required image identifying fingerprint;
1022: the fingerprint image gathered is carried out following pretreatment: picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation, frequence estimation image binaryzation, image thinning;
1023: from pretreated image, obtain the crestal line data of fingerprint;
1024: from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction.
103: obtain information-setting by user, then encryption is stored in the memory module of local service end;
104: set up cloud server terminal.Cloud server terminal is used for encrypting in storage 103 steps, the safe email of user setup and user computer identifier information;
When cloud server terminal obtains the information that forgets Password that user side sends, it is judged that confirm user, in the safe email then set to this user, sending an envelope content is reset the mail of safety verification code needed for urgent password;Safety verification code obtains after being verified, and the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module deletes urgent password;
105: enable screen locking/unblock.
As preferably, information-setting by user described in 103 steps includes:
Urgent password: for cannot be carried out fingerprint be verified when, unlock screen;
Safe email: when for forgetting urgent password, obtains safety verification code by mailbox and unlocks screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows is without the free time of operation, and overtime will lock screen automatically;
Secondary verification password: the fingerprint recognition of the user setup of higher demand for security pass through after checking password;
Third party authorizes account: user, by binding other open third party's accounts, realizes third party's account mandate and unlocks.
As preferably, the detailed step of described step 105 is as follows:
201: during start, start screen locking;
202: read fingerprint, the required image identifying fingerprint is obtained by fingerprint collecting equipment, carry out pretreatment, obtain the crestal line data of fingerprint, then, from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction;
203: will read the finger print information collected in 202, the finger print information reserved with local service end memory module is compared checking;It is verified, enters 204 steps;Checking does not pass through, and enters 205 steps;
204: obtain user's configuration information before this, if it has, enter 213 steps;If it did not, enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, enter 206 steps;If unbound, enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;208 steps are entered after having inputted;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, and enters 204 steps;Do not pass through, enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;It is verified, enters 204 steps;Checking does not pass through, and enters 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to appointment mailbox corresponding to user computer identifier;211 steps are entered after completing;
211: whether the safety verification code of checking local service end subscriber input is true.It is verified, enters 204 steps;Checking does not pass through, and enters 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: whether the two-pass cipher of checking local service end subscriber input is true.It is verified, enters 212 steps;Checking does not pass through, and enters 201 steps;
215: judge user's whether manual locking computer screen.If it is, enter 216 steps;If it does not, enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;If there being operation, enter 218 steps;Without operation, enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if the mouse-keyboard silence period, length was not less than predetermined time period, enter 218 steps;If it does, enter 216 steps.
Compared with prior art it is an advantage of the current invention that:
1, using fingerprint as lock locking/unlocking personal computer screens key: when using for the first time, user's typing finger print information;During unblock, user has only to checking fingerprint, so that it may be unlocked the operation of screen;This is by ripe at present and that Costco Wholesale is cheap biometrics identification technology fingerprint identification technology.Owing to each fingerprint is different, even between ten fingers of same person, fingerprint is also clearly distinguished from, and the fingerprint of a people is unique, and remains unchanged throughout one's life.Therefore, fingerprint can user's identity authentication, and be absent from losing, situation about leaving behind.
2, the user's protection and the emergency mode that increase the checking of multilamellar secondary provide safer, unlocking technology and identity identifying method more easily: binding third party's account: use third party's account (such as wechat, microblogging, QQ) to authorize login to carry out secondary identity authentication.This method compensate for when fingerprint is replicated, the leak of computer security defence;And using third party's account (such as wechat, microblogging, QQ) to authorize login authentication, operation is same convenient.Urgent password/safe email is set: is conveniently destroyed or temporarily cannot use at fingerprint under special emergency such as (as finger injuries is wrapped up), also can unlock computer.
3, system actively protected mode is adopted.According to the scene used, protection setting is become automatically, be hidden in user's perception less than bottom, accomplish that protection is noiseless.
Accompanying drawing explanation
Fig. 1 is the main flow chart of the embodiment of the present invention;
Fig. 2 is the detail flowchart of step 105 in the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the present invention, technical scheme and advantage clearly understand, by the following examples, the present invention is described in further details.
As it is shown in figure 1, a kind of method based on Fingerprint Lock locking/unlocking computer screen, comprise the following steps:
101: setting up local service end, local service end includes: fingerprint identification module, memory module, authentication module, screen locking module, mouse-keyboard monitoring module, time monitoring module;
Wherein: fingerprint identification module: by fingerprint Identification sensor, obtain fingerprint image, extract fingerprint feature information by image procossing;
Memory module: encryption storage fingerprint feature information, the urgent password of user setup and safe email, user's binding the information such as third party's account, and obtain high in the clouds instruction when being necessary, revise relevant information;
Authentication module: obtain finger print information, compares with finger print information reserved in memory module, provides judged result;
Screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, send instruction.
102: take the fingerprint information, comprises the following steps:
1021: first pass through fingerprint collecting equipment and obtain the required image identifying fingerprint;
1022: the fingerprint image gathered is carried out following pretreatment: picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation, frequence estimation image binaryzation (gray value of pixel each in fingerprint image is set to 0 or 255), image thinning;
1023: from pretreated image, obtain the crestal line data of fingerprint;
1024: from the crestal line data of fingerprint, take the fingerprint and identify required characteristic point: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction.
103: obtain user setup, obtain information-setting by user, then encryption is stored in the memory module of local service end;
Described information-setting by user includes:
Urgent password: when for cannot be carried out fingerprint authentication, unlocks screen;
Safe email: when for forgetting urgent password, obtains safety verification code by mailbox and unlocks screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows, without the free time of operation, exceedes free time, will lock screen automatically;
Secondary verification password: the fingerprint recognition of the user setup of higher demand for security pass through after checking password;
Third party authorizes account: user, by binding other open third party's accounts (such as wechat, QQ, microblogging), realizes third party's account mandate and unlocks.
104: set up cloud server terminal, cloud server terminal is used for encrypting in storage 103 steps, the safe email of user setup and user computer identifier information;
When cloud server terminal obtains the information that forgets Password that user side sends, it is judged that confirm user, in the safe email then set to this user, sending an envelope content is reset the mail of safety verification code needed for urgent password;Safety verification code obtains after being verified, and the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module deletes urgent password;
105: enable screen locking/unblock.
As in figure 2 it is shown, the detailed step of described step 105 is as follows:
201: during start, start screen locking;
202: read fingerprint.The required image identifying fingerprint is obtained by fingerprint collecting equipment, carry out pretreatment, obtain the crestal line data of fingerprint, then, from the crestal line data of fingerprint, take the fingerprint and identify required characteristic point: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction;
203: checking.To read the finger print information collected in 202, the finger print information reserved with local service end memory module is compared checking;It is verified, enters 204 steps;Checking does not pass through, and enters 205 steps;
204: two-pass cipher judges.Obtain user's configuration information before this, if it has, enter 213 steps;If it did not, enter 212 steps;
205: whether bind third party's account, start local service end, carry out third party's account binding validatation;If binding, enter 206 steps;If unbound, enter 207 steps;
206: third party's account logs in, show relevant tripartite's Account Logon entrance (if barcode scanning then shows Quick Response Code, if account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame);208 steps are entered after completing;
207: urgent password unlocks, and shows urgent Password Input frame, enters 209 steps;
208: authority checking, by third party's account open platform, checking authorizes;Mandate is passed through, and enters 204 steps;Do not pass through, enter 207 steps;
209: urgent password authentification, start local service end authentication module, checking that the urgent password got is compared;It is verified, enters 204 steps;Checking does not pass through, and enters 210 steps;
210: safe email unlocks, obtain user computer identifier, by cloud server terminal, send safety verification code to appointment mailbox corresponding to user computer identifier;211 steps are entered after completing;
211: safety verification code is verified, whether the safety verification code of checking local service end subscriber input is true.It is verified, enters 204 steps;Checking does not pass through, and enters 201 steps;
212: unlock screen, local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain two-pass cipher, obtain the two-pass cipher of user's input, enter 214 steps;
214: two-pass cipher is verified, whether the two-pass cipher of checking local service end subscriber input is true.It is verified, enters 212 steps;Checking does not pass through, and enters 201 steps;
215: manual locking judges, it is judged that user's whether manual locking computer screen.If it is, enter 216 steps;If it does not, enter 217 steps;
216: lock-screen, start local service end screen locking module, lock-screen;
217: whether mouse-keyboard has operation judges, enable local service end mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;If there being operation, enter 218 steps;Without operation, enter 219 steps;
218: unlock screen, keep screen not lock-out state;
219: whether exceed and judge automatic locking time, enable local service end time monitoring module: if the mouse-keyboard silence period, length was not less than predetermined time period, enter 218 steps;If it does, enter 216 steps.
Those of ordinary skill in the art is it will be appreciated that embodiment described here is to aid in the implementation of the reader understanding present invention, it should be understood that protection scope of the present invention is not limited to such special statement and embodiment.Those of ordinary skill in the art can make various other various concrete deformation and combination without departing from essence of the present invention according to these technology disclosed by the invention enlightenment, and these deformation and combination remain in protection scope of the present invention.

Claims (3)

1. the method based on Fingerprint Lock locking/unlocking computer screen, it is characterised in that comprise the following steps:
101: set up local service end.Local service end includes: fingerprint identification module, memory module, authentication module, screen locking module, mouse-keyboard monitoring module, time monitoring module;
Described fingerprint identification module: by fingerprint Identification sensor, obtains fingerprint image, extracts fingerprint feature information by image procossing;
Memory module: encryption storage fingerprint feature information, the urgent password of user setup and safe email, user's binding the data such as third party's account information, and obtain cloud server terminal instruction when being necessary, revise relevant information;
Authentication module: obtain finger print information, compares with finger print information reserved in memory module, provides judged result;
Screen locking module: obtain window screen locking authority, sends screen locking, unlocks instruction;
Mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;
Time monitoring module: monitor the time after a certain instruction performs idle;Exceed predetermined time period, send instruction;
102: take the fingerprint information, comprises the following steps:
1021: first pass through fingerprint collecting equipment and obtain the required image identifying fingerprint;
1022: the fingerprint image gathered is carried out following pretreatment: picture quality judgement, image enhaucament, finger-print region detection, fingerprint orientation, frequence estimation image binaryzation, image thinning;
1023: from pretreated image, obtain the crestal line data of fingerprint;
1024: from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction.
103: obtain information-setting by user, then encryption is stored in the memory module of local service end;
104: set up cloud server terminal.Cloud server terminal is used for encrypting in storage 103 steps, the safe email of user setup and user computer identifier information;
When cloud server terminal obtains the information that forgets Password that user side sends, it is judged that confirm user, in the safe email then set to this user, sending an envelope content is reset the mail of safety verification code needed for urgent password;Safety verification code obtains after being verified, and the screen locking module of cloud server terminal notice local service end unlocks screen, and memory module deletes urgent password;
105: enable screen locking/unblock.
2. a kind of method based on Fingerprint Lock locking/unlocking computer screen according to claim 1, it is characterised in that information-setting by user described in 103 steps includes:
Urgent password: for cannot be carried out fingerprint be verified when, unlock screen;
Safe email: when for forgetting urgent password, obtains safety verification code by mailbox and unlocks screen, and reset urgent password;
Lock screen automatically the time: the mouse-keyboard that user allows is without the free time of operation, and overtime will lock screen automatically;
Secondary verification password: the fingerprint recognition of the user setup of higher demand for security pass through after checking password;
Third party authorizes account: user, by binding other open third party's accounts, realizes third party's account mandate and unlocks.
3. a kind of method based on Fingerprint Lock locking/unlocking computer screen according to claim 2, it is characterised in that the detailed step of described step 105 is as follows:
201: during start, start screen locking;
202: read fingerprint, the required image identifying fingerprint is obtained by fingerprint collecting equipment, carry out pretreatment, obtain the crestal line data of fingerprint, then, from the crestal line data of fingerprint, take the fingerprint and identify that required characteristic point includes: the parameters such as the starting point of streakline, terminal, binding site, bifurcation, isolated point, short bifurcated and the type of ring, coordinate, direction;
203: will read the finger print information collected in 202, the finger print information reserved with local service end memory module is compared checking;It is verified, enters 204 steps;Checking does not pass through, and enters 205 steps;
204: obtain user's configuration information before this, if it has, enter 213 steps;If it did not, enter 212 steps;
205: start local service end, carry out third party's account binding validatation;If binding, enter 206 steps;If unbound, enter 207 steps;
206: show interested third party account logentry, if barcode scanning then shows Quick Response Code, if account number cipher input logs in, then show user name Password Input frame and associated verification Password Input frame;208 steps are entered after having inputted;
207: show urgent Password Input frame, enter 209 steps;
208: by third party's account open platform, checking authorizes;Mandate is passed through, and enters 204 steps;Do not pass through, enter 207 steps;
209: start local service end authentication module, checking that the urgent password got is compared;It is verified, enters 204 steps;Checking does not pass through, and enters 210 steps;
210: obtain user computer identifier, by cloud server terminal, send safety verification code to appointment mailbox corresponding to user computer identifier;211 steps are entered after completing;
211: whether the safety verification code of checking local service end subscriber input is true, is verified, enters 204 steps;Checking does not pass through, and enters 201 steps;
212: local service end screen locking module obtains and unlocks instruction, unlocks screen;
213: obtain the two-pass cipher of user's input, enter 214 steps;
214: whether the two-pass cipher of checking local service end subscriber input is true, is verified, enters 212 steps;Checking does not pass through, and enters 201 steps;
215: judge user's whether manual locking computer screen, if it is, enter 216 steps;If it does not, enter 217 steps;
216: start local service end screen locking module, lock-screen;
217: enable local service end mouse-keyboard monitoring module: monitoring mouse-keyboard activity situation;If there being operation, enter 218 steps;Without operation, enter 219 steps;
218: keep screen not lock-out state;
219: enable local service end time monitoring module: if the mouse-keyboard silence period, length was not less than predetermined time period, enter 218 steps;If it does, enter 216 steps.
CN201610190398.9A 2016-03-29 2016-03-29 Method for locking or unlocking computer screen based on fingerprints Pending CN105809005A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610190398.9A CN105809005A (en) 2016-03-29 2016-03-29 Method for locking or unlocking computer screen based on fingerprints

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610190398.9A CN105809005A (en) 2016-03-29 2016-03-29 Method for locking or unlocking computer screen based on fingerprints

Publications (1)

Publication Number Publication Date
CN105809005A true CN105809005A (en) 2016-07-27

Family

ID=56455034

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610190398.9A Pending CN105809005A (en) 2016-03-29 2016-03-29 Method for locking or unlocking computer screen based on fingerprints

Country Status (1)

Country Link
CN (1) CN105809005A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106569586A (en) * 2016-11-11 2017-04-19 奇酷互联网络科技(深圳)有限公司 Terminal device and method and apparatus thereof for turning off screen
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106845181A (en) * 2017-01-17 2017-06-13 联想(北京)有限公司 The acquisition methods and electronic equipment of a kind of password
CN106886400A (en) * 2017-01-06 2017-06-23 山东华软金盾软件股份有限公司 A kind of windows system screens locking means
CN107145771A (en) * 2017-04-11 2017-09-08 北京小米移动软件有限公司 application program unlocking method, device and terminal
CN107578499A (en) * 2017-08-23 2018-01-12 合肥龙图腾信息技术有限公司 A kind of high security digital finger-print encryption tripper and method
CN108846272A (en) * 2018-07-13 2018-11-20 厦门美图移动科技有限公司 Using method for managing security, device and electronic equipment
CN108985024A (en) * 2017-06-04 2018-12-11 苹果公司 In response to attempting to access that the authentication techniques of sensitive information
CN110268406A (en) * 2017-02-09 2019-09-20 微软技术许可有限责任公司 Cipher safety

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719955A (en) * 2009-11-26 2010-06-02 中山大学 Intelligent terminal system with fingerprint identification and information processing method
US20150067827A1 (en) * 2013-08-29 2015-03-05 Pantech Co., Ltd. Apparatus and method for setting a user-defined pattern for an application
CN105260635A (en) * 2015-08-31 2016-01-20 宇龙计算机通信科技(深圳)有限公司 Identity verifying method and system based on fingerprint for mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719955A (en) * 2009-11-26 2010-06-02 中山大学 Intelligent terminal system with fingerprint identification and information processing method
US20150067827A1 (en) * 2013-08-29 2015-03-05 Pantech Co., Ltd. Apparatus and method for setting a user-defined pattern for an application
CN105260635A (en) * 2015-08-31 2016-01-20 宇龙计算机通信科技(深圳)有限公司 Identity verifying method and system based on fingerprint for mobile terminal

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
张国平: "《windows(98/2000/Me/NT/XP/2003)奇技赢巧大搜捕》", 31 March 2004 *
星光科技: "《笔记本电脑综合应用 高职高专》", 31 July 2008 *
邱士星: "基于Android手机的指纹识别技术研究", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
陈丹丹: "互联网通行证***的设计与实现", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106569586A (en) * 2016-11-11 2017-04-19 奇酷互联网络科技(深圳)有限公司 Terminal device and method and apparatus thereof for turning off screen
CN106886400A (en) * 2017-01-06 2017-06-23 山东华软金盾软件股份有限公司 A kind of windows system screens locking means
CN106845181A (en) * 2017-01-17 2017-06-13 联想(北京)有限公司 The acquisition methods and electronic equipment of a kind of password
CN110268406A (en) * 2017-02-09 2019-09-20 微软技术许可有限责任公司 Cipher safety
CN110268406B (en) * 2017-02-09 2023-06-16 微软技术许可有限责任公司 Password security
CN107145771A (en) * 2017-04-11 2017-09-08 北京小米移动软件有限公司 application program unlocking method, device and terminal
CN108985024A (en) * 2017-06-04 2018-12-11 苹果公司 In response to attempting to access that the authentication techniques of sensitive information
US11537699B2 (en) 2017-06-04 2022-12-27 Apple Inc. Authentication techniques in response to attempts to access sensitive information
CN107578499A (en) * 2017-08-23 2018-01-12 合肥龙图腾信息技术有限公司 A kind of high security digital finger-print encryption tripper and method
CN108846272A (en) * 2018-07-13 2018-11-20 厦门美图移动科技有限公司 Using method for managing security, device and electronic equipment

Similar Documents

Publication Publication Date Title
CN105809005A (en) Method for locking or unlocking computer screen based on fingerprints
US11431704B2 (en) Method of authentication, server and electronic identity device
WO2021021374A1 (en) Systems and methods of identification verification using hybrid near-field communication and optical authentication
CN111903104A (en) Method and system for performing user authentication
US10410040B2 (en) Fingerprint lock control method and fingerprint lock system
CN104834853B (en) A kind of personal identification method, device and information security type duplicator
CN106710032B (en) Entrance guard opening method and device
WO2018014322A1 (en) Residential intelligent door lock system and control method thereof
CN107733868A (en) Mobile terminal and fingerprint simultaneously close checking implementation method and storage medium
CN108038363A (en) Improve the method and device of Terminal security
CN106650361A (en) Unblocking method and device
CN107038509A (en) Self-service registration-management system
JP2007206816A (en) Admittance system
CN115758398A (en) Access control data processing method and device, access control system and storage medium
US20220114247A1 (en) Biometric Authenticated Content
WO2018006332A1 (en) Intelligent entrance guard management method and system based on mobile terminal
WO2018006318A1 (en) Method and system for using intelligent entrance guard on basis of mobile terminal
CN113627898A (en) Human resource website information management system and method
CN107516371B (en) Verification and identification method and hotel intelligent card system
JP4571426B2 (en) Authentication system
US8392721B2 (en) Method and system to electronically identify and verify an individual presenting himself for such identification and verification
CN110084947B (en) Access control information updating method and device
WO2018006349A1 (en) Method and system for verifying user entry based on picture password
WO2018006326A1 (en) Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password
CN105975841A (en) Method for locking/ unlocking computer screen on the basis of softdog

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160727