CN107767509B - Authorization method, server, authorization system and storage medium - Google Patents

Authorization method, server, authorization system and storage medium Download PDF

Info

Publication number
CN107767509B
CN107767509B CN201710963528.2A CN201710963528A CN107767509B CN 107767509 B CN107767509 B CN 107767509B CN 201710963528 A CN201710963528 A CN 201710963528A CN 107767509 B CN107767509 B CN 107767509B
Authority
CN
China
Prior art keywords
verified
information
fingerprint
character
fingerprint information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710963528.2A
Other languages
Chinese (zh)
Other versions
CN107767509A (en
Inventor
何锐
肖新华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Youbo Life Technology Co.,Ltd.
Original Assignee
Shenzhen Youdian Zhilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Youdian Zhilian Technology Co ltd filed Critical Shenzhen Youdian Zhilian Technology Co ltd
Priority to CN201710963528.2A priority Critical patent/CN107767509B/en
Publication of CN107767509A publication Critical patent/CN107767509A/en
Application granted granted Critical
Publication of CN107767509B publication Critical patent/CN107767509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an authorization method, which comprises the following steps: receiving an authorization request sent by a device terminal, and acquiring a server fingerprint verification waiting time and a character verification waiting time; if the time difference between the fingerprint verification waiting time and the character verification waiting time is smaller than or equal to a preset value, sequentially verifying fingerprint information to be verified and character information to be verified of a user corresponding to the authorization request, and if the fingerprint information to be verified and the character information to be verified both pass the verification, authorizing the user corresponding to the authorization request; if the time difference between the fingerprint verification waiting time and the character verification waiting time is larger than a preset value, sequentially verifying the to-be-verified character information and the to-be-verified fingerprint information of the user corresponding to the authorization request, and if the to-be-verified fingerprint information and the to-be-verified character information are verified, authorizing the user corresponding to the authorization request. The invention also discloses a server, an authorization system and a storage medium. The invention saves the verification time and improves the verification efficiency.

Description

Authorization method, server, authorization system and storage medium
Technical Field
The present invention relates to the field of security technologies, and in particular, to an authorization method, a server, an authorization system, and a storage medium.
Background
Before a device terminal such as a shared bicycle, a shared automobile, a shared washing machine, etc. is normally used, it is often necessary to obtain a usage authorization of the device terminal. With the development of the technology of the internet of things, the use safety of the internet of things equipment becomes a key research direction in the field.
In authorization of use of device terminals such as a shared bicycle, a shared automobile, and the like, character authentication and fingerprint authentication are two common security authentication methods. The problems of verifying whether a user can be authorized only by a character password include: the character code is designed to be too simple and easy to be cracked, but the character code is too long and is not convenient to be memorized. And only using fingerprint authentication, there are problems including: the fingerprint identification has a certain false recognition rate, and when the fingerprint identification base number is too large, the fingerprint identification speed is very slow, the situation that the user needs to queue for authorization verification may occur, at the moment, the user can only queue slowly, and the speed of obtaining authorization is too slow.
Disclosure of Invention
The invention mainly aims to provide an authorization method, aiming at solving the technical problem that when the fingerprint identification base number is too large, a user needs to wait in line for authorization to verify a fingerprint, and the speed of obtaining authorization is too slow.
To achieve the above object, the present invention provides an authorization method, including:
receiving an authorization request sent by a device terminal, and acquiring a server fingerprint verification waiting time and a character verification waiting time;
if the time difference between the fingerprint verification waiting time and the character verification waiting time is smaller than or equal to a preset value, sequentially verifying fingerprint information to be verified and character information to be verified of a user corresponding to the authorization request, and if the fingerprint information to be verified and the character information to be verified both pass the verification, authorizing the user corresponding to the authorization request;
if the time difference between the fingerprint verification waiting time and the character verification waiting time is larger than a preset value, sequentially verifying the to-be-verified character information and the to-be-verified fingerprint information of the user corresponding to the authorization request, and if the to-be-verified fingerprint information and the to-be-verified character information are verified, authorizing the user corresponding to the authorization request.
Optionally, the step of obtaining the authorization corresponding to the user in the authorization request includes:
and sending an unlocking instruction to the equipment terminal.
Optionally, the step of sequentially verifying the fingerprint information to be verified and the character information to be verified of the user corresponding to the authorization request includes:
acquiring fingerprint information to be verified of a user corresponding to the authorization request;
judging whether target fingerprint information matched with the fingerprint information to be checked exists in the stored fingerprint information or not according to the stored fingerprint information in the server;
if the target fingerprint information exists, acquiring verification character information corresponding to the target fingerprint information;
acquiring character information to be checked of a user corresponding to an authorization request, and judging whether target character information matched with the character information to be checked exists in the verification character information or not;
and if the target character information exists, the fingerprint information to be verified and the character information to be verified are verified.
Optionally, the step of sequentially verifying the to-be-verified character information and the to-be-verified fingerprint information of the user corresponding to the authorization request includes:
acquiring character information to be checked of a user corresponding to the authorization request;
judging whether target character information matched with the character information to be checked exists in the stored character information or not according to the stored character information of the server;
if the target character information exists, acquiring verification fingerprint information corresponding to the target character information;
acquiring fingerprint information to be verified of a user corresponding to an authorization request, and judging whether target fingerprint information matched with the fingerprint information to be verified exists in the verification fingerprint information or not;
and if the target fingerprint information exists, the character information to be verified and the fingerprint information to be verified are verified.
Optionally, the step of determining whether there is target fingerprint information matching the to-be-verified fingerprint information in the stored fingerprint information according to stored fingerprint information in the server includes:
acquiring the equipment identifier of the equipment terminal according to the authorization request, and acquiring stored fingerprint information corresponding to the equipment identifier from a server;
and judging whether the stored fingerprint information contains target fingerprint information matched with the fingerprint information to be verified.
Optionally, the step of obtaining the fingerprint information to be verified of the user corresponding to the authorization request further includes:
and sending a prompt message of inputting the fingerprint information to the equipment terminal, and executing the step of acquiring the fingerprint information to be verified of the user corresponding to the authorization request.
In addition, to achieve the above object, the present invention also provides a server, including: the authorization system comprises a processor module, a storage module and an authorization program stored on the storage module, wherein the authorization program realizes the steps of the authorization method when being executed by the processor module.
In order to achieve the above object, the present invention further provides an authorization system, including: a device terminal and a server as described above.
The device terminal includes:
the system comprises a processing module, a fingerprint acquisition module, an interaction module, a communication module and a lock module;
the fingerprint acquisition module is used for acquiring user fingerprint information;
the interaction module is used for feeding back the authorization state and the abnormal condition of the user operation;
and the communication module is used for communication between the equipment terminal and the server.
To achieve the above object, the present invention further provides a storage medium having an authorization program stored thereon, wherein the authorization program, when executed by a processor, implements the steps of the authorization method as described above.
According to the authorization method provided by the embodiment of the invention, after an authorization request sent by a receiving equipment terminal is received, the fingerprint verification waiting time and the character verification waiting time of a server are obtained, the fingerprint verification waiting time and the character verification waiting time are compared, if the time difference between the fingerprint verification waiting time and the character verification waiting time is less than or equal to a preset value, namely the fingerprint verification waiting time is less than the character verification waiting time, and the time difference is less than or equal to the preset value, so that under the condition that the waiting times are the same, fingerprint verification is preferentially carried out, the input of a fingerprint is quicker, the input of a character is more complicated and slower, if the fingerprint verification fails, the character verification can be directly not carried out, the input of the character is directly omitted, and the time cost of a user; if the time difference between the fingerprint verification waiting time and the character verification waiting time is greater than the preset value, namely the fingerprint verification waiting time is greater than the character verification waiting time, and the time difference is greater than the preset value, character verification is preferentially carried out, character verification does not need to be waited for after the fingerprint verification is finished, namely when the fingerprint identification base number is too large, a user can firstly carry out character verification and then carry out fingerprint verification, character verification does not need to be carried out after the fingerprint verification, running resources and time resources can be reasonably scheduled, verification time is saved, verification efficiency and authorization efficiency are improved, and user experience is further improved.
Drawings
FIG. 1 is a schematic diagram of a server component module implementing an embodiment of the invention;
FIG. 2 is a schematic diagram of an authorization system implementing the solution of the embodiment;
fig. 3 is a schematic diagram of the constituent modules of the device terminal according to the present embodiment;
FIG. 4 is a flowchart illustrating a first embodiment of an authorization method according to the present invention;
FIG. 5 is a flowchart illustrating an authorization method according to an embodiment of the present invention;
FIG. 6 is a flowchart illustrating an authorization method according to another embodiment of the present invention;
fig. 7 is a schematic flow chart of an authorization method according to a third embodiment of the present invention;
fig. 8 is a flowchart illustrating an authorization method according to a third embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
As shown in fig. 1, fig. 1 is a schematic diagram of a server component module for implementing the solution of the embodiment of the present invention.
The server is used for monitoring the on-off state of the equipment terminal, managing a user account, storing the fingerprint information and the character password information, associating the fingerprint information and the character password information with the account, and carrying out authorization judgment on an authorization request initiated by the equipment terminal. The server comprises the following modules:
a wireless communication module 1001, a processor module 1002, and a storage module 1003. The wireless communication module 1001 is used to implement communication between the server and the user terminal and the device terminal. The storage module 1003 is used for storing an authorization program, and the processor module 1002 is used for calling the authorization program 1004 stored in the storage module 1003 to execute the following operations:
receiving an authorization request sent by a device terminal, and acquiring a server fingerprint verification waiting time and a character verification waiting time;
if the time difference between the fingerprint verification waiting time and the character verification waiting time is smaller than or equal to a preset value, sequentially verifying fingerprint information to be verified and character information to be verified of a user corresponding to the authorization request, and if the fingerprint information to be verified and the character information to be verified both pass the verification, authorizing the user corresponding to the authorization request;
if the time difference between the fingerprint verification waiting time and the character verification waiting time is larger than a preset value, sequentially verifying the to-be-verified character information and the to-be-verified fingerprint information of the user corresponding to the authorization request, and if the to-be-verified fingerprint information and the to-be-verified character information are verified, authorizing the user corresponding to the authorization request.
Further, the processor module 1002 may call the authorization program stored in the storage module 1005, and also perform the following operations:
the step of obtaining the authorization corresponding to the user in the authorization request comprises the following steps:
and sending an unlocking instruction to the equipment terminal.
The step of sequentially verifying the fingerprint information to be verified and the character information to be verified of the user corresponding to the authorization request comprises the following steps:
acquiring fingerprint information to be verified of a user corresponding to the authorization request;
judging whether target fingerprint information matched with the fingerprint information to be checked exists in the stored fingerprint information or not according to the stored fingerprint information in the server;
if the target fingerprint information exists, acquiring verification character information corresponding to the target fingerprint information;
acquiring character information to be checked of a user corresponding to an authorization request, and judging whether target character information matched with the character information to be checked exists in the verification character information or not;
and if the target character information exists, the fingerprint information to be verified and the character information to be verified are verified.
The step of sequentially verifying the character information to be verified and the fingerprint information to be verified of the user corresponding to the authorization request comprises the following steps:
acquiring character information to be checked of a user corresponding to the authorization request;
judging whether target character information matched with the character information to be checked exists in the stored character information or not according to the stored character information of the server;
if the target character information exists, acquiring verification fingerprint information corresponding to the target character information;
acquiring fingerprint information to be verified of a user corresponding to an authorization request, and judging whether target fingerprint information matched with the fingerprint information to be verified exists in the verification fingerprint information or not;
and if the target fingerprint information exists, the character information to be verified and the fingerprint information to be verified are verified.
The step of judging whether the stored fingerprint information has the target fingerprint information matched with the fingerprint information to be verified or not according to the stored fingerprint information in the server comprises the following steps:
acquiring the equipment identifier of the equipment terminal according to the authorization request, and acquiring stored fingerprint information corresponding to the equipment identifier from a server;
and judging whether the stored fingerprint information contains target fingerprint information matched with the fingerprint information to be verified.
Further, the processor module 1002 may call the authorization program stored in the storage module 1005, and also perform the following operations:
the step of obtaining the fingerprint information to be verified of the user corresponding to the authorization request further comprises the following steps:
and sending a prompt message of inputting the fingerprint information to the equipment terminal, and executing the step of acquiring the fingerprint information to be verified of the user corresponding to the authorization request.
As shown in fig. 2, fig. 2 is a schematic diagram of an authorization system implementing the scheme of the embodiment.
The authorization system comprises: a device terminal 101 and a server 100 as shown in fig. 1.
As shown in fig. 3, the device terminal 101 includes:
a processing module 2001, a fingerprint acquisition module 2002, an interaction module 2003, a communication module 2004 and a lock module 2005;
the processing module 2001 may be composed of a processor or a main control circuit, and mainly performs logic judgment, resource scheduling, instruction issuing unlocking, locking and the like of the whole system;
the fingerprint obtaining module 2002 is configured to obtain user fingerprint information;
the interaction module 2003 is used for providing a man-machine interaction interface, such as a buzzer, a display screen, an LED and the like, and feeding back the authorization state, abnormality and other conditions of the user operation;
the communication module 2004 is used for communication between the device terminal and the server, and may be a 2G module, a 3G module, a 4G, WiFi module, a bluetooth module, an NB-iot module, and the like, and is mainly used for reporting and downloading data, including fingerprint information, user information, state information, and the like;
the lock module 2005 may be a mechanical lock or a digital lock, or a device terminal cannot be used in a locked state.
In particular, the device terminal may be implemented in various forms. For example, mobile phones, tablet computers, notebook computers, palmtop computers, Personal Digital Assistants (PDAs), Portable Media Players (PMPs), auto-driven cars, various types of shared device locks (such as a shared bicycle, a shared washing machine, and the like), various types of home or office door locks, locker locks, and the like, and devices such as Digital TVs, desktop computers, internet of things (such as smart homes including an intelligent air conditioner with a networking function, an intelligent electric lamp, and an intelligent power supply), and the like.
It will be understood by those skilled in the art that the server component modules shown in fig. 1 do not constitute a limitation of the server, the device terminal component diagram shown in fig. 2 does not constitute a limitation of the device terminal, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components.
Referring to fig. 2, in a first embodiment of the authorization method of the present invention, the authorization method includes:
step S10, receiving an authorization request sent by the equipment terminal, and acquiring the waiting time of server fingerprint verification and the waiting time of character verification;
before using the device terminal, the user needs to "unlock" the device terminal, and obtain the right to use the device terminal, i.e. obtain authorization. The user performs an authorization initiating operation on the device terminal, which may be clicking a clickable control for initiating authorization on the device terminal, or clicking any button or a specific button on the device terminal. In one embodiment, the user enters the fingerprint by directly entering a character password or placing a finger on a fingerprint acquisition device of the terminal device to initiate authorization to the device terminal. After a user initiates an authorization flow to the device terminal, a communication module on the device terminal sends an authorization request to the server.
After receiving an authorization request sent by the device terminal, the server acquires a user initiating an authorization process, namely a user corresponding to the following authorization request, according to the authorization request, and meanwhile, the server acquires the current authentication condition, namely the fingerprint authentication waiting time and the character authentication waiting time.
In this embodiment, the server determines whether to give authorization through fingerprint authentication and character authentication. In the authorization of use of device terminals such as shared bicycle, shared automobile, etc., there are often orders of magnitude of large number of users requesting authorization at the same time. The problems with the server verifying whether the user can be authorized using only the character password include: the character code is designed to be too simple and easy to be cracked, but the character code is too long and is not convenient to be memorized. The server uses only fingerprint authentication, and the problems include: fingerprint identification has certain mistake recognition rate, and the fingerprint is acquireed by other people easily, and the security is not high, and simultaneously, when the fingerprint identification cardinal number is too big, fingerprint identification's speed is very slow, is unfavorable for promoting user's use and experiences. When a large number of users simultaneously request to obtain authorization from a plurality of device terminals, there may be a case where the users need to wait in line for authorization verification. The time length of waiting for fingerprint authentication, that is, the time length that the user initiating the authorization process needs to wait at present because a plurality of users wait for fingerprint authentication, and similarly, the time length of waiting for character authentication is known to be the time length that the user initiating the authorization process needs to wait for character authentication at present.
Step S11, if the time difference between the fingerprint verification waiting time and the character verification waiting time is less than or equal to the preset value, sequentially verifying the fingerprint information to be verified and the character information to be verified of the user corresponding to the authorization request;
step S13, if the fingerprint information and the character information pass the verification, the authorization request is authorized corresponding to the user;
the time difference between the fingerprint verification waiting time and the character verification waiting time refers to: and if the fingerprint verification waiting time length is less than the character verification waiting time length and the time length difference is less than or equal to a preset value, fingerprint verification can be performed first, and then character verification is performed. Because the fingerprint input is faster than the character input and the fingerprint verification process is longer than the character verification process, the fingerprint verification is performed first, and the whole authorization verification can be completed most quickly.
The preset value can be zero, and can also be preset by the system according to the data processing speed of the server and other conditions.
The character verification can be in the form of character strings such as numbers or letters, and can also be in the form of patterns. The fingerprint information to be checked refers to fingerprint information input by a user corresponding to a specific authorization request, and the server compares and judges the fingerprint information to be checked with fingerprint information stored in the server to further determine whether the user can obtain the authorization of the equipment terminal. Similarly, the character information to be checked is the character information which is input by the user corresponding to a certain authorization request and is used for judging whether the user can obtain authorization by the server. The fingerprint information to be verified and the character information to be verified in the embodiment are fingerprint information and character information input by the same user.
The invention adopts double identity authentication, so that the corresponding user can obtain authorization only if the two authentication methods are passed. From the user input angle, the sequence of the user input fingerprint and the input character is not necessarily the same as the sequence of the authentication mode, and has no necessary correlation, and the fingerprint input can always precede the character input.
Specifically, as shown in fig. 5, in step S11, the step of sequentially verifying the fingerprint information to be verified and the character information to be verified of the user corresponding to the authorization request includes:
step S14, acquiring fingerprint information to be verified of a user corresponding to the authorization request;
after receiving an authorization request sent by the equipment terminal, the server determines which kind of authentication is performed by a user corresponding to the authorization request first by comparing the time length difference between the fingerprint authentication waiting time length and the character authentication waiting time length. If the waiting time for fingerprint verification is shorter than the waiting time for character verification and the time difference is smaller than the preset value, the character verification is carried out after the fingerprint verification is carried out, and the authorization result can be obtained quickly.
The server acquires fingerprint information to be verified of a user corresponding to the authorization request, and the acquisition mode includes but is not limited to the following two modes: in an embodiment, the server issues a prompt message for inputting the fingerprint information to the device terminal, and it should be noted that if the user initiates an authorization request, that is, inputs the fingerprint, the server does not need to issue the prompt message for inputting the fingerprint information, and can directly acquire the fingerprint input by the user. After receiving a prompt message of inputting the fingerprint information sent by the server, an interaction module on the equipment terminal displays the corresponding prompt message, and a fingerprint acquisition module on the equipment terminal receives the fingerprint information input by the user and then sends the fingerprint information to the server.
The server sends the prompt message of inputting the fingerprint information, the equipment terminal can conduct the next authorization guidance according to the prompt message, and the user can determine what operation should be conducted currently according to the prompt of the equipment terminal, so that good user experience can be guaranteed.
In another embodiment, after the server sends the request information for acquiring the fingerprint information to the device terminal, the device terminal automatically gives prompt information, for example, a fingerprint sensor for acquiring the fingerprint information lights up, or a fingerprint input prompt message is displayed on the interactive module, or a voice prompt is given by the device terminal, and the device terminal sends the fingerprint information to the server after acquiring the fingerprint information input by the user.
The authorization request corresponds to the user finger: the user that initiated the authorization request. In one embodiment, the user a directly inputs the fingerprint information to initiate the authorization, and in a short time (the user a has not obtained the authorization), the user B inputs the fingerprint information again and initiates an authorization request, at this time, the authorization requests initiated by the user a and the user B are two completely different requests, and the server can distinguish.
Step S15, if it is determined that target fingerprint information matched with the fingerprint information to be verified exists in the stored fingerprint information according to the stored fingerprint information in the server, verification character information corresponding to the target fingerprint information is obtained;
before the user uses the equipment terminal, the user needs to input the fingerprint for registration, and the registration operation can ensure that the fingerprint of the user is included in the stored fingerprint information of the server, so that the user can obtain the use authorization of the equipment terminal when the user needs to use the equipment terminal.
After acquiring fingerprint information to be checked of a user corresponding to the authorization request, the server judges whether target fingerprint information matched with the fingerprint information to be checked exists in the stored fingerprint information or not according to the stored fingerprint information.
The similarity between the fingerprint information to be verified and the matching finger of the fingerprint information to be verified is above a preset threshold value. By retrieving the target fingerprint information, similar users can be matched according to the fingerprints, and possible results include one user or zero, if the similar users are not matched according to the fingerprint information to be verified, the user is possibly not registered in the server, the user needs to be registered, and the user cannot obtain authorization, at the moment, the authorization judging program can be stopped, and the information of authorization failure is directly sent to the equipment terminal to give a registration prompt.
If similar users are matched according to the fingerprint information to be verified, target fingerprint information matched with the fingerprint information to be verified exists, and the next character verification can be carried out when the fingerprint verification is passed. The user corresponding to the authorization request is probably one of the users corresponding to the target fingerprint information, the comparison basis of the subsequent character verification can be narrowed to the character information (namely verification character information) corresponding to the target fingerprint information, the calculation amount of the subsequent character verification can be reduced, and the verification efficiency is improved.
When a user registers the equipment terminal, the user account number, the user fingerprint information and the user character password directly have a corresponding relation, a mapping table structure can be arranged in the database, and the other two can be obtained according to one mapping table structure.
Step S16, obtaining the character information to be checked of the user corresponding to the authorization request, if the verification character information has the target character information matched with the character information to be checked, the fingerprint information to be checked and the character information to be checked are both verified.
And after the fingerprint verification is passed, further acquiring the character information to be verified of the user corresponding to the authorization request so as to perform character verification. The server acquires the character information to be checked of the user corresponding to the authorization request, and the acquisition mode includes but is not limited to the following two modes:
in one implementation mode, a server issues a prompt message for inputting character password information, an interaction module on an equipment terminal displays corresponding prompt information after receiving the prompt message for inputting fingerprint information issued by the server, and the equipment terminal uploads the character information to be verified to the server after obtaining the character information to be verified input by a user. In another embodiment, after the server sends the request information for obtaining the character password information to the device terminal, the device terminal automatically gives prompt information, for example, the interactive module displays a character input prompt message, or the device terminal gives a voice prompt, and after obtaining the information of the character to be verified input by the user, the device terminal sends the information of the character to be verified to the server.
And after the character information to be checked of the user corresponding to the authorization request is obtained, judging whether target character information matched with the character information to be checked exists in the verification character information.
The target character information matched with the character information to be verified refers to verification character information which is the same as the character information to be verified, and if the target character information which is the same as the character information to be verified does not exist, the corresponding user of the authorization request does not pass the character verification; if the target character information which is the same as the character information to be verified exists, the user corresponding to the authorization request passes through character verification, at the moment, the user corresponding to the authorization request passes through fingerprint verification and character verification at the same time, and the user corresponding to the authorization request obtains authorization. In one implementation mode, after the authorization request corresponds to the authorization of the user, the server sends an unlocking instruction to the equipment terminal, and the equipment terminal finishes the locking state and enters the normal use state. Through the instruction of unblanking of giving down after the user authorizes, equipment terminal can directly unblank after receiving the instruction of unblanking, gets into normal use state, and the user can use terminal equipment smoothly.
When the waiting time of fingerprint verification is less than or equal to the waiting time of character verification, and the time difference is less than or equal to the preset value, the fingerprint verification is preferentially carried out under the condition that the waiting time is the same, because the input of fingerprints is quicker, the character input is more complex and slower, if the fingerprint verification does not pass, the character verification can be directly not carried out, the character input is directly omitted, and the time cost of a user is saved.
Step S12, if the time difference between the fingerprint verification waiting time and the character verification waiting time is larger than the preset value, the character information to be verified and the fingerprint information to be verified of the user corresponding to the authorization request are sequentially verified;
and step S13, if the fingerprint information to be verified and the character information to be verified both pass verification, the authorization request corresponds to the user to obtain authorization.
If the waiting time of fingerprint verification is longer than the waiting time of character verification and the time difference is longer than the preset value, the character verification can be carried out first and then the fingerprint verification is carried out. It should be noted that the order of the verification means does not absolutely correspond to the order of the input. Even if character authentication is performed first and then fingerprint authentication is performed, it is possible to input a fingerprint or input a character first.
Specifically, the step of sequentially verifying the to-be-verified character information and the to-be-verified fingerprint information of the user corresponding to the authorization request in step S12 includes:
step S121, obtaining character information to be checked of a user corresponding to the authorization request;
after receiving an authorization request sent by the equipment terminal, the server determines which kind of authentication is performed by a user corresponding to the authorization request first by comparing the time length difference between the fingerprint authentication waiting time length and the character authentication waiting time length. If the waiting time of fingerprint verification is longer than the waiting time of character verification and the time difference is longer than the preset value, the fingerprint verification is carried out after the character verification is carried out, and the authorization result can be obtained quickly.
The server acquires the character information to be checked of the user corresponding to the authorization request, and the acquisition mode includes but is not limited to the following two modes:
the server sends a prompt message for inputting the character password information, after receiving the prompt message for inputting the fingerprint information sent by the server, the interaction module on the equipment terminal displays the corresponding prompt message, and after obtaining the character information to be verified input by the user, the equipment terminal uploads the character information to be verified to the server. In one embodiment, after the server sends the request information for obtaining the character password information to the device terminal, the device terminal gives the prompt information by itself, for example, the interaction module displays the character input prompt message, or the device terminal gives the voice prompt, and after the device terminal obtains the information of the character to be verified input by the user, the device terminal sends the information of the character to be verified to the server.
As described above, the user corresponding to the authorization request is the user initiating the authorization request, the character information to be checked refers to the character information input by the user corresponding to a specific authorization request, the server uses the character information to be checked to determine whether the user can obtain the authorization of the device terminal, and the character information to be checked needs to be compared with the character information stored in the server.
Step S122, if it is determined that target character information matched with the character information to be checked exists in the stored character information according to the stored character information in the server, verification fingerprint information corresponding to the target character information is acquired;
before a user uses the equipment terminal, the user needs to input a character password and a fingerprint corresponding to a user account for registration, and the registration operation can ensure that the character password and the fingerprint corresponding to the user account are brought into the server, so that the user can obtain the use authorization of the equipment terminal when the user needs to use the equipment terminal. The server stores character information, namely the character information which is input when the user registers and is associated with the user account.
After obtaining the character information to be checked of the user corresponding to the authorization request, the server judges whether the stored character information contains target character information matched with the character information to be checked according to the stored character information. And the target character information matched with the character information to be verified refers to verification character information which is the same as the character information to be verified, if the target character information which is the same as the character information to be verified does not exist, the user corresponding to the authorization request does not pass the character verification, at the moment, the user corresponding to the authorization request can be determined to be not a registered user of the equipment terminal, and the user can be determined not to obtain the authorization of the equipment terminal without subsequent fingerprint verification.
If the target character information identical to the character information to be verified exists, the authorization request corresponding to the user passes the character verification, and subsequent fingerprint verification operation can be continued. Specifically, the server obtains the verification fingerprint information corresponding to the target character information in the manner as described above.
Step S123, obtaining fingerprint information to be checked of a user corresponding to the authorization request, and if target fingerprint information matched with the fingerprint information to be checked exists in the verification fingerprint information, enabling both the character information to be checked and the fingerprint information to be checked to pass verification.
And after the character verification is passed, further acquiring fingerprint information to be verified of a user corresponding to the authorization request so as to perform fingerprint verification. The server obtains the fingerprint information to be verified of the user corresponding to the authorization request, and the obtaining mode is as described above, which is not described any further.
After fingerprint information to be verified of a user corresponding to the authorization request is obtained, whether target character information matched with the fingerprint information to be verified exists in the verification fingerprint information or not is judged.
The similarity between the fingerprint information to be verified and the matching finger of the fingerprint information to be verified is above a preset threshold value. If the target fingerprint information matched with the fingerprint information to be verified does not exist, the user corresponding to the authorization request does not pass the fingerprint verification; if the target fingerprint information identical to the fingerprint information to be verified exists, the user corresponding to the authorization request passes through fingerprint verification, at the moment, the user corresponding to the authorization request simultaneously passes through fingerprint verification and character verification, and the user corresponding to the authorization request obtains authorization. In one implementation mode, after the authorization request corresponds to the authorization of the user, the server sends an unlocking instruction to the equipment terminal, and the equipment terminal finishes the locking state and enters the normal use state.
If the time difference between the fingerprint verification waiting time and the character verification waiting time is greater than the preset value, namely the fingerprint verification waiting time is greater than the character verification waiting time, and the time difference is greater than the preset value, the character verification is preferentially carried out, the character verification does not need to wait for the character verification after the fingerprint verification is finished, the running resources and the time resources are reasonably scheduled, the verification time is saved, the verification efficiency is improved, and the user experience is further improved.
In the embodiment, after an authorization request sent by a receiving device terminal is received, a server fingerprint verification waiting time and a character verification waiting time are obtained, the fingerprint verification waiting time and the character verification waiting time are compared, if the time difference between the fingerprint verification waiting time and the character verification waiting time is less than or equal to a preset value, that is, the fingerprint verification waiting time is less than the character verification waiting time, and the time difference is less than or equal to the preset value, so that under the condition that the waiting times are the same, fingerprint verification is preferentially performed, because input of a fingerprint is quicker and more complicated and slower, if the fingerprint verification fails, character verification can be directly not performed, character input is directly omitted, and the time cost of a user is saved; if the time difference between the fingerprint verification waiting time and the character verification waiting time is greater than the preset value, namely the fingerprint verification waiting time is greater than the character verification waiting time, and the time difference is greater than the preset value, the character verification is preferentially carried out, the character verification does not need to wait for the character verification after the fingerprint verification is finished, the running resources and the time resources are reasonably scheduled, the verification time is saved, the verification efficiency is improved, and the user experience is further improved.
Further, in the second embodiment of the authorization method of the present invention, in the step 15, the step of determining whether there is target fingerprint information matching the to-be-verified fingerprint information in the stored fingerprint information according to stored fingerprint information in a server includes:
step S20, acquiring the device identification of the device terminal according to the authorization request, and acquiring the stored fingerprint information corresponding to the device identification from the server;
step S21, determining whether there is target fingerprint information matching the fingerprint information to be verified in the stored fingerprint information.
Registered users of the washing machine at home or office locks, or shared washing machines in a specific area may be relatively fixed, and thus, the fingerprint information or character information of the entire users may be distinguished according to the device terminals. When a user registers, due to the characteristics of a home door lock or an office lock, or a shared washing machine in a specific area and other equipment terminals, in one implementation mode, the user can be bound with a fixed equipment terminal, the server records the binding relation, when the use authorization of the equipment terminal is obtained, the server can obtain the equipment identification of the equipment terminal, and the comparison range during authorization verification is narrowed according to the equipment identification of the equipment terminal. The corresponding stored fingerprint information can be acquired according to the equipment identification of the equipment terminal, and the corresponding stored fingerprint information is used as a comparison data range.
The data range of fingerprint information comparison is reduced to stored fingerprint information corresponding to the equipment terminal, so that accurate comparison can be achieved, the comparison range can be reduced, the comparison speed is increased, and the verification efficiency is improved.
For ease of understanding, a third embodiment of the authorization method of the invention is presented.
The premise of the authorization verification of the device terminal is to perform user registration, in one embodiment, the device terminal is a networking lock, and the registration method is as shown in fig. 7, and specifically includes the following steps:
1. a user uses a networking lock matching application program (hereinafter called APP) to register and log in a networking lock account system;
2. a user operates the APP to enter a fingerprint input interface and selects a networking lock to be input with a fingerprint;
3, the APP sends a fingerprint inputting request to the server, and the server sends a message to the networking lock to activate the networking lock to enter a fingerprint inputting state;
4. an interactive module on the networked lock gives a certain feedback prompt to a user to prompt for fingerprint input;
5. the user inputs the fingerprint on the fingerprint module of the networked lock and transmits the fingerprint information to the server;
6. the server associates the fingerprint information with the user account number of the input fingerprint, and after association and storage are successful, sends an instruction to the networking lock to wait for the user to input a character password;
7. a user inputs a character password on the networking lock interaction module, and the networking lock communication module uploads the character password to the server;
8. the server associates the character password with the user and binds the character password with the fingerprint information, and informs the APP that the user information is successfully input;
9. the networking lock enters a working wait state.
As shown in FIG. 8, after registration, the user uses the networked lock and needs to be authenticated by authorization in advance to obtain authorization. The method comprises the following specific steps:
1. a user puts a finger on the fingerprint sensor of the networking lock, and the fingerprint sensor identifies the fingerprint information of the user;
2. the networked lock transmits the identity information of the current lock and the fingerprint information identified by the fingerprint sensor to a server to request unlocking authorization;
3. the server indexes the similar account information according to the fingerprint information;
4. the server sends an instruction for waiting for the user to input the character password to the networking lock, and prompts the user to input the character password;
5. the user inputs a password by using an input panel of the networked lock, the networked lock uploads the character password to the server, and the server compares the character password and indexes the unique user;
6. if the account information index fails or the account information authorization fails, the server feeds the failure information back to the networking lock, the networking lock feeds the failure information back to the user through the feedback module, and meanwhile, the error information can be pushed to the mobile phone terminal of the user. Finally, the networking lock enters a working waiting state again;
7. if the account information index is successful and the authorization is successful, the server sends authorization information containing an unlocking instruction to the networked lock;
8. and after receiving the successful authorization information, the networked lock is unlocked according to the authorization instruction. Meanwhile, the networking lock reports the current state data to the server according to a certain frequency, and the server records the use data (can collect the use data of the user and analyze the behavior of the user so as to improve the equipment terminal);
9. after the device is used, the user manually closes the lock, and the networking lock main control module sends the user data completion information to the server. The server informs the APP (application program) of the user side of the unlocking record (the functions of charging and the like can be completed cooperatively), and then the networked lock enters the working waiting state again.
In addition, an embodiment of the present invention further provides a storage medium, where an authorization program is stored in the storage medium, and the authorization program, when executed by a processor, implements the steps described in the foregoing embodiments, and because the relevant steps have been described in detail in the foregoing embodiments, the details are not repeated.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention or a part contributing to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk) as described above, and includes a plurality of instructions for enabling a device terminal (which may be a fixed terminal, such as an internet-of-things smart device, including smart homes such as a smart air conditioner, a smart lamp, a smart power supply, and a smart router, or a mobile terminal, including a smart phone, a wearable networking AR/VR device, a smart sound box, and a network-connected device such as an autonomous vehicle) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. An authorization method, characterized in that the authorization method comprises the steps of:
receiving an authorization request sent by a device terminal, and acquiring a server fingerprint verification waiting time and a character verification waiting time;
if the time difference between the fingerprint verification waiting time and the character verification waiting time is smaller than or equal to a preset value, sequentially verifying fingerprint information to be verified and character information to be verified of a user corresponding to the authorization request, and if the fingerprint information to be verified and the character information to be verified both pass the verification, authorizing the user corresponding to the authorization request; wherein, this step specifically includes:
acquiring fingerprint information to be verified of a user corresponding to the authorization request;
judging whether target fingerprint information matched with the fingerprint information to be checked exists in the stored fingerprint information or not according to the stored fingerprint information in the server;
if the target fingerprint information exists, acquiring verification character information corresponding to the target fingerprint information;
acquiring character information to be checked of a user corresponding to an authorization request, and judging whether target character information matched with the character information to be checked exists in the verification character information or not;
if the target character information exists, the fingerprint information to be verified and the character information to be verified are verified;
if the time difference between the fingerprint verification waiting time and the character verification waiting time is larger than a preset value, sequentially verifying the to-be-verified character information and the to-be-verified fingerprint information of the user corresponding to the authorization request, and if the to-be-verified fingerprint information and the to-be-verified character information are verified, authorizing the user corresponding to the authorization request.
2. The authorization method according to claim 1, wherein the step of requesting authorization for the corresponding user is followed by the steps of:
and sending an unlocking instruction to the equipment terminal.
3. The authorization method according to claim 1, wherein the step of sequentially verifying the character information to be verified and the fingerprint information to be verified of the user corresponding to the authorization request comprises:
acquiring character information to be checked of a user corresponding to the authorization request;
judging whether target character information matched with the character information to be checked exists in the stored character information or not according to the stored character information of the server;
if the target character information exists, acquiring verification fingerprint information corresponding to the target character information;
acquiring fingerprint information to be verified of a user corresponding to an authorization request, and judging whether target fingerprint information matched with the fingerprint information to be verified exists in the verification fingerprint information or not;
and if the target fingerprint information exists, the character information to be verified and the fingerprint information to be verified are verified.
4. The authorization method according to claim 1, wherein the step of determining whether there is target fingerprint information matching the fingerprint information to be verified in the stored fingerprint information according to the stored fingerprint information in the server comprises:
acquiring the equipment identifier of the equipment terminal according to the authorization request, and acquiring stored fingerprint information corresponding to the equipment identifier from a server;
and judging whether the stored fingerprint information contains target fingerprint information matched with the fingerprint information to be verified.
5. The authorization method according to claim 1, wherein the step of obtaining the fingerprint information to be verified of the user corresponding to the authorization request further comprises:
and sending a prompt message of inputting the fingerprint information to the equipment terminal, and executing the step of acquiring the fingerprint information to be verified of the user corresponding to the authorization request.
6. A server, characterized in that the server comprises: a processor module, a storage module, and an authorization program stored on the storage module that, when executed by the processor module, performs the steps of any of claims 1 to 5.
7. An authorization system, characterized in that the authorization system comprises: a device terminal and a server according to claim 6.
8. The authorization system according to claim 7, characterized in that the device terminal comprises:
the system comprises a processing module, a fingerprint acquisition module, an interaction module, a communication module and a lock module;
the fingerprint acquisition module is used for acquiring user fingerprint information;
the interaction module is used for feeding back the authorization state and the abnormal condition of the user operation;
and the communication module is used for communication between the equipment terminal and the server.
9. A storage medium, characterized in that the storage medium has stored thereon an authorization program which, when executed by a processor, implements the steps of the authorization method according to any one of claims 1 to 5.
CN201710963528.2A 2017-10-16 2017-10-16 Authorization method, server, authorization system and storage medium Active CN107767509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710963528.2A CN107767509B (en) 2017-10-16 2017-10-16 Authorization method, server, authorization system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710963528.2A CN107767509B (en) 2017-10-16 2017-10-16 Authorization method, server, authorization system and storage medium

Publications (2)

Publication Number Publication Date
CN107767509A CN107767509A (en) 2018-03-06
CN107767509B true CN107767509B (en) 2020-11-03

Family

ID=61268736

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710963528.2A Active CN107767509B (en) 2017-10-16 2017-10-16 Authorization method, server, authorization system and storage medium

Country Status (1)

Country Link
CN (1) CN107767509B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108989322B (en) * 2018-07-28 2022-02-25 南昌努比亚技术有限公司 Data transmission method, mobile terminal and computer readable storage medium
CN109067880B (en) * 2018-08-09 2021-06-18 顾宏超 Remote unlocking method of shared equipment, device, equipment and storage medium thereof
CN111274596B (en) * 2020-01-23 2023-03-14 百度在线网络技术(北京)有限公司 Device interaction method, authority management method, interaction device and user side
CN111354116B (en) * 2020-03-09 2022-03-29 珠海优特物联科技有限公司 Lock control method and device, electronic lock and lock control system
CN111726417B (en) * 2020-06-30 2023-03-24 北京达佳互联信息技术有限公司 Delay control method, device, server and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989333A (en) * 2015-02-12 2016-10-05 深圳市汇顶科技股份有限公司 Fingerprint authentication method, fingerprint authentication system and terminal supporting fingerprint authentication function
WO2017173640A1 (en) * 2016-04-08 2017-10-12 厦门中控智慧信息技术有限公司 Method and apparatus for recognizing individuals based on multi-mode biological recognition information

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5218991B2 (en) * 2009-12-08 2013-06-26 株式会社日立製作所 Biometric authentication system and biometric authentication method using multiple types of templates
CN105869235B (en) * 2015-01-20 2019-08-30 阿里巴巴集团控股有限公司 A kind of safety door inhibition method and system
CN106156234A (en) * 2015-04-24 2016-11-23 上海箩箕技术有限公司 Biological information recognition method, identification device and smart lock
CN106652109A (en) * 2015-10-30 2017-05-10 东莞酷派软件技术有限公司 Intelligent lock control method, device and lock management server
CN106991761A (en) * 2017-03-28 2017-07-28 崔俊新 Intelligent clothes washing method, terminal and computer-readable recording medium
CN106960491A (en) * 2017-04-25 2017-07-18 上海亦源智能科技有限公司 Mobile fingerprint access control system and control method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105989333A (en) * 2015-02-12 2016-10-05 深圳市汇顶科技股份有限公司 Fingerprint authentication method, fingerprint authentication system and terminal supporting fingerprint authentication function
WO2017173640A1 (en) * 2016-04-08 2017-10-12 厦门中控智慧信息技术有限公司 Method and apparatus for recognizing individuals based on multi-mode biological recognition information

Also Published As

Publication number Publication date
CN107767509A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN107767509B (en) Authorization method, server, authorization system and storage medium
CN104574167B (en) Lease processing method, related device and system
CN104012132B (en) Two-factor authentication system and method
US8752145B1 (en) Biometric authentication with smart mobile device
US9122913B2 (en) Method for logging a user in to a mobile device
WO2017162112A1 (en) Identity registration method and device
EP3885205B1 (en) Car key control method and apparatus
CN108632089B (en) Management method, device and equipment of test terminal and computer storage medium
US10931663B2 (en) Terminal authenticated access
EP3653454A1 (en) Multi-factor authentication for vehicles
CN107911340B (en) Login verification method, device and equipment of application program and storage medium
US20180137268A1 (en) Authentication screen
US20140099923A1 (en) Subscriber device unlock
JP6104439B1 (en) Authentication system, method, program, and recording medium recording the program
CN107679488A (en) Control terminal in control method for vehicle and system, cloud server, vehicle
US20190182229A1 (en) Advanced application security utilizing an application key
CN110958234A (en) Application login control method and device and storage medium
CN112435366A (en) Vehicle control method and system based on fingerprint identification and computer readable medium
CN107507308B (en) Information matching method and device and intelligent door lock
CN108682080A (en) Mobile power rent method and mobile power leased machine
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
WO2018006326A1 (en) Method and system for verification based on intelligent entrance guard by means of mobile terminal and picture password
CN208766775U (en) Mobile power source leased machine
US11893842B2 (en) Information processing apparatus, information processing method, computer-readable storage medium, and mobile terminal
US11479209B2 (en) Input information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190219

Address after: 518000 Scientific Research Building 903, Tsinghua Information Port, North District of Yuehai Street High-tech Industrial Park, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Advantages Zhilian Technology Co., Ltd.

Address before: Room 4B, Chunsheng Building, Lingya Industrial Park, No. 1 Tangtou Road, Shiyan Town, Baoan District, Shenzhen City, Guangdong Province, 518000

Applicant before: Shenzhen City Ding Dong Internet Technology Co. Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211119

Address after: 518000 523, building 9, zone 2, Shenzhen Bay science and technology ecological park, No. 3609 Baishi Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen, Guangdong

Patentee after: Shenzhen Youbo Life Technology Co.,Ltd.

Address before: 518000 Scientific Research Building 903, Tsinghua Information Port, North District of Yuehai Street High-tech Industrial Park, Nanshan District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN YOUDIAN ZHILIAN TECHNOLOGY Co.,Ltd.