CN108959894A - A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting - Google Patents
A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting Download PDFInfo
- Publication number
- CN108959894A CN108959894A CN201810900823.8A CN201810900823A CN108959894A CN 108959894 A CN108959894 A CN 108959894A CN 201810900823 A CN201810900823 A CN 201810900823A CN 108959894 A CN108959894 A CN 108959894A
- Authority
- CN
- China
- Prior art keywords
- finger print
- print information
- fingerprint
- user
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Collating Specific Patterns (AREA)
- Image Input (AREA)
Abstract
Present invention discloses the implementation methods and device, computer readable storage medium, terminal of a kind of control booting of fingerprint, and this method comprises the following steps: acquisition finger print information;Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and be sent in memory and stored;Verification step;It is verified to collected finger print information is obtained;Judgment step;Judge whether finger print information passes through the verifying of authentication module;Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be verified comparing result.The safety and reliability of electronic equipment can be improved in the program, optimizes user experience, and what fingerprint replaced all safety measures exempts from password, and to have unauthorized user cannot be started up function, be switched on it is synchronous with safety certification triggers, user's operation is more succinct, more convenient.
Description
Technical field
The present invention relates to computer software technical field more particularly to the implementation methods and dress of a kind of control booting of fingerprint
It sets, computer readable storage medium, terminal.
Background technique
With the development of electronic device technology, the function of electronic equipment is more and more, and performance is also become better and better.People make
During with electronics, demand also produced to the privacy of electronic equipment, existing electronic equipment, such as it is tablet computer, a
People's computer or laptop can be switched on as long as in the case where equipment has electricity or is powered to be used, therefore safety is not high.
In the data safety epoch, there are risk of leakage, computer data is arranged in user encrypts data after computer is lost, and defeated
The place for entering password is too many.
It is current art technology in conclusion how to provide a kind of technical solution that can improve electronic equipments safety
Personnel's urgent problem to be solved.
Summary of the invention
The object of the invention is in order to solve the above-mentioned problems in the prior art, provide a kind of fingerprint control to open
Implementation method and device, computer readable storage medium, the terminal of machine.
The purpose of the present invention is achieved through the following technical solutions: a kind of implementation method of fingerprint control booting, this method
Include the following steps:
S1: acquisition finger print information;
Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and send
It is stored into memory;
S2: verification step;
Collected finger print information is obtained to S1 step to verify;
S3: judgment step;
Judge whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be tested
It demonstrate,proves comparing result and illustrates that this refers to if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical
For line information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, it is corresponding
User be illegal user.
Preferably, in S1 step, fingerprint sensor is set in power button, after fingerprint sensor has acquired finger print information
Collected finger print information is sent to the micro-control unit of electronic equipment, finger print information is converted pressure sensitivity by micro-control unit to be believed
Breath or image information, and pressure sensitivity information or image information are transferred to fingerprint verifying apparatus to carry out the transmission of finger print information.
Preferably, in S2 step, collected finger print information is obtained to S1 step and is tested by fingerprint verifying apparatus
Card, the fingerprint verifying apparatus by integrated encrypting and decrypting chip or embedded controller in the apparatus to finger print information into
Row verifying, the finger print information for the legitimate user that the fingerprint verifying apparatus saves are at least one, i.e. fingerprint verifying apparatus is corresponding
The legitimate user of electronic equipment be at least one.
Preferably, the S3 step the following steps are included:
S31: after the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded Control
Password booting is exempted from device realization;
S32: the finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded Control
Device realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input password
Mode enters system;
S33: unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded control
Device processed realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input password side
Formula enters system;
S34: unrecognized user interface, verifying number of attempt are limited in 3 times, after verifying number of attempt 3 times, base
This input-output system notifies embedded controller shutdown.
It preferably, before being verified to the finger print information, further include that setting current authentication number is designated value, right
After finger print information is verified, further includes: if the finger print information is unverified, current authentication number is added 1, and judge
Whether current authentication number is greater than preset threshold value, if it is, sounding an alarm, receives fingerprint letter if it is not, then executing
The step of breath.
Present invention further teaches a kind of devices of fingerprint control booting, comprising:
Acquire finger print information module;
For obtaining the fingerprint of user's typing by fingerprint sensor to operating system, and it will acquire collected fingerprint letter
Breath, which is sent in memory, to be stored;
Authentication module;For being verified to the collected finger print information of acquisition;
Judgment module;For judging whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be tested
It demonstrate,proves comparing result and illustrates that this refers to if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical
For line information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, it is corresponding
User be illegal user.
Preferably, which further includes counting module and alarm modules,
Counting module is used for before authentication module verifies finger print information, and setting current authentication number is specified
Current authentication number after verifying to finger print information, if the finger print information is unverified, is added 1, and judge to work as by value
Whether preceding verifying number is greater than preset threshold value, if it is, instruction alarm modules sound an alarm, if it is not, then instruction
It acquires finger print information module and executes the step of receiving finger print information;
Alarm template, for the step of being sounded an alarm according to instruction, the execution of counting module.
Preferably, the judgment module includes:
After the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller reality
Now exempt from password booting;
The finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller reality
Existing normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode
Into system;
Unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller
Realize normal boot-strap, prompt user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode into
Enter system;
Unrecognized user interface, verifying number of attempt are limited in 3 times, substantially defeated after verifying number of attempt 3 times
Enter output system notice embedded controller shutdown.
Present invention further teaches a kind of computer readable storage mediums, are stored thereon with computer instruction, the computer
The step of implementation method of the fingerprint control booting is executed when instruction operation.
Present invention further teaches a kind of terminal, including memory and processor, storing on the memory can be in institute
The computer instruction run on processor is stated, the fingerprint control is executed when the processor runs the computer instruction and is opened
The step of implementation method of machine.
The advantages of technical solution of the present invention is mainly reflected in: the safety and reliability of electronic equipment can be improved in the program,
Optimize user experience.Fingerprint replaces all safety measures to exempt from password, and having unauthorized user cannot be started up function, booting and
The synchronous triggering of safety certification, user's operation are more succinct, more convenient.By with fingerprint mould group application all setting passwords
Place integrates, and realizes key decryption, from booting to all unblocked into system, and has corresponding access right.At present
Windows hello can only control the password login of exempting from the end windows OS, and which extends to the end BIOS.
Detailed description of the invention
Fig. 1 is a kind of structural block diagram of the implementation method of fingerprint control booting of the invention.
Specific embodiment
The purpose of the present invention, advantage and feature, by by the non-limitative illustration of preferred embodiment below carry out diagram and
It explains.These embodiments are only the prominent examples using technical solution of the present invention, it is all take equivalent replacement or equivalent transformation and
The technical solution of formation, all falls within the scope of protection of present invention.
Present invention discloses a kind of implementation methods of fingerprint control booting, as shown in Figure 1, this method comprises the following steps:
S1: acquisition finger print information;
Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and send
It is stored into memory;
S2: verification step;
Collected finger print information is obtained to S1 step to verify;
S3: judgment step;
Judge whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus can pre-save the finger print information of legitimate user, will acquire collected finger print information and close
The finger print information of method user compares, and is verified comparing result, if proving and comparisom result be the finger print information that receives with
The finger print information of legitimate user is identical, illustrates the finger print information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate
The finger print information received is unverified, and corresponding user is illegal user.
The process of fingerprint register can carry out after operating system OS starting, can when user is desired with fingerprint register
To trigger register flow path by executing corresponding user's operation, after user triggers register flow path, operating system can be according to user
Registration request user's typing fingerprint is prompted, user is according to aobvious by the fingerprint management program under operating system on a display screen
Show that prompt will need the finger of typing fingerprint to press in the fingerprint mould group of fingerprint sensor, operating system passes through fingerprint sensor
The fingerprint for obtaining user's typing obtains template data by carrying out data assembling, storage assembling obtains using fingerprint as fingerprint template
The template data obtained completes fingerprint register.
In S1 step, fingerprint sensor is set in power button, and fingerprint sensor will acquisition after having acquired finger print information
To finger print information be sent to the micro-control unit of electronic equipment, finger print information is converted pressure sensitivity information or figure by micro-control unit
As information, and pressure sensitivity information or image information are transferred to fingerprint verifying apparatus to carry out the transmission of finger print information.
Fingerprint recognition refers to by comparing the details of different fingerprints and is identified that fingerprint identification technology is related to figure
As numerous subjects such as processing, pattern-recognition, computer vision, mathematical morphology, wavelet analysis.Due to everyone fingerprint not
With, be exactly same people ten refer between, fingerprint also has significant difference, therefore fingerprint can be used for identity authentication.
One finger print information can be a fingerprint image, including the general characteristic that can be directly observed with human eye
The local feature (direction, curvature, position etc.) of (line shape, Mode Areas, core point, triangulation point and line number etc.) and minutiae.
The corresponding pressure sensitivity information of one finger print information section, each pressure sensitivity information is equivalent to a password, thousands of a
Pressure sensitivity information constitutes a set of cipher code set.Each finger print information section contains the letter such as direction, curvature, position of this section of fingerprint
Breath, a set of cipher code set being made of pressure sensitivity information are exactly thousands of such finger print information sections, so that it may by entire fingerprint
Information passes to electronic equipment.
In S2 step, collected finger print information is obtained to S1 step and is verified by fingerprint verifying apparatus, it is described
Fingerprint verifying apparatus verifies finger print information by integrated encrypting and decrypting chip or embedded controller in the apparatus,
The finger print information for the legitimate user that the fingerprint verifying apparatus saves is at least one, i.e. the corresponding electronics of fingerprint verifying apparatus is set
Standby legitimate user is at least one;In the technical scheme, the fingerprint letter for the legitimate user that the fingerprint verifying apparatus saves
Breath can be one, or multiple, i.e., the legitimate user of the corresponding electronic equipment of fingerprint verifying apparatus can be a people,
It may be multiple people.
The S3 step the following steps are included:
S31: after the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded Control
Password booting is exempted from device realization;
S32: the finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded Control
Device realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input password
Mode enters system;
S33: unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded control
Device processed realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input password side
Formula enters system;
S34: unrecognized user interface, verifying number of attempt are limited in 3 times, after verifying number of attempt 3 times, base
This input-output system notifies embedded controller shutdown.
It before being verified to the finger print information, further include that setting current authentication number is designated value, to finger print information
After being verified, further includes: if the finger print information is unverified, current authentication number is added 1, and judge current authentication
Whether number is greater than preset threshold value, if it is, sounding an alarm, if it is not, then executing the step of receiving finger print information.
Basic input output system, BIOS (Basic Input Output System) is inner, FingerPrinter control
Power up function option is associated with BIOS Password and HDD Password, hard disk drive HDD (Hard Disk Driver).
Fingerprint driver application realizes TPM, BITLOCK association, safety chip TPM (Trusted Platform Module), driving
Encryption equipment BITLOCK.After FingerPrinter control power up function is opened, realize that only authorized user could be switched on
Starting, and have permission operation storage program area, hard disc data.
Present invention further teaches a kind of device of fingerprint control booting, which includes:
Acquire finger print information module;
For obtaining the fingerprint of user's typing by fingerprint sensor to operating system, and it will acquire collected fingerprint letter
Breath, which is sent in memory, to be stored;
Authentication module;For being verified to the collected finger print information of acquisition;
Judgment module;For judging whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be tested
It demonstrate,proves comparing result and illustrates that this refers to if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical
For line information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, it is corresponding
User be illegal user.
Further, which further includes counting module and alarm modules,
Counting module is used for before authentication module verifies finger print information, and setting current authentication number is specified
Current authentication number after verifying to finger print information, if the finger print information is unverified, is added 1, and judge to work as by value
Whether preceding verifying number is greater than preset threshold value, if it is, instruction alarm modules sound an alarm, if it is not, then instruction
It acquires finger print information module and executes the step of receiving finger print information;
Alarm template, for the step of being sounded an alarm according to instruction, the execution of counting module.Specifically, in this technology side
In case, alarm can be many forms, such as vibration, voice broadcast, the tinkle of bells, can play a warning role in a word, a side
If face at this time typing fingerprint user be illegal user, can play a warning role, show that this is set as personal objects, should
Article has access right, on the other hand can inform legitimate user by alarm, have illegal user to attempt to open its electronics
Equipment.
Further, the judgment module includes:
After the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller reality
Now exempt from password booting;
The finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller reality
Existing normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode
Into system;
Unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller
Realize normal boot-strap, prompt user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode into
Enter system;
Unrecognized user interface, verifying number of attempt are limited in 3 times, substantially defeated after verifying number of attempt 3 times
Enter output system notice embedded controller shutdown.
A kind of computer readable storage medium, is stored thereon with computer instruction, and the computer instruction executes when running
The step of implementation method of the fingerprint control booting.
A kind of terminal, including memory and processor are stored and can be run on the processor on the memory
Computer instruction, the implementation method of the fingerprint control booting is executed when the processor runs the computer instruction
Step.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by
The mode of software combination hardware platform realizes that technical solution of the present invention contributes to background technique all or part of
Can be embodied in the form of software products, which can store in storage medium, as ROM, CD,
Magnetic disk etc., including some instructions are used so that a computer equipment, can be personal computer, server, smart phone or
Person's network equipment etc. executes method described in certain parts of each embodiment of the present invention or embodiment.
Still there are many embodiment, all technical sides formed using equivalents or equivalent transformation by the present invention
Case is within the scope of the present invention.
Claims (10)
1. a kind of implementation method of fingerprint control booting, it is characterised in that:
This method comprises the following steps:
S1: acquisition finger print information;
Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and be sent to and deposit
It is stored in reservoir;
S2: verification step;
Collected finger print information is obtained to S1 step to verify;
S3: judgment step;
Judge whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be verified pair
Than as a result, illustrating that the fingerprint is believed if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical
For breath by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, corresponding use
Family is illegal user.
2. the implementation method of fingerprint control booting according to claim 1, it is characterised in that: in S1 step, fingerprint is passed
Sensor is set in power button, and fingerprint sensor has acquired and collected finger print information is sent to electronic equipment after finger print information
Micro-control unit, finger print information converts pressure sensitivity information or image information by micro-control unit, and by pressure sensitivity information or image
Information is transferred to fingerprint verifying apparatus to carry out the transmission of finger print information.
3. the implementation method of fingerprint control booting according to claim 1, it is characterised in that: in S2 step, walked to S1
Suddenly it obtains collected finger print information to be verified by fingerprint verifying apparatus, the fingerprint verifying apparatus is by being integrated in the dress
Encrypting and decrypting chip or embedded controller in setting verify finger print information, and the fingerprint verifying apparatus saves legal
The finger print information of user is at least one, i.e. the legitimate user of the corresponding electronic equipment of fingerprint verifying apparatus is at least one.
4. the implementation method of fingerprint control booting according to claim 1, it is characterised in that: the S3 step includes following
Step:
S31: after the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller reality
Now exempt from password booting;
S32: the finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller reality
Existing normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode
Into system;
S33: unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller
Realize normal boot-strap, prompt user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode into
Enter system;
S34: unrecognized user interface, verifying number of attempt are limited in 3 times, substantially defeated after verifying number of attempt 3 times
Enter output system notice embedded controller shutdown.
5. the implementation method of fingerprint control booting according to claim 1-4, it is characterised in that: to the fingerprint
It before information is verified, further include that setting current authentication number is designated value, after verifying to finger print information, further includes:
If the finger print information is unverified, current authentication number is added 1, and judges whether current authentication number is greater than and sets in advance
Fixed threshold value, if it is, sounding an alarm, if it is not, then executing the step of receiving finger print information.
6. a kind of device of fingerprint control booting, it is characterised in that: include:
Acquire finger print information module;
For obtaining the fingerprint of user's typing by fingerprint sensor to operating system, and it will acquire collected finger print information hair
It send and is stored into memory;
Authentication module;For being verified to the collected finger print information of acquisition;
Judgment module;For judging whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be verified pair
Than as a result, illustrating that the fingerprint is believed if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical
For breath by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, corresponding use
Family is illegal user.
7. a kind of device of fingerprint control booting according to claim 6, it is characterised in that: the device further includes count module
Block and alarm modules,
Counting module is used for before authentication module verifies finger print information, and setting current authentication number is designated value, right
After finger print information is verified, if the finger print information is unverified, current authentication number is added 1, and judge currently to test
Whether card number is greater than preset threshold value, if it is, instruction alarm modules sound an alarm, if it is not, then instruction acquisition
Finger print information module executes the step of receiving finger print information;
Alarm template, for the step of being sounded an alarm according to instruction, the execution of counting module.
8. a kind of device of fingerprint control booting according to claim 6, it is characterised in that:
The judgment module includes:
After the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller realization and exempts from
Password booting;
The finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller and realizes just
Normally opened machine prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode enters
System;
Unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller realization
Normal boot-strap prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode enters and is
System;
Unrecognized user interface, verifying number of attempt are limited in 3 times, after verifying number of attempt 3 times, are inputted substantially defeated
System notice embedded controller shutdown out.
9. a kind of computer readable storage medium, is stored thereon with computer instruction, it is characterised in that: the computer instruction fortune
Perform claim requires the step of implementation method of 1 to 4 described in any item fingerprint control bootings when row.
10. a kind of terminal, it is characterised in that: including memory and processor, storing on the memory can be at the place
The computer instruction run on reason device, perform claim requires any one of 1 to 4 institute when the processor runs the computer instruction
The step of implementation method for the fingerprint control booting stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810900823.8A CN108959894A (en) | 2018-08-09 | 2018-08-09 | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810900823.8A CN108959894A (en) | 2018-08-09 | 2018-08-09 | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108959894A true CN108959894A (en) | 2018-12-07 |
Family
ID=64468531
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810900823.8A Pending CN108959894A (en) | 2018-08-09 | 2018-08-09 | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108959894A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222493A (en) * | 2019-05-14 | 2019-09-10 | 浙江无极互联科技有限公司 | A kind of computer booting authentication system and method |
WO2021104401A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Electronic device and method for logging in operating system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101127996A (en) * | 2007-09-24 | 2008-02-20 | 中兴通讯股份有限公司 | A power on key and power on method |
CN103838992A (en) * | 2014-03-03 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint identifying method and terminal |
CN105574383A (en) * | 2015-04-17 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal system management method and device |
CN205370269U (en) * | 2016-01-07 | 2016-07-06 | 黑龙江省农业科学院佳木斯水稻研究所 | Bill safe based on fingerprint identification technology |
CN106815505A (en) * | 2015-11-27 | 2017-06-09 | 北京奇虎科技有限公司 | A kind of identification and the method and terminal of unlock terminal |
CN108156310A (en) * | 2017-11-27 | 2018-06-12 | 深圳市金立通信设备有限公司 | A kind of method and system of finger prints processing, terminal device and computer-readable medium |
-
2018
- 2018-08-09 CN CN201810900823.8A patent/CN108959894A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101127996A (en) * | 2007-09-24 | 2008-02-20 | 中兴通讯股份有限公司 | A power on key and power on method |
CN103838992A (en) * | 2014-03-03 | 2014-06-04 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint identifying method and terminal |
CN105574383A (en) * | 2015-04-17 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Terminal system management method and device |
CN106815505A (en) * | 2015-11-27 | 2017-06-09 | 北京奇虎科技有限公司 | A kind of identification and the method and terminal of unlock terminal |
CN205370269U (en) * | 2016-01-07 | 2016-07-06 | 黑龙江省农业科学院佳木斯水稻研究所 | Bill safe based on fingerprint identification technology |
CN108156310A (en) * | 2017-11-27 | 2018-06-12 | 深圳市金立通信设备有限公司 | A kind of method and system of finger prints processing, terminal device and computer-readable medium |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222493A (en) * | 2019-05-14 | 2019-09-10 | 浙江无极互联科技有限公司 | A kind of computer booting authentication system and method |
WO2021104401A1 (en) * | 2019-11-30 | 2021-06-03 | 华为技术有限公司 | Electronic device and method for logging in operating system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109255211B (en) | Mobile security countermeasure | |
US10083304B2 (en) | Technologies for enhanced user authentication using advanced sensor monitoring | |
CN106330850B (en) | Security verification method based on biological characteristics, client and server | |
EP3005202B1 (en) | System and method for biometric authentication with device attestation | |
US20220092901A1 (en) | System and method for providing credential activation layered security | |
US8407762B2 (en) | System for three level authentication of a user | |
US20160180068A1 (en) | Technologies for login pattern based multi-factor authentication | |
WO2017113380A1 (en) | Fingerprint recognition method and apparatus, and touch-screen terminal | |
TW201546645A (en) | Method and system for verifying identities | |
WO2007112023A2 (en) | Secure biometric processing system and method of use | |
CN103646201A (en) | Verification method achieved by combining human faces with identities | |
CN109614799B (en) | Information authentication method | |
CN108965222A (en) | Identity identifying method, system and computer readable storage medium | |
Lovisotto et al. | Mobile biometrics in financial services: A five factor framework | |
CN103646200B (en) | The coding encrypting of a kind of face information and application process | |
EP3543938B1 (en) | Authentication of a transaction card using a multimedia file | |
CN109933966A (en) | Continuous authentication method and system based on biological characteristics | |
CN108959894A (en) | A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting | |
Bodepudi et al. | Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review | |
CN103368736A (en) | Business information encryption and decryption method and device | |
JP3589579B2 (en) | Biometric authentication device and recording medium on which processing program is recorded | |
US8151111B2 (en) | Processing device constituting an authentication system, authentication system, and the operation method thereof | |
CN106156590A (en) | A kind of computer startup processing method and processing system | |
CN104751042A (en) | Credibility detection method based on password hash and biometric feature recognition | |
US10841300B2 (en) | System, method and computer programs for user authentication and/or authorization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |
|
RJ01 | Rejection of invention patent application after publication |