CN108959894A - A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting - Google Patents

A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting Download PDF

Info

Publication number
CN108959894A
CN108959894A CN201810900823.8A CN201810900823A CN108959894A CN 108959894 A CN108959894 A CN 108959894A CN 201810900823 A CN201810900823 A CN 201810900823A CN 108959894 A CN108959894 A CN 108959894A
Authority
CN
China
Prior art keywords
finger print
print information
fingerprint
user
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810900823.8A
Other languages
Chinese (zh)
Inventor
刘明元
张兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China New Engineering Technology Research Institute Co Ltd
Original Assignee
China New Engineering Technology Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China New Engineering Technology Research Institute Co Ltd filed Critical China New Engineering Technology Research Institute Co Ltd
Priority to CN201810900823.8A priority Critical patent/CN108959894A/en
Publication of CN108959894A publication Critical patent/CN108959894A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Collating Specific Patterns (AREA)
  • Image Input (AREA)

Abstract

Present invention discloses the implementation methods and device, computer readable storage medium, terminal of a kind of control booting of fingerprint, and this method comprises the following steps: acquisition finger print information;Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and be sent in memory and stored;Verification step;It is verified to collected finger print information is obtained;Judgment step;Judge whether finger print information passes through the verifying of authentication module;Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be verified comparing result.The safety and reliability of electronic equipment can be improved in the program, optimizes user experience, and what fingerprint replaced all safety measures exempts from password, and to have unauthorized user cannot be started up function, be switched on it is synchronous with safety certification triggers, user's operation is more succinct, more convenient.

Description

The implementation method and device of a kind of control booting of fingerprint, computer readable storage medium, Terminal
Technical field
The present invention relates to computer software technical field more particularly to the implementation methods and dress of a kind of control booting of fingerprint It sets, computer readable storage medium, terminal.
Background technique
With the development of electronic device technology, the function of electronic equipment is more and more, and performance is also become better and better.People make During with electronics, demand also produced to the privacy of electronic equipment, existing electronic equipment, such as it is tablet computer, a People's computer or laptop can be switched on as long as in the case where equipment has electricity or is powered to be used, therefore safety is not high.
In the data safety epoch, there are risk of leakage, computer data is arranged in user encrypts data after computer is lost, and defeated The place for entering password is too many.
It is current art technology in conclusion how to provide a kind of technical solution that can improve electronic equipments safety Personnel's urgent problem to be solved.
Summary of the invention
The object of the invention is in order to solve the above-mentioned problems in the prior art, provide a kind of fingerprint control to open Implementation method and device, computer readable storage medium, the terminal of machine.
The purpose of the present invention is achieved through the following technical solutions: a kind of implementation method of fingerprint control booting, this method Include the following steps:
S1: acquisition finger print information;
Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and send It is stored into memory;
S2: verification step;
Collected finger print information is obtained to S1 step to verify;
S3: judgment step;
Judge whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be tested It demonstrate,proves comparing result and illustrates that this refers to if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical For line information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, it is corresponding User be illegal user.
Preferably, in S1 step, fingerprint sensor is set in power button, after fingerprint sensor has acquired finger print information Collected finger print information is sent to the micro-control unit of electronic equipment, finger print information is converted pressure sensitivity by micro-control unit to be believed Breath or image information, and pressure sensitivity information or image information are transferred to fingerprint verifying apparatus to carry out the transmission of finger print information.
Preferably, in S2 step, collected finger print information is obtained to S1 step and is tested by fingerprint verifying apparatus Card, the fingerprint verifying apparatus by integrated encrypting and decrypting chip or embedded controller in the apparatus to finger print information into Row verifying, the finger print information for the legitimate user that the fingerprint verifying apparatus saves are at least one, i.e. fingerprint verifying apparatus is corresponding The legitimate user of electronic equipment be at least one.
Preferably, the S3 step the following steps are included:
S31: after the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded Control Password booting is exempted from device realization;
S32: the finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded Control Device realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input password Mode enters system;
S33: unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded control Device processed realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input password side Formula enters system;
S34: unrecognized user interface, verifying number of attempt are limited in 3 times, after verifying number of attempt 3 times, base This input-output system notifies embedded controller shutdown.
It preferably, before being verified to the finger print information, further include that setting current authentication number is designated value, right After finger print information is verified, further includes: if the finger print information is unverified, current authentication number is added 1, and judge Whether current authentication number is greater than preset threshold value, if it is, sounding an alarm, receives fingerprint letter if it is not, then executing The step of breath.
Present invention further teaches a kind of devices of fingerprint control booting, comprising:
Acquire finger print information module;
For obtaining the fingerprint of user's typing by fingerprint sensor to operating system, and it will acquire collected fingerprint letter Breath, which is sent in memory, to be stored;
Authentication module;For being verified to the collected finger print information of acquisition;
Judgment module;For judging whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be tested It demonstrate,proves comparing result and illustrates that this refers to if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical For line information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, it is corresponding User be illegal user.
Preferably, which further includes counting module and alarm modules,
Counting module is used for before authentication module verifies finger print information, and setting current authentication number is specified Current authentication number after verifying to finger print information, if the finger print information is unverified, is added 1, and judge to work as by value Whether preceding verifying number is greater than preset threshold value, if it is, instruction alarm modules sound an alarm, if it is not, then instruction It acquires finger print information module and executes the step of receiving finger print information;
Alarm template, for the step of being sounded an alarm according to instruction, the execution of counting module.
Preferably, the judgment module includes:
After the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller reality Now exempt from password booting;
The finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller reality Existing normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode Into system;
Unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller Realize normal boot-strap, prompt user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode into Enter system;
Unrecognized user interface, verifying number of attempt are limited in 3 times, substantially defeated after verifying number of attempt 3 times Enter output system notice embedded controller shutdown.
Present invention further teaches a kind of computer readable storage mediums, are stored thereon with computer instruction, the computer The step of implementation method of the fingerprint control booting is executed when instruction operation.
Present invention further teaches a kind of terminal, including memory and processor, storing on the memory can be in institute The computer instruction run on processor is stated, the fingerprint control is executed when the processor runs the computer instruction and is opened The step of implementation method of machine.
The advantages of technical solution of the present invention is mainly reflected in: the safety and reliability of electronic equipment can be improved in the program, Optimize user experience.Fingerprint replaces all safety measures to exempt from password, and having unauthorized user cannot be started up function, booting and The synchronous triggering of safety certification, user's operation are more succinct, more convenient.By with fingerprint mould group application all setting passwords Place integrates, and realizes key decryption, from booting to all unblocked into system, and has corresponding access right.At present Windows hello can only control the password login of exempting from the end windows OS, and which extends to the end BIOS.
Detailed description of the invention
Fig. 1 is a kind of structural block diagram of the implementation method of fingerprint control booting of the invention.
Specific embodiment
The purpose of the present invention, advantage and feature, by by the non-limitative illustration of preferred embodiment below carry out diagram and It explains.These embodiments are only the prominent examples using technical solution of the present invention, it is all take equivalent replacement or equivalent transformation and The technical solution of formation, all falls within the scope of protection of present invention.
Present invention discloses a kind of implementation methods of fingerprint control booting, as shown in Figure 1, this method comprises the following steps:
S1: acquisition finger print information;
Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and send It is stored into memory;
S2: verification step;
Collected finger print information is obtained to S1 step to verify;
S3: judgment step;
Judge whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus can pre-save the finger print information of legitimate user, will acquire collected finger print information and close The finger print information of method user compares, and is verified comparing result, if proving and comparisom result be the finger print information that receives with The finger print information of legitimate user is identical, illustrates the finger print information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate The finger print information received is unverified, and corresponding user is illegal user.
The process of fingerprint register can carry out after operating system OS starting, can when user is desired with fingerprint register To trigger register flow path by executing corresponding user's operation, after user triggers register flow path, operating system can be according to user Registration request user's typing fingerprint is prompted, user is according to aobvious by the fingerprint management program under operating system on a display screen Show that prompt will need the finger of typing fingerprint to press in the fingerprint mould group of fingerprint sensor, operating system passes through fingerprint sensor The fingerprint for obtaining user's typing obtains template data by carrying out data assembling, storage assembling obtains using fingerprint as fingerprint template The template data obtained completes fingerprint register.
In S1 step, fingerprint sensor is set in power button, and fingerprint sensor will acquisition after having acquired finger print information To finger print information be sent to the micro-control unit of electronic equipment, finger print information is converted pressure sensitivity information or figure by micro-control unit As information, and pressure sensitivity information or image information are transferred to fingerprint verifying apparatus to carry out the transmission of finger print information.
Fingerprint recognition refers to by comparing the details of different fingerprints and is identified that fingerprint identification technology is related to figure As numerous subjects such as processing, pattern-recognition, computer vision, mathematical morphology, wavelet analysis.Due to everyone fingerprint not With, be exactly same people ten refer between, fingerprint also has significant difference, therefore fingerprint can be used for identity authentication.
One finger print information can be a fingerprint image, including the general characteristic that can be directly observed with human eye The local feature (direction, curvature, position etc.) of (line shape, Mode Areas, core point, triangulation point and line number etc.) and minutiae.
The corresponding pressure sensitivity information of one finger print information section, each pressure sensitivity information is equivalent to a password, thousands of a Pressure sensitivity information constitutes a set of cipher code set.Each finger print information section contains the letter such as direction, curvature, position of this section of fingerprint Breath, a set of cipher code set being made of pressure sensitivity information are exactly thousands of such finger print information sections, so that it may by entire fingerprint Information passes to electronic equipment.
In S2 step, collected finger print information is obtained to S1 step and is verified by fingerprint verifying apparatus, it is described Fingerprint verifying apparatus verifies finger print information by integrated encrypting and decrypting chip or embedded controller in the apparatus, The finger print information for the legitimate user that the fingerprint verifying apparatus saves is at least one, i.e. the corresponding electronics of fingerprint verifying apparatus is set Standby legitimate user is at least one;In the technical scheme, the fingerprint letter for the legitimate user that the fingerprint verifying apparatus saves Breath can be one, or multiple, i.e., the legitimate user of the corresponding electronic equipment of fingerprint verifying apparatus can be a people, It may be multiple people.
The S3 step the following steps are included:
S31: after the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded Control Password booting is exempted from device realization;
S32: the finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded Control Device realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input password Mode enters system;
S33: unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded control Device processed realizes normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input password side Formula enters system;
S34: unrecognized user interface, verifying number of attempt are limited in 3 times, after verifying number of attempt 3 times, base This input-output system notifies embedded controller shutdown.
It before being verified to the finger print information, further include that setting current authentication number is designated value, to finger print information After being verified, further includes: if the finger print information is unverified, current authentication number is added 1, and judge current authentication Whether number is greater than preset threshold value, if it is, sounding an alarm, if it is not, then executing the step of receiving finger print information.
Basic input output system, BIOS (Basic Input Output System) is inner, FingerPrinter control Power up function option is associated with BIOS Password and HDD Password, hard disk drive HDD (Hard Disk Driver). Fingerprint driver application realizes TPM, BITLOCK association, safety chip TPM (Trusted Platform Module), driving Encryption equipment BITLOCK.After FingerPrinter control power up function is opened, realize that only authorized user could be switched on Starting, and have permission operation storage program area, hard disc data.
Present invention further teaches a kind of device of fingerprint control booting, which includes:
Acquire finger print information module;
For obtaining the fingerprint of user's typing by fingerprint sensor to operating system, and it will acquire collected fingerprint letter Breath, which is sent in memory, to be stored;
Authentication module;For being verified to the collected finger print information of acquisition;
Judgment module;For judging whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be tested It demonstrate,proves comparing result and illustrates that this refers to if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical For line information by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, it is corresponding User be illegal user.
Further, which further includes counting module and alarm modules,
Counting module is used for before authentication module verifies finger print information, and setting current authentication number is specified Current authentication number after verifying to finger print information, if the finger print information is unverified, is added 1, and judge to work as by value Whether preceding verifying number is greater than preset threshold value, if it is, instruction alarm modules sound an alarm, if it is not, then instruction It acquires finger print information module and executes the step of receiving finger print information;
Alarm template, for the step of being sounded an alarm according to instruction, the execution of counting module.Specifically, in this technology side In case, alarm can be many forms, such as vibration, voice broadcast, the tinkle of bells, can play a warning role in a word, a side If face at this time typing fingerprint user be illegal user, can play a warning role, show that this is set as personal objects, should Article has access right, on the other hand can inform legitimate user by alarm, have illegal user to attempt to open its electronics Equipment.
Further, the judgment module includes:
After the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller reality Now exempt from password booting;
The finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller reality Existing normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode Into system;
Unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller Realize normal boot-strap, prompt user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode into Enter system;
Unrecognized user interface, verifying number of attempt are limited in 3 times, substantially defeated after verifying number of attempt 3 times Enter output system notice embedded controller shutdown.
A kind of computer readable storage medium, is stored thereon with computer instruction, and the computer instruction executes when running The step of implementation method of the fingerprint control booting.
A kind of terminal, including memory and processor are stored and can be run on the processor on the memory Computer instruction, the implementation method of the fingerprint control booting is executed when the processor runs the computer instruction Step.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by The mode of software combination hardware platform realizes that technical solution of the present invention contributes to background technique all or part of Can be embodied in the form of software products, which can store in storage medium, as ROM, CD, Magnetic disk etc., including some instructions are used so that a computer equipment, can be personal computer, server, smart phone or Person's network equipment etc. executes method described in certain parts of each embodiment of the present invention or embodiment.
Still there are many embodiment, all technical sides formed using equivalents or equivalent transformation by the present invention Case is within the scope of the present invention.

Claims (10)

1. a kind of implementation method of fingerprint control booting, it is characterised in that:
This method comprises the following steps:
S1: acquisition finger print information;
Operating system obtains the fingerprint of user's typing by fingerprint sensor, and will acquire collected finger print information and be sent to and deposit It is stored in reservoir;
S2: verification step;
Collected finger print information is obtained to S1 step to verify;
S3: judgment step;
Judge whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be verified pair Than as a result, illustrating that the fingerprint is believed if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical For breath by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, corresponding use Family is illegal user.
2. the implementation method of fingerprint control booting according to claim 1, it is characterised in that: in S1 step, fingerprint is passed Sensor is set in power button, and fingerprint sensor has acquired and collected finger print information is sent to electronic equipment after finger print information Micro-control unit, finger print information converts pressure sensitivity information or image information by micro-control unit, and by pressure sensitivity information or image Information is transferred to fingerprint verifying apparatus to carry out the transmission of finger print information.
3. the implementation method of fingerprint control booting according to claim 1, it is characterised in that: in S2 step, walked to S1 Suddenly it obtains collected finger print information to be verified by fingerprint verifying apparatus, the fingerprint verifying apparatus is by being integrated in the dress Encrypting and decrypting chip or embedded controller in setting verify finger print information, and the fingerprint verifying apparatus saves legal The finger print information of user is at least one, i.e. the legitimate user of the corresponding electronic equipment of fingerprint verifying apparatus is at least one.
4. the implementation method of fingerprint control booting according to claim 1, it is characterised in that: the S3 step includes following Step:
S31: after the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller reality Now exempt from password booting;
S32: the finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller reality Existing normal boot-strap, prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode Into system;
S33: unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller Realize normal boot-strap, prompt user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode into Enter system;
S34: unrecognized user interface, verifying number of attempt are limited in 3 times, substantially defeated after verifying number of attempt 3 times Enter output system notice embedded controller shutdown.
5. the implementation method of fingerprint control booting according to claim 1-4, it is characterised in that: to the fingerprint It before information is verified, further include that setting current authentication number is designated value, after verifying to finger print information, further includes: If the finger print information is unverified, current authentication number is added 1, and judges whether current authentication number is greater than and sets in advance Fixed threshold value, if it is, sounding an alarm, if it is not, then executing the step of receiving finger print information.
6. a kind of device of fingerprint control booting, it is characterised in that: include:
Acquire finger print information module;
For obtaining the fingerprint of user's typing by fingerprint sensor to operating system, and it will acquire collected finger print information hair It send and is stored into memory;
Authentication module;For being verified to the collected finger print information of acquisition;
Judgment module;For judging whether finger print information passes through the verifying of authentication module;
Fingerprint verifying apparatus will acquire collected finger print information and the finger print information of legitimate user compares, and be verified pair Than as a result, illustrating that the fingerprint is believed if proving and comparisom result is that the finger print information of the finger print information and legitimate user received is identical For breath by verifying, corresponding user is legitimate user;It is on the contrary then illustrate that the finger print information received is unverified, corresponding use Family is illegal user.
7. a kind of device of fingerprint control booting according to claim 6, it is characterised in that: the device further includes count module Block and alarm modules,
Counting module is used for before authentication module verifies finger print information, and setting current authentication number is designated value, right After finger print information is verified, if the finger print information is unverified, current authentication number is added 1, and judge currently to test Whether card number is greater than preset threshold value, if it is, instruction alarm modules sound an alarm, if it is not, then instruction acquisition Finger print information module executes the step of receiving finger print information;
Alarm template, for the step of being sounded an alarm according to instruction, the execution of counting module.
8. a kind of device of fingerprint control booting according to claim 6, it is characterised in that:
The judgment module includes:
After the finger print information is identified, while power button is pressed, and fingerprint mould group signals to embedded controller realization and exempts from Password booting;
The finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller and realizes just Normally opened machine prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint input, or input pin mode enters System;
Unauthorized finger print information is unrecognized, while power button is pressed, and fingerprint mould group signals to embedded controller realization Normal boot-strap prompts user fingerprints unrecognized, while receiving user and continuing to attempt to fingerprint, or input pin mode enters and is System;
Unrecognized user interface, verifying number of attempt are limited in 3 times, after verifying number of attempt 3 times, are inputted substantially defeated System notice embedded controller shutdown out.
9. a kind of computer readable storage medium, is stored thereon with computer instruction, it is characterised in that: the computer instruction fortune Perform claim requires the step of implementation method of 1 to 4 described in any item fingerprint control bootings when row.
10. a kind of terminal, it is characterised in that: including memory and processor, storing on the memory can be at the place The computer instruction run on reason device, perform claim requires any one of 1 to 4 institute when the processor runs the computer instruction The step of implementation method for the fingerprint control booting stated.
CN201810900823.8A 2018-08-09 2018-08-09 A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting Pending CN108959894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810900823.8A CN108959894A (en) 2018-08-09 2018-08-09 A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810900823.8A CN108959894A (en) 2018-08-09 2018-08-09 A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting

Publications (1)

Publication Number Publication Date
CN108959894A true CN108959894A (en) 2018-12-07

Family

ID=64468531

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810900823.8A Pending CN108959894A (en) 2018-08-09 2018-08-09 A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting

Country Status (1)

Country Link
CN (1) CN108959894A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222493A (en) * 2019-05-14 2019-09-10 浙江无极互联科技有限公司 A kind of computer booting authentication system and method
WO2021104401A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Electronic device and method for logging in operating system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127996A (en) * 2007-09-24 2008-02-20 中兴通讯股份有限公司 A power on key and power on method
CN103838992A (en) * 2014-03-03 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Fingerprint identifying method and terminal
CN105574383A (en) * 2015-04-17 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Terminal system management method and device
CN205370269U (en) * 2016-01-07 2016-07-06 黑龙江省农业科学院佳木斯水稻研究所 Bill safe based on fingerprint identification technology
CN106815505A (en) * 2015-11-27 2017-06-09 北京奇虎科技有限公司 A kind of identification and the method and terminal of unlock terminal
CN108156310A (en) * 2017-11-27 2018-06-12 深圳市金立通信设备有限公司 A kind of method and system of finger prints processing, terminal device and computer-readable medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127996A (en) * 2007-09-24 2008-02-20 中兴通讯股份有限公司 A power on key and power on method
CN103838992A (en) * 2014-03-03 2014-06-04 宇龙计算机通信科技(深圳)有限公司 Fingerprint identifying method and terminal
CN105574383A (en) * 2015-04-17 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Terminal system management method and device
CN106815505A (en) * 2015-11-27 2017-06-09 北京奇虎科技有限公司 A kind of identification and the method and terminal of unlock terminal
CN205370269U (en) * 2016-01-07 2016-07-06 黑龙江省农业科学院佳木斯水稻研究所 Bill safe based on fingerprint identification technology
CN108156310A (en) * 2017-11-27 2018-06-12 深圳市金立通信设备有限公司 A kind of method and system of finger prints processing, terminal device and computer-readable medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222493A (en) * 2019-05-14 2019-09-10 浙江无极互联科技有限公司 A kind of computer booting authentication system and method
WO2021104401A1 (en) * 2019-11-30 2021-06-03 华为技术有限公司 Electronic device and method for logging in operating system

Similar Documents

Publication Publication Date Title
CN109255211B (en) Mobile security countermeasure
US10083304B2 (en) Technologies for enhanced user authentication using advanced sensor monitoring
CN106330850B (en) Security verification method based on biological characteristics, client and server
EP3005202B1 (en) System and method for biometric authentication with device attestation
US20220092901A1 (en) System and method for providing credential activation layered security
US8407762B2 (en) System for three level authentication of a user
US20160180068A1 (en) Technologies for login pattern based multi-factor authentication
WO2017113380A1 (en) Fingerprint recognition method and apparatus, and touch-screen terminal
TW201546645A (en) Method and system for verifying identities
WO2007112023A2 (en) Secure biometric processing system and method of use
CN103646201A (en) Verification method achieved by combining human faces with identities
CN109614799B (en) Information authentication method
CN108965222A (en) Identity identifying method, system and computer readable storage medium
Lovisotto et al. Mobile biometrics in financial services: A five factor framework
CN103646200B (en) The coding encrypting of a kind of face information and application process
EP3543938B1 (en) Authentication of a transaction card using a multimedia file
CN109933966A (en) Continuous authentication method and system based on biological characteristics
CN108959894A (en) A kind of implementation method and device, computer readable storage medium, terminal of fingerprint control booting
Bodepudi et al. Cloud-Based Biometric Authentication Techniques for Secure Financial Transactions: A Review
CN103368736A (en) Business information encryption and decryption method and device
JP3589579B2 (en) Biometric authentication device and recording medium on which processing program is recorded
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN106156590A (en) A kind of computer startup processing method and processing system
CN104751042A (en) Credibility detection method based on password hash and biometric feature recognition
US10841300B2 (en) System, method and computer programs for user authentication and/or authorization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207

RJ01 Rejection of invention patent application after publication