CN103279411A - Method and system of entering application programs based on fingerprint identification - Google Patents
Method and system of entering application programs based on fingerprint identification Download PDFInfo
- Publication number
- CN103279411A CN103279411A CN2013102223809A CN201310222380A CN103279411A CN 103279411 A CN103279411 A CN 103279411A CN 2013102223809 A CN2013102223809 A CN 2013102223809A CN 201310222380 A CN201310222380 A CN 201310222380A CN 103279411 A CN103279411 A CN 103279411A
- Authority
- CN
- China
- Prior art keywords
- portable terminal
- application program
- account
- password
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a method of entering application programs based on fingerprint identification. The method includes a detection step: when a mobile terminal is detected to be connected with a computer, prompting a user to input fingerprint information to obtain user privileges; a fingerprint obtaining step; a fingerprint verification step; an application program loading step; when the verification is passed, starting an application software interface in the mobile terminal, and displaying on the computer; meanwhile, reading data information in the mobile terminal to allow icons corresponding to the application programs to load in the software interface; an application starting step; and when the user selects an icon corresponding to an optional application program, taking an account number and passwords corresponding to the icon, and logging in a corresponding application program through the computer automatically. Correspondingly, the invention provides a system. By the aid of the method and the system of entering application programs based on the fingerprint identification, the account number and passwords corresponding to each application program can be stored safely for the user, the account number and passwords can be prevented from being confused in memory, forgotten, leaked or stolen, and confidentiality is high.
Description
Technical field
The present invention relates to the fingerprint recognition applied technical field, particularly a kind of method and system that enter application program based on fingerprint recognition.
Background technology
Along with Internet development, people have increasing various number of the account and corresponding password, how to guarantee the otherness of number of the account and password, avoid that identical password is set or password is obscured by note, are more and more perplexing people.If it is identical that all accounts and password all use, then can cause after losing an account and password, make and all accounts and password leakage cause heavy losses.If each uses different username and passwords, then can cause unavoidably often obscuring password, and cause and normally to use.If all passwords are kept in papery book or the computer, there is the stolen problem of such code data again, be stored in the computer even encrypt, finally still need a password to protect, if being eavesdropped, this password will cause all password leakage.
Summary of the invention
Fundamental purpose of the present invention is, at above-mentioned deficiency of the prior art, provides a kind of and enters the method and system of application program based on fingerprint recognition, realizes the encryption storage of number of the account and password, and related with corresponding application program, login automatically as required.
The present invention solves the technical scheme that the prior art problem adopts: a kind ofly enter the method for application program based on fingerprint recognition, it comprises
Detect step: when detecting portable terminal and be connected with computing machine, point out user's typing finger print information to obtain user right;
Fingerprint obtaining step: the finger print information that obtains user's typing;
Fingerprint authentication step: the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program is written into step: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching step: when the user has selected the icon of arbitrary application program correspondence, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
Below technique scheme is further elaborated:
Also comprise registration step, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
Further comprise number of the account deletion step, at number of the account and the password of described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
Described application program launching step specifically may further comprise the steps:
Judge the icon of the corresponding application program that the user selects;
Read storage in the portable terminal with described icon corresponding account number and password encryption data;
According to predetermined key described number of the account and password encryption data are decrypted;
Carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Further comprise
Initialization step: to described portable terminal global data time initialization, and the application program that this portable terminal is inner with it is carried out authentication.
Authentication process specifically may further comprise the steps in the described initialization step
Portable terminal produces one group of random number key, and this random number key is stored in the described portable terminal;
Application software produces the random number A of designated length and calculates cryptographic hash A, then random number A and cryptographic hash A is encrypted formation enciphered data A by the key of making an appointment, and sends to portable terminal;
After portable terminal is received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine;
After computing machine was received described enciphered data B, the random number B that portable terminal produces was obtained in the decruption key deciphering by appointment, sent to portable terminal behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal then;
Behind the enciphered data C that the computing machine that portable terminal is received sends, the random number B that portable terminal produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal with application software;
Application software is received the enciphered data D of portable terminal, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then the portable terminal authentication is passed through, otherwise interrupts communication.
The present invention also provides a kind of and has entered the system of application program based on fingerprint recognition, and it comprises
Detection module: be used for when detecting portable terminal and be connected with computing machine, pointing out user's typing finger print information to obtain user right;
Fingerprint acquisition module: be used for obtaining the finger print information of user's typing;
Fingerprint authentication module: be used for the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program insmods: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching module: when the user has selected arbitrary application program image timestamp, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
Below technique scheme is further elaborated:
Also comprise Registering modules, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
Further comprise the number of the account removing module, be used for number of the account and password in described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
Described application program launching module specifically comprises:
Judge module is judged the corresponding application icon that the user selects;
Read module, read storage in the portable terminal with described icon corresponding account number and password encryption data;
Deciphering module is decrypted described number of the account and password encryption data according to predetermined key;
Land module, carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
The invention has the beneficial effects as follows: the present invention is stored in each application program corresponding account number of user and password the CPU internal storage areas of portable terminal, obtain the authorization by the fingerprint recognition mode and to conduct interviews, and with the computing machine communication, by the application software interface in the computing machine demonstration portable terminal, the user can choose the application program that need land at the application software interface, then can transfer number of the account automatically and password lands automatically, so, avoid the complicated processes of user record or storage password, help user security to store each application program corresponding account number and password, can effectively prevent number of the account and password the note obscure, forget, leakage or stolen, the security performance height.In addition, login can solve numerous passwords to the worry that people bring automatically, avoids inputing the complicated processes of password, and it is simple and efficient to handle.
Description of drawings
Fig. 1 is the running environment figure of system of the present invention;
Fig. 2 is the process flow diagram of the inventive method;
Fig. 3 is the process flow diagram of authentication process in the inventive method;
Fig. 4 is the functional block diagram of system of the present invention;
The realization of the object of the invention, functional characteristics and advantage will be in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Describe technical scheme of the present invention in detail below with reference to drawings and the specific embodiments, so as clearer, understand invention essence of the present invention intuitively.
With reference to shown in Figure 1, running environment figure for system of the present invention, in the present embodiment, the system 300 that enters application program based on fingerprint recognition runs on the portable terminal 200, portable terminal 200 has a fingerprint identification module 400, for example can be the band fingerprint recognition terminals such as USB flash disk all can, its inside has data-carrier store, carry out communication with computing machine 100, the display screen 110 by computing machine 100 shows and application program is landed etc.
With reference to shown in Figure 2, present embodiment provides a kind of and has entered the method for application program based on fingerprint recognition, and it comprises:
S10, detect step: when detecting portable terminal 200 and be connected with computing machine 100, point out user's typing finger print information to obtain user right, only after the user obtains the authorization, just can be to portable terminal 200 visit of being correlated with;
S20, fingerprint obtaining step: the finger print information that obtains user's typing;
S30, fingerprint authentication step: the authentication fingerprint template of storage in described finger print information and the described portable terminal 200 is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
S40, application program are written into step: after checking is passed through, start and use software interface in the portable terminal 200, and be shown in described computing machine 100, simultaneously, read data message in the portable terminal 200, make the icon corresponding with application program be written into described application software interface;
S50, application program launching step: when the user has selected the icon of arbitrary application program correspondence, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine 100.This application program launching step specifically may further comprise the steps:
Judge the icon of the corresponding application program that the user selects;
Read storage in the portable terminal 200 with described icon corresponding account number and password encryption data;
According to predetermined key described number of the account and password encryption data are decrypted;
Carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Certainly, in system uses for the first time, also comprise registration step and number of the account deletion step, after the user obtains authority and enters described application software interface, can be at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal 200 after encrypting, and each number of the account and password are associated with the icon of corresponding application program, for example by searching application icons such as 126 mailboxes, QQ, Gmail, input user's number of the account and password are kept at described number of the account and password in the mobile device by application software; The user can be at number of the account and the password of described application software interface deletion different application, and this number of the account and password are wiped off from described portable terminal 200.
In addition, in real process, also comprise:
S00, initialization step: to described portable terminal 200 global data time initialization, and these portable terminal 200 application programs inner with it are carried out authentication.With reference to shown in Figure 3, authentication process specifically may further comprise the steps in this beginning step:
S01, portable terminal 200 produce one group of random number key, and this random number key are stored in the described portable terminal 200;
S02, application software produce the random number A of designated length and calculate cryptographic hash A, then random number A and cryptographic hash A are encrypted formation enciphered data A by the key of making an appointment, and send to portable terminal 200;
After S03, portable terminal 200 are received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal 200 produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine 100;
After S04, computing machine 100 are received described enciphered data B, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to portable terminal 200 behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal 200 then;
Behind the enciphered data C that the computing machine 100 that S05, portable terminal 200 are received sends, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal 200 with application software;
S06, application software are received the enciphered data D of portable terminal 200, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then portable terminal 200 authentications are passed through, otherwise interrupt communication.
After the authentication success, follow-up all communication processs all are encrypted whole communication process and related data by the authentication random number, and each communication is upgraded random number according to Content of communciation, avoids data to be monitored or portable terminal 200 is pretended to be with computing machine 100 any one party to reach.
Meanwhile, after the authentication success, whether system also individualizes to mobile device is detected, so-called individualized refers to the authentication fingerprint template whether typing has the user, if individualized, execution in step S10-S50 then, otherwise, prompting user typing fingerprint, as user's authentication fingerprint template, this authentication fingerprint template is stored in the portable terminal 200.
With reference to shown in Figure 4, the present invention also provides a kind of and has entered the system of application program based on fingerprint recognition, and it comprises:
Detection module 10: be used for when detecting portable terminal 200 and be connected with computing machine 100, pointing out user's typing finger print information to obtain user right;
Fingerprint acquisition module 20: be used for obtaining the finger print information of user's typing;
Fingerprint authentication module 30: be used for the authentication fingerprint template of storage in described finger print information and the described portable terminal 200 is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program insmods 40: after checking is passed through, start and use software interface in the portable terminal 200, and be shown in described computing machine 100, simultaneously, read data message in the portable terminal 200, make the icon corresponding with application program be written into described application software interface;
Application program launching module 50: when the user has selected arbitrary application program image timestamp, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine 100.Concrete, this is stated the application program launching module and specifically comprises:
Judge module is judged the corresponding application icon that the user selects;
Read module, read storage in the portable terminal 200 with described icon corresponding account number and password encryption data;
Deciphering module is decrypted described number of the account and password encryption data according to predetermined key;
Land module, carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Further, also comprise Registering modules 60 and number of the account removing module 70, described Registering modules 60 is used for number of the account and the password in described application software interface registration different application, and this number of the account and password are stored in the described portable terminal 200 after encrypting.Number of the account removing module 70 is used for number of the account and the password in described application software interface deletion different application, and this number of the account and password are wiped off from described portable terminal 200.
Further, also comprise initialization step module 80: be used for described portable terminal 200 global data time initialization, and these portable terminal 200 application programs inner with it are carried out authentication.Wherein authentication process specifically may further comprise the steps:
Application software produces the random number A of designated length and calculates cryptographic hash A, then random number A and cryptographic hash A is encrypted formation enciphered data A by the key of making an appointment, and sends to portable terminal 200;
After portable terminal 200 is received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal 200 produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine 100;
After computing machine 100 is received described enciphered data B, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to portable terminal 200 behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal 200 then;
Behind the enciphered data C that the computing machine 100 that portable terminal 200 is received sends, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal 200 with application software;
Application software is received the enciphered data D of portable terminal 200, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then portable terminal 200 authentications are passed through, otherwise interrupt communication.
Further again, also comprise the outer file module 91 of the close dish data module 90 of storage and encryption and decryption, the close dish data module 90 of wherein said storage is used for to the extended memory storage of described portable terminal 200 or reads data, and the process of reading is: u dish data are read in computing machine 100 requests; Mobile device reads data in the extended memory, and is decrypted by key; Send the data to computing machine 100; Storing process is: computing machine 100 requests write data; Portable terminal 200 is received data, and is encrypted by key; Portable terminal 200 will be encrypted the back data and deposit extended memory in, and return to computing machine 100 promptings.The outer file module 91 of described encryption and decryption is used for portable terminal 200 external datas are encrypted and decipher, and reaches protection user sensitive data demand, and its ciphering process is: user's filesselected is encrypted; Application software generates the random number key, and the file that the user is chosen is encrypted; With the random number key, send into portable terminal 200, portable terminal 200 is encrypted and returns the random number key by user data key; Application software will be encrypted the back key and be write the encrypt file afterbody, finish encryption; Its decrypting process is: user's filesselected is decrypted; Application software reads the ciphertext of tail of file key, sends into portable terminal 200 deciphering and obtains key plain; Be decrypted by key-pair file, and remove afterbody and add content, finish deciphering.
In sum, method and system provided by the invention, each application program corresponding account number of user and password can be stored in the CPU internal storage areas of portable terminal 200, obtain the authorization by the fingerprint recognition mode and to conduct interviews, and with computing machine 100 communications, by the application software interface in the computing machine 100 demonstration portable terminals 200, the user can choose the application program that need land at the application software interface, then can transfer number of the account automatically and password lands automatically, so, avoid the complicated processes of user record or storage password, help user security to store each application program corresponding account number and password, can effectively prevent number of the account and password the note obscure, forget, leakage or stolen, the security performance height.In addition, login can solve numerous passwords to the worry that people bring automatically, avoids inputing the complicated processes of password, and it is simple and efficient to handle.
The above only is the preferred embodiments of the present invention; be not so limit its claim; every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to do; directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.
Claims (10)
1. one kind enters the method for application program based on fingerprint recognition, and it is characterized in that: it comprises
Detect step: when detecting portable terminal and be connected with computing machine, point out user's typing finger print information to obtain user right;
Fingerprint obtaining step: the finger print information that obtains user's typing;
Fingerprint authentication step: the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program is written into step: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching step: when the user has selected the icon of arbitrary application program correspondence, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
2. according to the described method that enters application program based on fingerprint recognition of claim 1, it is characterized in that: also comprise registration step, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
3. according to the described method that enters application program based on fingerprint recognition of claim 1, it is characterized in that: further comprise number of the account deletion step, at number of the account and the password of described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
4. enter the method for application program according to claim 1 is described based on fingerprint recognition, it is characterized in that: described application program launching step specifically may further comprise the steps:
Judge the icon of the corresponding application program that the user selects;
Read storage in the portable terminal with described icon corresponding account number and password encryption data;
According to predetermined key described number of the account and password encryption data are decrypted;
Carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
5. according to claim 1ly enter the method for application program based on fingerprint recognition, it is characterized in that: further comprise
Initialization step: to described portable terminal global data time initialization, and the application program that this portable terminal is inner with it is carried out authentication.
6. according to claim 5ly enter the method for application program based on fingerprint recognition, it is characterized in that: authentication process specifically may further comprise the steps in the described initialization step
Portable terminal produces one group of random number key, and this random number key is stored in the described portable terminal;
Application software produces the random number A of designated length and calculates cryptographic hash A, then random number A and cryptographic hash A is encrypted formation enciphered data A by the key of making an appointment, and sends to portable terminal;
After portable terminal is received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine;
After computing machine was received described enciphered data B, the random number B that portable terminal produces was obtained in the decruption key deciphering by appointment, sent to portable terminal behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal then;
Behind the enciphered data C that the computing machine that portable terminal is received sends, the random number B that portable terminal produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal with application software;
Application software is received the enciphered data D of portable terminal, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then the portable terminal authentication is passed through, otherwise interrupts communication.
7. one kind enters the system of application program based on fingerprint recognition, and it is characterized in that: it comprises
Detection module: be used for when detecting portable terminal and be connected with computing machine, pointing out user's typing finger print information to obtain user right;
Fingerprint acquisition module: be used for obtaining the finger print information of user's typing;
Fingerprint authentication module: be used for the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program insmods: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching module: when the user has selected arbitrary application program image timestamp, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
8. according to the described system that enters application program based on fingerprint recognition of claim 7, it is characterized in that: also comprise Registering modules, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
9. according to the described system that enters application program based on fingerprint recognition of claim 7, it is characterized in that: further comprise the number of the account removing module, be used for number of the account and password in described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
10. enter the system of application program according to claim 7 is described based on fingerprint recognition, it is characterized in that: described application program launching module specifically comprises:
Judge module is judged the corresponding application icon that the user selects;
Read module, read storage in the portable terminal with described icon corresponding account number and password encryption data;
Deciphering module is decrypted described number of the account and password encryption data according to predetermined key;
Land module, carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310222380.9A CN103279411B (en) | 2013-06-06 | 2013-06-06 | Enter the method and system of application program based on fingerprint recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310222380.9A CN103279411B (en) | 2013-06-06 | 2013-06-06 | Enter the method and system of application program based on fingerprint recognition |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103279411A true CN103279411A (en) | 2013-09-04 |
CN103279411B CN103279411B (en) | 2016-05-25 |
Family
ID=49061940
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310222380.9A Expired - Fee Related CN103279411B (en) | 2013-06-06 | 2013-06-06 | Enter the method and system of application program based on fingerprint recognition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103279411B (en) |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488930A (en) * | 2013-09-23 | 2014-01-01 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103488481A (en) * | 2013-09-11 | 2014-01-01 | 华为技术有限公司 | Application program control method, terminal equipment and remote control system |
CN103685232A (en) * | 2013-11-11 | 2014-03-26 | 上海乐今通信技术有限公司 | Mobile terminal and mobile application login method |
CN103942472A (en) * | 2014-04-14 | 2014-07-23 | 立德高科(北京)数码科技有限责任公司 | Method and device used for preventing unauthorized user from starting software |
CN103957202A (en) * | 2014-04-22 | 2014-07-30 | 中国工商银行股份有限公司 | Safety login method and system |
CN103984888A (en) * | 2014-05-23 | 2014-08-13 | 深圳市中兴移动通信有限公司 | Method and device for helping user to activate application program binding with fingerprint |
CN104239107A (en) * | 2014-09-23 | 2014-12-24 | 三星电子(中国)研发中心 | Application customizing method and application customizing device |
CN104320256A (en) * | 2014-10-20 | 2015-01-28 | 厦门美图移动科技有限公司 | Method for achieving fingerprint universal password verification |
CN104636682A (en) * | 2015-02-09 | 2015-05-20 | 上海瀚银信息技术有限公司 | Password management system and method based on hardware device |
CN104657652A (en) * | 2015-03-24 | 2015-05-27 | 北京京东尚科信息技术有限公司 | Method and system for logging in mobile application |
CN104933343A (en) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | Secrecy method and apparatus of application program, and electronic device |
CN105046135A (en) * | 2015-08-28 | 2015-11-11 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display apparatus and terminal |
CN105159730A (en) * | 2015-09-30 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Application control method, application control device and terminal |
CN105320868A (en) * | 2014-12-22 | 2016-02-10 | 维沃移动通信有限公司 | Application encryption method and mobile terminal |
WO2016054890A1 (en) * | 2014-10-11 | 2016-04-14 | 深圳市汇顶科技股份有限公司 | Fingerprint input information processing method, system and mobile terminal |
CN105740670A (en) * | 2016-01-28 | 2016-07-06 | 百度在线网络技术(北京)有限公司 | Application encryption method and device, and application startup method and device |
CN105912911A (en) * | 2016-04-29 | 2016-08-31 | 乐视控股(北京)有限公司 | Method and system for managing application programs of mobile equipment |
WO2017031808A1 (en) * | 2015-08-27 | 2017-03-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint recognition-based account login method, apparatus and terminal |
CN107172298A (en) * | 2017-06-26 | 2017-09-15 | 广东欧珀移动通信有限公司 | Information processing method, device, computer equipment and computer-readable recording medium |
CN107517217A (en) * | 2017-09-13 | 2017-12-26 | 北京理工大学 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
CN108400969A (en) * | 2018-01-17 | 2018-08-14 | 中国地质大学(武汉) | A kind of striding equipment, cross-platform safe login method |
CN108965472A (en) * | 2018-08-23 | 2018-12-07 | 珠海格力电器股份有限公司 | Account information pushing method and device |
CN109308425A (en) * | 2017-07-26 | 2019-02-05 | 山东华芯半导体有限公司 | Based on encrypting fingerprint and the USB flash disk for supporting password generation to fill out and USB flash disk encryption method |
CN109685004A (en) * | 2018-12-24 | 2019-04-26 | 北京长城华冠汽车技术开发有限公司 | Vehicle entertainment system login system and vehicle entertainment system login method based on fingerprint recognition |
CN109754592A (en) * | 2018-12-26 | 2019-05-14 | 天长市志铖电子科技有限公司 | A kind of method and terminal universal remote control of quick start remote control applications program |
CN110390746A (en) * | 2019-06-16 | 2019-10-29 | 广州智慧城市发展研究院 | A kind of implementation method of fingerprint anti-theft gate inhibition |
CN110502963A (en) * | 2018-09-12 | 2019-11-26 | 深圳市文鼎创数据科技有限公司 | Fingerprint verification method, fingerprint certification device and terminal |
CN110545249A (en) * | 2018-05-28 | 2019-12-06 | 珠海格力电器股份有限公司 | Information recording method, display method and device |
CN110602052A (en) * | 2019-08-15 | 2019-12-20 | 平安科技(深圳)有限公司 | Micro-service processing method and server |
CN110929245A (en) * | 2020-01-02 | 2020-03-27 | 中国银行股份有限公司 | Fast login method and terminal based on fingerprint |
CN112307441A (en) * | 2020-10-13 | 2021-02-02 | 洛阳理工学院 | Computer software protection system |
CN112597470A (en) * | 2021-01-22 | 2021-04-02 | 建投物联股份有限公司 | Intelligent safe biological secret treasure system |
CN113302604A (en) * | 2018-11-15 | 2021-08-24 | 伊利亚·弗拉基米罗维奇·烈德科卡申 | Automatic registration method |
CN113347159A (en) * | 2021-05-18 | 2021-09-03 | 浪潮金融信息技术有限公司 | Data transmission method and system of self-service terminal and storage medium |
CN113495792A (en) * | 2020-03-20 | 2021-10-12 | 中标软件有限公司 | Method for realizing adaptation interface of operating system to fingerprint equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101383704A (en) * | 2008-04-23 | 2009-03-11 | 鲁东大学 | Cipher module based on finger print recognition technology |
US20090119545A1 (en) * | 2007-11-07 | 2009-05-07 | Microsoft Corporation | Correlating complex errors with generalized end-user tasks |
CN102281539A (en) * | 2011-08-29 | 2011-12-14 | 惠州Tcl移动通信有限公司 | Mobile terminal and application program login method thereof |
-
2013
- 2013-06-06 CN CN201310222380.9A patent/CN103279411B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090119545A1 (en) * | 2007-11-07 | 2009-05-07 | Microsoft Corporation | Correlating complex errors with generalized end-user tasks |
CN101383704A (en) * | 2008-04-23 | 2009-03-11 | 鲁东大学 | Cipher module based on finger print recognition technology |
CN102281539A (en) * | 2011-08-29 | 2011-12-14 | 惠州Tcl移动通信有限公司 | Mobile terminal and application program login method thereof |
Cited By (43)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488481A (en) * | 2013-09-11 | 2014-01-01 | 华为技术有限公司 | Application program control method, terminal equipment and remote control system |
CN103488481B (en) * | 2013-09-11 | 2017-02-15 | 华为技术有限公司 | Application program control method, terminal equipment and remote control system |
CN103488930A (en) * | 2013-09-23 | 2014-01-01 | 北京奇虎科技有限公司 | Method and device for processing file/application program on mobile communication terminal |
CN103685232A (en) * | 2013-11-11 | 2014-03-26 | 上海乐今通信技术有限公司 | Mobile terminal and mobile application login method |
CN103942472A (en) * | 2014-04-14 | 2014-07-23 | 立德高科(北京)数码科技有限责任公司 | Method and device used for preventing unauthorized user from starting software |
CN103942472B (en) * | 2014-04-14 | 2016-09-14 | 立德高科(北京)数码科技有限责任公司 | The method and device of software is started for the person that shields unauthorized use |
CN103957202A (en) * | 2014-04-22 | 2014-07-30 | 中国工商银行股份有限公司 | Safety login method and system |
CN103984888A (en) * | 2014-05-23 | 2014-08-13 | 深圳市中兴移动通信有限公司 | Method and device for helping user to activate application program binding with fingerprint |
CN103984888B (en) * | 2014-05-23 | 2016-04-06 | 努比亚技术有限公司 | A kind of assisting users activates method and the device of the application program of fingerprint binding |
CN104239107A (en) * | 2014-09-23 | 2014-12-24 | 三星电子(中国)研发中心 | Application customizing method and application customizing device |
WO2016054890A1 (en) * | 2014-10-11 | 2016-04-14 | 深圳市汇顶科技股份有限公司 | Fingerprint input information processing method, system and mobile terminal |
CN104320256A (en) * | 2014-10-20 | 2015-01-28 | 厦门美图移动科技有限公司 | Method for achieving fingerprint universal password verification |
CN105320868B (en) * | 2014-12-22 | 2018-09-04 | 维沃移动通信有限公司 | The encryption method and mobile terminal of application program |
CN105320868A (en) * | 2014-12-22 | 2016-02-10 | 维沃移动通信有限公司 | Application encryption method and mobile terminal |
CN104636682A (en) * | 2015-02-09 | 2015-05-20 | 上海瀚银信息技术有限公司 | Password management system and method based on hardware device |
CN104657652A (en) * | 2015-03-24 | 2015-05-27 | 北京京东尚科信息技术有限公司 | Method and system for logging in mobile application |
CN104933343A (en) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | Secrecy method and apparatus of application program, and electronic device |
WO2017000523A1 (en) * | 2015-07-01 | 2017-01-05 | 京东方科技集团股份有限公司 | Security method and apparatus for application program, and electronic device |
WO2017031808A1 (en) * | 2015-08-27 | 2017-03-02 | 宇龙计算机通信科技(深圳)有限公司 | Fingerprint recognition-based account login method, apparatus and terminal |
CN105046135A (en) * | 2015-08-28 | 2015-11-11 | 宇龙计算机通信科技(深圳)有限公司 | Information display method, information display apparatus and terminal |
CN105159730A (en) * | 2015-09-30 | 2015-12-16 | 宇龙计算机通信科技(深圳)有限公司 | Application control method, application control device and terminal |
CN105740670B (en) * | 2016-01-28 | 2019-01-22 | 百度在线网络技术(北京)有限公司 | Using encryption, starting method and apparatus |
CN105740670A (en) * | 2016-01-28 | 2016-07-06 | 百度在线网络技术(北京)有限公司 | Application encryption method and device, and application startup method and device |
CN105912911A (en) * | 2016-04-29 | 2016-08-31 | 乐视控股(北京)有限公司 | Method and system for managing application programs of mobile equipment |
CN107172298A (en) * | 2017-06-26 | 2017-09-15 | 广东欧珀移动通信有限公司 | Information processing method, device, computer equipment and computer-readable recording medium |
CN107172298B (en) * | 2017-06-26 | 2020-05-26 | Oppo广东移动通信有限公司 | Information processing method, information processing device, computer equipment and computer readable storage medium |
CN109308425A (en) * | 2017-07-26 | 2019-02-05 | 山东华芯半导体有限公司 | Based on encrypting fingerprint and the USB flash disk for supporting password generation to fill out and USB flash disk encryption method |
CN107517217A (en) * | 2017-09-13 | 2017-12-26 | 北京理工大学 | A kind of multiple-factor wireless key fill system based on fingerprint recognition |
CN108400969A (en) * | 2018-01-17 | 2018-08-14 | 中国地质大学(武汉) | A kind of striding equipment, cross-platform safe login method |
CN110545249A (en) * | 2018-05-28 | 2019-12-06 | 珠海格力电器股份有限公司 | Information recording method, display method and device |
CN108965472A (en) * | 2018-08-23 | 2018-12-07 | 珠海格力电器股份有限公司 | Account information pushing method and device |
CN110502963A (en) * | 2018-09-12 | 2019-11-26 | 深圳市文鼎创数据科技有限公司 | Fingerprint verification method, fingerprint certification device and terminal |
CN113302604A (en) * | 2018-11-15 | 2021-08-24 | 伊利亚·弗拉基米罗维奇·烈德科卡申 | Automatic registration method |
CN109685004A (en) * | 2018-12-24 | 2019-04-26 | 北京长城华冠汽车技术开发有限公司 | Vehicle entertainment system login system and vehicle entertainment system login method based on fingerprint recognition |
CN109754592A (en) * | 2018-12-26 | 2019-05-14 | 天长市志铖电子科技有限公司 | A kind of method and terminal universal remote control of quick start remote control applications program |
CN110390746A (en) * | 2019-06-16 | 2019-10-29 | 广州智慧城市发展研究院 | A kind of implementation method of fingerprint anti-theft gate inhibition |
CN110602052A (en) * | 2019-08-15 | 2019-12-20 | 平安科技(深圳)有限公司 | Micro-service processing method and server |
CN110929245A (en) * | 2020-01-02 | 2020-03-27 | 中国银行股份有限公司 | Fast login method and terminal based on fingerprint |
CN113495792A (en) * | 2020-03-20 | 2021-10-12 | 中标软件有限公司 | Method for realizing adaptation interface of operating system to fingerprint equipment |
CN112307441A (en) * | 2020-10-13 | 2021-02-02 | 洛阳理工学院 | Computer software protection system |
CN112597470A (en) * | 2021-01-22 | 2021-04-02 | 建投物联股份有限公司 | Intelligent safe biological secret treasure system |
CN113347159A (en) * | 2021-05-18 | 2021-09-03 | 浪潮金融信息技术有限公司 | Data transmission method and system of self-service terminal and storage medium |
CN113347159B (en) * | 2021-05-18 | 2024-04-02 | 浪潮金融信息技术有限公司 | Data transmission method, system and storage medium of self-service terminal |
Also Published As
Publication number | Publication date |
---|---|
CN103279411B (en) | 2016-05-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103279411B (en) | Enter the method and system of application program based on fingerprint recognition | |
US9301140B1 (en) | Behavioral authentication system using a secure element, a behaviometric server and cryptographic servers to authenticate users | |
US11962694B2 (en) | Key pair generation based on environmental factors | |
US8656455B1 (en) | Managing data loss prevention policies | |
US20150012748A1 (en) | Method And System For Protecting Data | |
EP2628133B1 (en) | Authenticate a fingerprint image | |
EP2881863A1 (en) | Method for implementing encryption in storage card, and decryption method and device | |
US20150304321A1 (en) | An image management system and an image management method based on fingerprint authentication | |
TWI724684B (en) | Method, system and device for performing cryptographic operations subject to identity verification | |
WO2017081603A2 (en) | Method and system for protecting and utilizing internet identity, using smartphone | |
CN106100851B (en) | Password management system, intelligent wristwatch and its cipher management method | |
US11405782B2 (en) | Methods and systems for securing and utilizing a personal data store on a mobile device | |
CN107026730B (en) | Data processing method, device and system | |
NO340355B1 (en) | 2-factor authentication for network connected storage device | |
CN111445231A (en) | Method and device for realizing MOTOpay and electronic equipment | |
US8819802B2 (en) | User authentication | |
KR101156102B1 (en) | Memory card reader apparatus having security features and the method thereof | |
CN106156701A (en) | A kind of fingerprint identification device, fingerprint identification device identification system and recognition methods | |
CN102647415A (en) | Audio-interface-based method and system for providing identity authentication | |
CN107135074A (en) | A kind of advanced security method and apparatus | |
CN104243168A (en) | Credible mobile module based on Java smart card | |
CN201886495U (en) | Authentication device with image recognition function | |
Kamal et al. | Secure Mobile ID Architecture on Android Devices based on Trust Zone | |
WO2017020449A1 (en) | Fingerprint reading method and user equipment | |
CN102087683A (en) | Password management and verification method suitable for trusted platform module (TPM) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20160525 Termination date: 20210606 |
|
CF01 | Termination of patent right due to non-payment of annual fee |