[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN103279411A - Method and system of entering application programs based on fingerprint identification - Google Patents

Method and system of entering application programs based on fingerprint identification Download PDF

Info

Publication number
CN103279411A
CN103279411A CN2013102223809A CN201310222380A CN103279411A CN 103279411 A CN103279411 A CN 103279411A CN 2013102223809 A CN2013102223809 A CN 2013102223809A CN 201310222380 A CN201310222380 A CN 201310222380A CN 103279411 A CN103279411 A CN 103279411A
Authority
CN
China
Prior art keywords
portable terminal
application program
account
password
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102223809A
Other languages
Chinese (zh)
Other versions
CN103279411B (en
Inventor
刘洪磊
张永穆
张忠波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201310222380.9A priority Critical patent/CN103279411B/en
Publication of CN103279411A publication Critical patent/CN103279411A/en
Application granted granted Critical
Publication of CN103279411B publication Critical patent/CN103279411B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a method of entering application programs based on fingerprint identification. The method includes a detection step: when a mobile terminal is detected to be connected with a computer, prompting a user to input fingerprint information to obtain user privileges; a fingerprint obtaining step; a fingerprint verification step; an application program loading step; when the verification is passed, starting an application software interface in the mobile terminal, and displaying on the computer; meanwhile, reading data information in the mobile terminal to allow icons corresponding to the application programs to load in the software interface; an application starting step; and when the user selects an icon corresponding to an optional application program, taking an account number and passwords corresponding to the icon, and logging in a corresponding application program through the computer automatically. Correspondingly, the invention provides a system. By the aid of the method and the system of entering application programs based on the fingerprint identification, the account number and passwords corresponding to each application program can be stored safely for the user, the account number and passwords can be prevented from being confused in memory, forgotten, leaked or stolen, and confidentiality is high.

Description

Enter the method and system of application program based on fingerprint recognition
Technical field
The present invention relates to the fingerprint recognition applied technical field, particularly a kind of method and system that enter application program based on fingerprint recognition.
Background technology
Along with Internet development, people have increasing various number of the account and corresponding password, how to guarantee the otherness of number of the account and password, avoid that identical password is set or password is obscured by note, are more and more perplexing people.If it is identical that all accounts and password all use, then can cause after losing an account and password, make and all accounts and password leakage cause heavy losses.If each uses different username and passwords, then can cause unavoidably often obscuring password, and cause and normally to use.If all passwords are kept in papery book or the computer, there is the stolen problem of such code data again, be stored in the computer even encrypt, finally still need a password to protect, if being eavesdropped, this password will cause all password leakage.
Summary of the invention
Fundamental purpose of the present invention is, at above-mentioned deficiency of the prior art, provides a kind of and enters the method and system of application program based on fingerprint recognition, realizes the encryption storage of number of the account and password, and related with corresponding application program, login automatically as required.
The present invention solves the technical scheme that the prior art problem adopts: a kind ofly enter the method for application program based on fingerprint recognition, it comprises
Detect step: when detecting portable terminal and be connected with computing machine, point out user's typing finger print information to obtain user right;
Fingerprint obtaining step: the finger print information that obtains user's typing;
Fingerprint authentication step: the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program is written into step: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching step: when the user has selected the icon of arbitrary application program correspondence, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
Below technique scheme is further elaborated:
Also comprise registration step, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
Further comprise number of the account deletion step, at number of the account and the password of described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
Described application program launching step specifically may further comprise the steps:
Judge the icon of the corresponding application program that the user selects;
Read storage in the portable terminal with described icon corresponding account number and password encryption data;
According to predetermined key described number of the account and password encryption data are decrypted;
Carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Further comprise
Initialization step: to described portable terminal global data time initialization, and the application program that this portable terminal is inner with it is carried out authentication.
Authentication process specifically may further comprise the steps in the described initialization step
Portable terminal produces one group of random number key, and this random number key is stored in the described portable terminal;
Application software produces the random number A of designated length and calculates cryptographic hash A, then random number A and cryptographic hash A is encrypted formation enciphered data A by the key of making an appointment, and sends to portable terminal;
After portable terminal is received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine;
After computing machine was received described enciphered data B, the random number B that portable terminal produces was obtained in the decruption key deciphering by appointment, sent to portable terminal behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal then;
Behind the enciphered data C that the computing machine that portable terminal is received sends, the random number B that portable terminal produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal with application software;
Application software is received the enciphered data D of portable terminal, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then the portable terminal authentication is passed through, otherwise interrupts communication.
The present invention also provides a kind of and has entered the system of application program based on fingerprint recognition, and it comprises
Detection module: be used for when detecting portable terminal and be connected with computing machine, pointing out user's typing finger print information to obtain user right;
Fingerprint acquisition module: be used for obtaining the finger print information of user's typing;
Fingerprint authentication module: be used for the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program insmods: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching module: when the user has selected arbitrary application program image timestamp, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
Below technique scheme is further elaborated:
Also comprise Registering modules, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
Further comprise the number of the account removing module, be used for number of the account and password in described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
Described application program launching module specifically comprises:
Judge module is judged the corresponding application icon that the user selects;
Read module, read storage in the portable terminal with described icon corresponding account number and password encryption data;
Deciphering module is decrypted described number of the account and password encryption data according to predetermined key;
Land module, carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
The invention has the beneficial effects as follows: the present invention is stored in each application program corresponding account number of user and password the CPU internal storage areas of portable terminal, obtain the authorization by the fingerprint recognition mode and to conduct interviews, and with the computing machine communication, by the application software interface in the computing machine demonstration portable terminal, the user can choose the application program that need land at the application software interface, then can transfer number of the account automatically and password lands automatically, so, avoid the complicated processes of user record or storage password, help user security to store each application program corresponding account number and password, can effectively prevent number of the account and password the note obscure, forget, leakage or stolen, the security performance height.In addition, login can solve numerous passwords to the worry that people bring automatically, avoids inputing the complicated processes of password, and it is simple and efficient to handle.
Description of drawings
Fig. 1 is the running environment figure of system of the present invention;
Fig. 2 is the process flow diagram of the inventive method;
Fig. 3 is the process flow diagram of authentication process in the inventive method;
Fig. 4 is the functional block diagram of system of the present invention;
The realization of the object of the invention, functional characteristics and advantage will be in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Describe technical scheme of the present invention in detail below with reference to drawings and the specific embodiments, so as clearer, understand invention essence of the present invention intuitively.
With reference to shown in Figure 1, running environment figure for system of the present invention, in the present embodiment, the system 300 that enters application program based on fingerprint recognition runs on the portable terminal 200, portable terminal 200 has a fingerprint identification module 400, for example can be the band fingerprint recognition terminals such as USB flash disk all can, its inside has data-carrier store, carry out communication with computing machine 100, the display screen 110 by computing machine 100 shows and application program is landed etc.
With reference to shown in Figure 2, present embodiment provides a kind of and has entered the method for application program based on fingerprint recognition, and it comprises:
S10, detect step: when detecting portable terminal 200 and be connected with computing machine 100, point out user's typing finger print information to obtain user right, only after the user obtains the authorization, just can be to portable terminal 200 visit of being correlated with;
S20, fingerprint obtaining step: the finger print information that obtains user's typing;
S30, fingerprint authentication step: the authentication fingerprint template of storage in described finger print information and the described portable terminal 200 is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
S40, application program are written into step: after checking is passed through, start and use software interface in the portable terminal 200, and be shown in described computing machine 100, simultaneously, read data message in the portable terminal 200, make the icon corresponding with application program be written into described application software interface;
S50, application program launching step: when the user has selected the icon of arbitrary application program correspondence, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine 100.This application program launching step specifically may further comprise the steps:
Judge the icon of the corresponding application program that the user selects;
Read storage in the portable terminal 200 with described icon corresponding account number and password encryption data;
According to predetermined key described number of the account and password encryption data are decrypted;
Carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Certainly, in system uses for the first time, also comprise registration step and number of the account deletion step, after the user obtains authority and enters described application software interface, can be at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal 200 after encrypting, and each number of the account and password are associated with the icon of corresponding application program, for example by searching application icons such as 126 mailboxes, QQ, Gmail, input user's number of the account and password are kept at described number of the account and password in the mobile device by application software; The user can be at number of the account and the password of described application software interface deletion different application, and this number of the account and password are wiped off from described portable terminal 200.
In addition, in real process, also comprise:
S00, initialization step: to described portable terminal 200 global data time initialization, and these portable terminal 200 application programs inner with it are carried out authentication.With reference to shown in Figure 3, authentication process specifically may further comprise the steps in this beginning step:
S01, portable terminal 200 produce one group of random number key, and this random number key are stored in the described portable terminal 200;
S02, application software produce the random number A of designated length and calculate cryptographic hash A, then random number A and cryptographic hash A are encrypted formation enciphered data A by the key of making an appointment, and send to portable terminal 200;
After S03, portable terminal 200 are received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal 200 produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine 100;
After S04, computing machine 100 are received described enciphered data B, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to portable terminal 200 behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal 200 then;
Behind the enciphered data C that the computing machine 100 that S05, portable terminal 200 are received sends, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal 200 with application software;
S06, application software are received the enciphered data D of portable terminal 200, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then portable terminal 200 authentications are passed through, otherwise interrupt communication.
After the authentication success, follow-up all communication processs all are encrypted whole communication process and related data by the authentication random number, and each communication is upgraded random number according to Content of communciation, avoids data to be monitored or portable terminal 200 is pretended to be with computing machine 100 any one party to reach.
Meanwhile, after the authentication success, whether system also individualizes to mobile device is detected, so-called individualized refers to the authentication fingerprint template whether typing has the user, if individualized, execution in step S10-S50 then, otherwise, prompting user typing fingerprint, as user's authentication fingerprint template, this authentication fingerprint template is stored in the portable terminal 200.
With reference to shown in Figure 4, the present invention also provides a kind of and has entered the system of application program based on fingerprint recognition, and it comprises:
Detection module 10: be used for when detecting portable terminal 200 and be connected with computing machine 100, pointing out user's typing finger print information to obtain user right;
Fingerprint acquisition module 20: be used for obtaining the finger print information of user's typing;
Fingerprint authentication module 30: be used for the authentication fingerprint template of storage in described finger print information and the described portable terminal 200 is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program insmods 40: after checking is passed through, start and use software interface in the portable terminal 200, and be shown in described computing machine 100, simultaneously, read data message in the portable terminal 200, make the icon corresponding with application program be written into described application software interface;
Application program launching module 50: when the user has selected arbitrary application program image timestamp, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine 100.Concrete, this is stated the application program launching module and specifically comprises:
Judge module is judged the corresponding application icon that the user selects;
Read module, read storage in the portable terminal 200 with described icon corresponding account number and password encryption data;
Deciphering module is decrypted described number of the account and password encryption data according to predetermined key;
Land module, carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
Further, also comprise Registering modules 60 and number of the account removing module 70, described Registering modules 60 is used for number of the account and the password in described application software interface registration different application, and this number of the account and password are stored in the described portable terminal 200 after encrypting.Number of the account removing module 70 is used for number of the account and the password in described application software interface deletion different application, and this number of the account and password are wiped off from described portable terminal 200.
Further, also comprise initialization step module 80: be used for described portable terminal 200 global data time initialization, and these portable terminal 200 application programs inner with it are carried out authentication.Wherein authentication process specifically may further comprise the steps:
Portable terminal 200 produces one group of random number key, and this random number key is stored in the described portable terminal 200;
Application software produces the random number A of designated length and calculates cryptographic hash A, then random number A and cryptographic hash A is encrypted formation enciphered data A by the key of making an appointment, and sends to portable terminal 200;
After portable terminal 200 is received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal 200 produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine 100;
After computing machine 100 is received described enciphered data B, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to portable terminal 200 behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal 200 then;
Behind the enciphered data C that the computing machine 100 that portable terminal 200 is received sends, the random number B that portable terminal 200 produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal 200 with application software;
Application software is received the enciphered data D of portable terminal 200, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then portable terminal 200 authentications are passed through, otherwise interrupt communication.
Further again, also comprise the outer file module 91 of the close dish data module 90 of storage and encryption and decryption, the close dish data module 90 of wherein said storage is used for to the extended memory storage of described portable terminal 200 or reads data, and the process of reading is: u dish data are read in computing machine 100 requests; Mobile device reads data in the extended memory, and is decrypted by key; Send the data to computing machine 100; Storing process is: computing machine 100 requests write data; Portable terminal 200 is received data, and is encrypted by key; Portable terminal 200 will be encrypted the back data and deposit extended memory in, and return to computing machine 100 promptings.The outer file module 91 of described encryption and decryption is used for portable terminal 200 external datas are encrypted and decipher, and reaches protection user sensitive data demand, and its ciphering process is: user's filesselected is encrypted; Application software generates the random number key, and the file that the user is chosen is encrypted; With the random number key, send into portable terminal 200, portable terminal 200 is encrypted and returns the random number key by user data key; Application software will be encrypted the back key and be write the encrypt file afterbody, finish encryption; Its decrypting process is: user's filesselected is decrypted; Application software reads the ciphertext of tail of file key, sends into portable terminal 200 deciphering and obtains key plain; Be decrypted by key-pair file, and remove afterbody and add content, finish deciphering.
In sum, method and system provided by the invention, each application program corresponding account number of user and password can be stored in the CPU internal storage areas of portable terminal 200, obtain the authorization by the fingerprint recognition mode and to conduct interviews, and with computing machine 100 communications, by the application software interface in the computing machine 100 demonstration portable terminals 200, the user can choose the application program that need land at the application software interface, then can transfer number of the account automatically and password lands automatically, so, avoid the complicated processes of user record or storage password, help user security to store each application program corresponding account number and password, can effectively prevent number of the account and password the note obscure, forget, leakage or stolen, the security performance height.In addition, login can solve numerous passwords to the worry that people bring automatically, avoids inputing the complicated processes of password, and it is simple and efficient to handle.
The above only is the preferred embodiments of the present invention; be not so limit its claim; every equivalent structure or equivalent flow process conversion that utilizes instructions of the present invention and accompanying drawing content to do; directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.

Claims (10)

1. one kind enters the method for application program based on fingerprint recognition, and it is characterized in that: it comprises
Detect step: when detecting portable terminal and be connected with computing machine, point out user's typing finger print information to obtain user right;
Fingerprint obtaining step: the finger print information that obtains user's typing;
Fingerprint authentication step: the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program is written into step: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching step: when the user has selected the icon of arbitrary application program correspondence, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
2. according to the described method that enters application program based on fingerprint recognition of claim 1, it is characterized in that: also comprise registration step, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
3. according to the described method that enters application program based on fingerprint recognition of claim 1, it is characterized in that: further comprise number of the account deletion step, at number of the account and the password of described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
4. enter the method for application program according to claim 1 is described based on fingerprint recognition, it is characterized in that: described application program launching step specifically may further comprise the steps:
Judge the icon of the corresponding application program that the user selects;
Read storage in the portable terminal with described icon corresponding account number and password encryption data;
According to predetermined key described number of the account and password encryption data are decrypted;
Carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
5. according to claim 1ly enter the method for application program based on fingerprint recognition, it is characterized in that: further comprise
Initialization step: to described portable terminal global data time initialization, and the application program that this portable terminal is inner with it is carried out authentication.
6. according to claim 5ly enter the method for application program based on fingerprint recognition, it is characterized in that: authentication process specifically may further comprise the steps in the described initialization step
Portable terminal produces one group of random number key, and this random number key is stored in the described portable terminal;
Application software produces the random number A of designated length and calculates cryptographic hash A, then random number A and cryptographic hash A is encrypted formation enciphered data A by the key of making an appointment, and sends to portable terminal;
After portable terminal is received described enciphered data A, the random number A ' that application software produces is obtained in decruption key deciphering by appointment, and portable terminal produces random number B, calculates cryptographic hash B according to the mode identical with application program, other group key with agreement is encrypted formation enciphered data B again, sends to computing machine;
After computing machine was received described enciphered data B, the random number B that portable terminal produces was obtained in the decruption key deciphering by appointment, sent to portable terminal behind random number A ' the encryption formation enciphered data C of random number B by application software with portable terminal then;
Behind the enciphered data C that the computing machine that portable terminal is received sends, the random number B that portable terminal produces is obtained in the decruption key deciphering by appointment, sends to application software behind the random number B encryption formation enciphered data D of random number A ' by portable terminal with application software;
Application software is received the enciphered data D of portable terminal, the random number A ' that application software produces is obtained in the decruption key deciphering by appointment, if the random number A ' after the deciphering is identical with the random number A that application software produces designated length, then the portable terminal authentication is passed through, otherwise interrupts communication.
7. one kind enters the system of application program based on fingerprint recognition, and it is characterized in that: it comprises
Detection module: be used for when detecting portable terminal and be connected with computing machine, pointing out user's typing finger print information to obtain user right;
Fingerprint acquisition module: be used for obtaining the finger print information of user's typing;
Fingerprint authentication module: be used for the authentication fingerprint template of storing in described finger print information and the described portable terminal is compared, if the described finger print information of user's typing and described authentication fingerprint template coupling, then by checking, the user obtains authority and enters application program and be written into step, otherwise, authentication failed, flow process finishes;
Application program insmods: after checking is passed through, start and use software interface in the portable terminal, and be shown in described computing machine, simultaneously, read data message in the portable terminal, make the icon corresponding with application program be written into described application software interface;
Application program launching module: when the user has selected arbitrary application program image timestamp, then transfer this icon corresponding account number and password, land corresponding application program automatically by computing machine.
8. according to the described system that enters application program based on fingerprint recognition of claim 7, it is characterized in that: also comprise Registering modules, at number of the account and the password of described application software interface registration different application, this number of the account and password are stored in the described portable terminal after encrypting.
9. according to the described system that enters application program based on fingerprint recognition of claim 7, it is characterized in that: further comprise the number of the account removing module, be used for number of the account and password in described application software interface deletion different application, this number of the account and password are wiped off from described portable terminal.
10. enter the system of application program according to claim 7 is described based on fingerprint recognition, it is characterized in that: described application program launching module specifically comprises:
Judge module is judged the corresponding application icon that the user selects;
Read module, read storage in the portable terminal with described icon corresponding account number and password encryption data;
Deciphering module is decrypted described number of the account and password encryption data according to predetermined key;
Land module, carry out related with the address of corresponding application program the number of the account after the described deciphering and password and land.
CN201310222380.9A 2013-06-06 2013-06-06 Enter the method and system of application program based on fingerprint recognition Expired - Fee Related CN103279411B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310222380.9A CN103279411B (en) 2013-06-06 2013-06-06 Enter the method and system of application program based on fingerprint recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310222380.9A CN103279411B (en) 2013-06-06 2013-06-06 Enter the method and system of application program based on fingerprint recognition

Publications (2)

Publication Number Publication Date
CN103279411A true CN103279411A (en) 2013-09-04
CN103279411B CN103279411B (en) 2016-05-25

Family

ID=49061940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310222380.9A Expired - Fee Related CN103279411B (en) 2013-06-06 2013-06-06 Enter the method and system of application program based on fingerprint recognition

Country Status (1)

Country Link
CN (1) CN103279411B (en)

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488930A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103488481A (en) * 2013-09-11 2014-01-01 华为技术有限公司 Application program control method, terminal equipment and remote control system
CN103685232A (en) * 2013-11-11 2014-03-26 上海乐今通信技术有限公司 Mobile terminal and mobile application login method
CN103942472A (en) * 2014-04-14 2014-07-23 立德高科(北京)数码科技有限责任公司 Method and device used for preventing unauthorized user from starting software
CN103957202A (en) * 2014-04-22 2014-07-30 中国工商银行股份有限公司 Safety login method and system
CN103984888A (en) * 2014-05-23 2014-08-13 深圳市中兴移动通信有限公司 Method and device for helping user to activate application program binding with fingerprint
CN104239107A (en) * 2014-09-23 2014-12-24 三星电子(中国)研发中心 Application customizing method and application customizing device
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN104636682A (en) * 2015-02-09 2015-05-20 上海瀚银信息技术有限公司 Password management system and method based on hardware device
CN104657652A (en) * 2015-03-24 2015-05-27 北京京东尚科信息技术有限公司 Method and system for logging in mobile application
CN104933343A (en) * 2015-07-01 2015-09-23 京东方科技集团股份有限公司 Secrecy method and apparatus of application program, and electronic device
CN105046135A (en) * 2015-08-28 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Information display method, information display apparatus and terminal
CN105159730A (en) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Application control method, application control device and terminal
CN105320868A (en) * 2014-12-22 2016-02-10 维沃移动通信有限公司 Application encryption method and mobile terminal
WO2016054890A1 (en) * 2014-10-11 2016-04-14 深圳市汇顶科技股份有限公司 Fingerprint input information processing method, system and mobile terminal
CN105740670A (en) * 2016-01-28 2016-07-06 百度在线网络技术(北京)有限公司 Application encryption method and device, and application startup method and device
CN105912911A (en) * 2016-04-29 2016-08-31 乐视控股(北京)有限公司 Method and system for managing application programs of mobile equipment
WO2017031808A1 (en) * 2015-08-27 2017-03-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint recognition-based account login method, apparatus and terminal
CN107172298A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium
CN107517217A (en) * 2017-09-13 2017-12-26 北京理工大学 A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN108400969A (en) * 2018-01-17 2018-08-14 中国地质大学(武汉) A kind of striding equipment, cross-platform safe login method
CN108965472A (en) * 2018-08-23 2018-12-07 珠海格力电器股份有限公司 Account information pushing method and device
CN109308425A (en) * 2017-07-26 2019-02-05 山东华芯半导体有限公司 Based on encrypting fingerprint and the USB flash disk for supporting password generation to fill out and USB flash disk encryption method
CN109685004A (en) * 2018-12-24 2019-04-26 北京长城华冠汽车技术开发有限公司 Vehicle entertainment system login system and vehicle entertainment system login method based on fingerprint recognition
CN109754592A (en) * 2018-12-26 2019-05-14 天长市志铖电子科技有限公司 A kind of method and terminal universal remote control of quick start remote control applications program
CN110390746A (en) * 2019-06-16 2019-10-29 广州智慧城市发展研究院 A kind of implementation method of fingerprint anti-theft gate inhibition
CN110502963A (en) * 2018-09-12 2019-11-26 深圳市文鼎创数据科技有限公司 Fingerprint verification method, fingerprint certification device and terminal
CN110545249A (en) * 2018-05-28 2019-12-06 珠海格力电器股份有限公司 Information recording method, display method and device
CN110602052A (en) * 2019-08-15 2019-12-20 平安科技(深圳)有限公司 Micro-service processing method and server
CN110929245A (en) * 2020-01-02 2020-03-27 中国银行股份有限公司 Fast login method and terminal based on fingerprint
CN112307441A (en) * 2020-10-13 2021-02-02 洛阳理工学院 Computer software protection system
CN112597470A (en) * 2021-01-22 2021-04-02 建投物联股份有限公司 Intelligent safe biological secret treasure system
CN113302604A (en) * 2018-11-15 2021-08-24 伊利亚·弗拉基米罗维奇·烈德科卡申 Automatic registration method
CN113347159A (en) * 2021-05-18 2021-09-03 浪潮金融信息技术有限公司 Data transmission method and system of self-service terminal and storage medium
CN113495792A (en) * 2020-03-20 2021-10-12 中标软件有限公司 Method for realizing adaptation interface of operating system to fingerprint equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101383704A (en) * 2008-04-23 2009-03-11 鲁东大学 Cipher module based on finger print recognition technology
US20090119545A1 (en) * 2007-11-07 2009-05-07 Microsoft Corporation Correlating complex errors with generalized end-user tasks
CN102281539A (en) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119545A1 (en) * 2007-11-07 2009-05-07 Microsoft Corporation Correlating complex errors with generalized end-user tasks
CN101383704A (en) * 2008-04-23 2009-03-11 鲁东大学 Cipher module based on finger print recognition technology
CN102281539A (en) * 2011-08-29 2011-12-14 惠州Tcl移动通信有限公司 Mobile terminal and application program login method thereof

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488481A (en) * 2013-09-11 2014-01-01 华为技术有限公司 Application program control method, terminal equipment and remote control system
CN103488481B (en) * 2013-09-11 2017-02-15 华为技术有限公司 Application program control method, terminal equipment and remote control system
CN103488930A (en) * 2013-09-23 2014-01-01 北京奇虎科技有限公司 Method and device for processing file/application program on mobile communication terminal
CN103685232A (en) * 2013-11-11 2014-03-26 上海乐今通信技术有限公司 Mobile terminal and mobile application login method
CN103942472A (en) * 2014-04-14 2014-07-23 立德高科(北京)数码科技有限责任公司 Method and device used for preventing unauthorized user from starting software
CN103942472B (en) * 2014-04-14 2016-09-14 立德高科(北京)数码科技有限责任公司 The method and device of software is started for the person that shields unauthorized use
CN103957202A (en) * 2014-04-22 2014-07-30 中国工商银行股份有限公司 Safety login method and system
CN103984888A (en) * 2014-05-23 2014-08-13 深圳市中兴移动通信有限公司 Method and device for helping user to activate application program binding with fingerprint
CN103984888B (en) * 2014-05-23 2016-04-06 努比亚技术有限公司 A kind of assisting users activates method and the device of the application program of fingerprint binding
CN104239107A (en) * 2014-09-23 2014-12-24 三星电子(中国)研发中心 Application customizing method and application customizing device
WO2016054890A1 (en) * 2014-10-11 2016-04-14 深圳市汇顶科技股份有限公司 Fingerprint input information processing method, system and mobile terminal
CN104320256A (en) * 2014-10-20 2015-01-28 厦门美图移动科技有限公司 Method for achieving fingerprint universal password verification
CN105320868B (en) * 2014-12-22 2018-09-04 维沃移动通信有限公司 The encryption method and mobile terminal of application program
CN105320868A (en) * 2014-12-22 2016-02-10 维沃移动通信有限公司 Application encryption method and mobile terminal
CN104636682A (en) * 2015-02-09 2015-05-20 上海瀚银信息技术有限公司 Password management system and method based on hardware device
CN104657652A (en) * 2015-03-24 2015-05-27 北京京东尚科信息技术有限公司 Method and system for logging in mobile application
CN104933343A (en) * 2015-07-01 2015-09-23 京东方科技集团股份有限公司 Secrecy method and apparatus of application program, and electronic device
WO2017000523A1 (en) * 2015-07-01 2017-01-05 京东方科技集团股份有限公司 Security method and apparatus for application program, and electronic device
WO2017031808A1 (en) * 2015-08-27 2017-03-02 宇龙计算机通信科技(深圳)有限公司 Fingerprint recognition-based account login method, apparatus and terminal
CN105046135A (en) * 2015-08-28 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Information display method, information display apparatus and terminal
CN105159730A (en) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Application control method, application control device and terminal
CN105740670B (en) * 2016-01-28 2019-01-22 百度在线网络技术(北京)有限公司 Using encryption, starting method and apparatus
CN105740670A (en) * 2016-01-28 2016-07-06 百度在线网络技术(北京)有限公司 Application encryption method and device, and application startup method and device
CN105912911A (en) * 2016-04-29 2016-08-31 乐视控股(北京)有限公司 Method and system for managing application programs of mobile equipment
CN107172298A (en) * 2017-06-26 2017-09-15 广东欧珀移动通信有限公司 Information processing method, device, computer equipment and computer-readable recording medium
CN107172298B (en) * 2017-06-26 2020-05-26 Oppo广东移动通信有限公司 Information processing method, information processing device, computer equipment and computer readable storage medium
CN109308425A (en) * 2017-07-26 2019-02-05 山东华芯半导体有限公司 Based on encrypting fingerprint and the USB flash disk for supporting password generation to fill out and USB flash disk encryption method
CN107517217A (en) * 2017-09-13 2017-12-26 北京理工大学 A kind of multiple-factor wireless key fill system based on fingerprint recognition
CN108400969A (en) * 2018-01-17 2018-08-14 中国地质大学(武汉) A kind of striding equipment, cross-platform safe login method
CN110545249A (en) * 2018-05-28 2019-12-06 珠海格力电器股份有限公司 Information recording method, display method and device
CN108965472A (en) * 2018-08-23 2018-12-07 珠海格力电器股份有限公司 Account information pushing method and device
CN110502963A (en) * 2018-09-12 2019-11-26 深圳市文鼎创数据科技有限公司 Fingerprint verification method, fingerprint certification device and terminal
CN113302604A (en) * 2018-11-15 2021-08-24 伊利亚·弗拉基米罗维奇·烈德科卡申 Automatic registration method
CN109685004A (en) * 2018-12-24 2019-04-26 北京长城华冠汽车技术开发有限公司 Vehicle entertainment system login system and vehicle entertainment system login method based on fingerprint recognition
CN109754592A (en) * 2018-12-26 2019-05-14 天长市志铖电子科技有限公司 A kind of method and terminal universal remote control of quick start remote control applications program
CN110390746A (en) * 2019-06-16 2019-10-29 广州智慧城市发展研究院 A kind of implementation method of fingerprint anti-theft gate inhibition
CN110602052A (en) * 2019-08-15 2019-12-20 平安科技(深圳)有限公司 Micro-service processing method and server
CN110929245A (en) * 2020-01-02 2020-03-27 中国银行股份有限公司 Fast login method and terminal based on fingerprint
CN113495792A (en) * 2020-03-20 2021-10-12 中标软件有限公司 Method for realizing adaptation interface of operating system to fingerprint equipment
CN112307441A (en) * 2020-10-13 2021-02-02 洛阳理工学院 Computer software protection system
CN112597470A (en) * 2021-01-22 2021-04-02 建投物联股份有限公司 Intelligent safe biological secret treasure system
CN113347159A (en) * 2021-05-18 2021-09-03 浪潮金融信息技术有限公司 Data transmission method and system of self-service terminal and storage medium
CN113347159B (en) * 2021-05-18 2024-04-02 浪潮金融信息技术有限公司 Data transmission method, system and storage medium of self-service terminal

Also Published As

Publication number Publication date
CN103279411B (en) 2016-05-25

Similar Documents

Publication Publication Date Title
CN103279411B (en) Enter the method and system of application program based on fingerprint recognition
US9301140B1 (en) Behavioral authentication system using a secure element, a behaviometric server and cryptographic servers to authenticate users
US11962694B2 (en) Key pair generation based on environmental factors
US8656455B1 (en) Managing data loss prevention policies
US20150012748A1 (en) Method And System For Protecting Data
EP2628133B1 (en) Authenticate a fingerprint image
EP2881863A1 (en) Method for implementing encryption in storage card, and decryption method and device
US20150304321A1 (en) An image management system and an image management method based on fingerprint authentication
TWI724684B (en) Method, system and device for performing cryptographic operations subject to identity verification
WO2017081603A2 (en) Method and system for protecting and utilizing internet identity, using smartphone
CN106100851B (en) Password management system, intelligent wristwatch and its cipher management method
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
CN107026730B (en) Data processing method, device and system
NO340355B1 (en) 2-factor authentication for network connected storage device
CN111445231A (en) Method and device for realizing MOTOpay and electronic equipment
US8819802B2 (en) User authentication
KR101156102B1 (en) Memory card reader apparatus having security features and the method thereof
CN106156701A (en) A kind of fingerprint identification device, fingerprint identification device identification system and recognition methods
CN102647415A (en) Audio-interface-based method and system for providing identity authentication
CN107135074A (en) A kind of advanced security method and apparatus
CN104243168A (en) Credible mobile module based on Java smart card
CN201886495U (en) Authentication device with image recognition function
Kamal et al. Secure Mobile ID Architecture on Android Devices based on Trust Zone
WO2017020449A1 (en) Fingerprint reading method and user equipment
CN102087683A (en) Password management and verification method suitable for trusted platform module (TPM)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160525

Termination date: 20210606

CF01 Termination of patent right due to non-payment of annual fee