[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114969705A - Fingerprint unlocking method and device, electronic equipment and storage medium - Google Patents

Fingerprint unlocking method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114969705A
CN114969705A CN202210617264.6A CN202210617264A CN114969705A CN 114969705 A CN114969705 A CN 114969705A CN 202210617264 A CN202210617264 A CN 202210617264A CN 114969705 A CN114969705 A CN 114969705A
Authority
CN
China
Prior art keywords
fingerprint
time
information
unlocking
request information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210617264.6A
Other languages
Chinese (zh)
Other versions
CN114969705B (en
Inventor
刘晓润
刘全仲
张书震
封磊
王亚飞
彭思苑
刘向东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Great Wall Technology Group Co ltd
Original Assignee
China Great Wall Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Great Wall Technology Group Co ltd filed Critical China Great Wall Technology Group Co ltd
Priority to CN202210617264.6A priority Critical patent/CN114969705B/en
Publication of CN114969705A publication Critical patent/CN114969705A/en
Application granted granted Critical
Publication of CN114969705B publication Critical patent/CN114969705B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Electric Clocks (AREA)

Abstract

The invention discloses a fingerprint unlocking method and device, electronic equipment and a storage medium, and relates to the technical field of fingerprint safety. The fingerprint unlocking method is applied to electronic equipment and comprises the following steps: receiving fingerprint unlocking request information; responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time; acquiring the current timing time of a timer preset in the electronic equipment, wherein the current timing time is a second time; responding to the fact that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval, and comparing the fingerprint information with prestored fingerprint information; and if the fingerprint information comparison is passed, an unlocking instruction is sent. The invention can prevent remote attack and has high safety.

Description

Fingerprint unlocking method and device, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of fingerprint security, in particular to a fingerprint unlocking method and device, an electronic device and a storage medium.
Background
The fingerprint is the line that the terminal of human finger is formed by unsmooth skin, and the fingerprint just forms before the birth of human and the shape of fingerprint along with individual's growth can not change, only change by an obvious degree, and everyone's fingerprint all is different, can carry out good differentiation in many detailed descriptions.
With the development of science and technology, the fingerprint identification technology has been widely applied to various industries and daily life of people, and particularly, the fingerprint unlocking function brings convenience and better confidentiality to the life of people in many aspects.
At present, although fingerprint information is protected by means of encryption and the like, the fingerprint information still has the risk of being stolen and used. Especially in a remote attack scene, an attacker can easily use the stolen fingerprint information to break the security defense line of the electronic equipment, so that the information security of the electronic equipment is damaged.
Disclosure of Invention
In view of this, the present invention provides a fingerprint unlocking method, apparatus, electronic device and storage medium, which can prevent remote attack and have high security.
In a first aspect, the present invention provides a fingerprint unlocking method applied to an electronic device, including:
receiving fingerprint unlocking request information;
responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time;
acquiring the current timing time of a timer preset in the electronic equipment, wherein the current timing time is a second time;
in response to the difference value between the second time and the first time being smaller than a preset fingerprint effective time interval, comparing the fingerprint information with the prestored fingerprint information;
and if the fingerprint information comparison is passed, an unlocking instruction is sent.
With reference to the first aspect, in an implementation manner of the first aspect, after the receiving fingerprint unlocking request information, the method includes:
and refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
With reference to the first aspect, in another implementation manner of the first aspect, after the obtaining of the current timing time of a timer preset in the electronic device, the method includes:
and refusing unlocking in response to the fact that the difference value of the second time and the first time is larger than or equal to a preset fingerprint effective time interval.
With reference to the first aspect, in a further implementation manner of the first aspect, after comparing the fingerprint information with pre-stored fingerprint information in response to that a difference between the second time and the first time is smaller than a preset fingerprint valid time interval, the method includes:
and if the fingerprint information comparison fails, refusing to unlock.
With reference to the first aspect, in a further implementation manner of the first aspect, a timing time of the timer is different from a system time of the electronic device;
and/or the timer does not provide an interface to the outside and is invisible to the outside.
With reference to the first aspect, in a further implementation manner of the first aspect, the preset fingerprint valid time interval is less than or equal to 2 s.
With reference to the first aspect, in a further implementation manner of the first aspect, the fingerprint unlocking request information is obtained by acquiring, by a fingerprint controller of the electronic device, fingerprint information of a user and a current timing time of the timer when the user presses to acquire a fingerprint, where the current timing time is an initial time, and then combining the acquired fingerprint information of the user and the initial time.
In a second aspect, the present invention provides a fingerprint unlocking device applied to an electronic device, including:
the receiving module is used for receiving fingerprint unlocking request information;
the separation module is used for responding to the fact that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into the fingerprint information and the time information, wherein the time information is first time;
the acquisition module is used for acquiring the current timing time of a timer preset in the electronic equipment, and the current timing time is second time;
the comparison module is used for comparing the fingerprint information with the prestored fingerprint information in response to the fact that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval;
and the unlocking module is used for sending an unlocking instruction if the fingerprint information comparison is passed.
With reference to the second aspect, in one embodiment of the second aspect, the apparatus comprises:
and the first unlocking unit is used for refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
In another embodiment of the second aspect, in combination with the second aspect, the apparatus comprises:
and the second unlocking unit is used for refusing to unlock in response to the fact that the difference value of the second time and the first time is larger than or equal to the preset fingerprint effective time interval.
In a further embodiment of the second aspect, in combination with the second aspect, the apparatus comprises:
and the third unlocking unit is used for refusing to unlock if the fingerprint information comparison fails.
With reference to the second aspect, in a further embodiment of the second aspect, a timing time of the timer is different from a system time of the electronic device;
and/or the timer does not provide an interface to the outside and is not visible to the outside.
With reference to the second aspect, in a further embodiment of the second aspect, the preset fingerprint valid time interval is less than or equal to 2 s.
With reference to the second aspect, in a further implementation manner of the second aspect, the fingerprint unlocking request information is generated by a fingerprint controller of the electronic device, acquiring fingerprint information of the user and a current timing time of the timer when the user presses the collected fingerprint, where the current timing time is an initial time, and then combining the acquired fingerprint information of the user and the initial time.
In a third aspect, the present invention provides an electronic device, comprising: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing any of the methods described above.
In a fourth aspect, the present invention also provides a computer readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement any of the methods described above.
The fingerprint unlocking method, the fingerprint unlocking device, the electronic equipment and the storage medium provided by the invention firstly receive fingerprint unlocking request information, then respond to the fact that the fingerprint unlocking request information contains time information, separate the fingerprint unlocking request information into the fingerprint information and the time information, the time information is first time, then obtain the current timing time of a timer which is preset in the electronic equipment, the current timing time is second time, respond to the fact that the difference value of the second time and the first time is smaller than a preset fingerprint effective time interval, compare the fingerprint information with the fingerprint information which is stored in advance, and finally send an unlocking instruction if the fingerprint information comparison is passed. Therefore, the embodiment of the invention provides a fingerprint management mechanism with timeliness, the fingerprint safety of a user is protected by adding time information/timeliness to fingerprint unlocking request information, even if an attacker steals the fingerprint information of the user, the attacker cannot know the time information required by the fingerprint unlocking request information, so that the attacker cannot forge and send correct fingerprint unlocking request information to a fingerprint unlocking device in a remote attack scene, the electronic equipment cannot be unlocked smoothly, the information safety of the electronic equipment is ensured, and the safety is greatly improved. Therefore, the embodiment of the invention can prevent remote attack and has high safety.
In order to more clearly illustrate the invention, the invention is further described below with reference to preferred embodiments and the accompanying drawings. Similar parts in the figures are denoted by the same reference numerals. It is to be understood by persons skilled in the art that the following detailed description is illustrative and not restrictive, and is not to be taken as limiting the scope of the invention.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario architecture of the fingerprint unlocking method of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a fingerprint unlocking method according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a fingerprint unlocking method according to the present invention;
FIG. 4 is a schematic structural diagram of an embodiment of a fingerprint unlocking device according to the present invention;
fig. 5 is a schematic structural diagram of an embodiment of an electronic device according to the present invention.
Detailed Description
In one aspect, the present invention provides a fingerprint unlocking method, which is applied to an electronic device, and firstly introduces the electronic device, as shown in fig. 1, a fingerprint module 10 of the electronic device may include a fingerprint controller 1, a fingerprint unlocking device 2, and a timer 3, where:
the fingerprint controller 1 is used for controlling fingerprint input and transmitting fingerprint data to the fingerprint unlocking device;
the fingerprint unlocking device 2 is used for receiving fingerprint data of the fingerprint controller, judging fingerprint validity and unlocking feedback;
the timer 3 is used for determining the effective time of the fingerprint when the fingerprint is unlocked;
also shown in fig. 1 are a memory 4 and a crystal 5, the memory 4 being used for storing fingerprint information and validity interval information, the crystal 5 being used for providing a clock signal for the timer 3.
As shown in fig. 2, the fingerprint unlocking method of the present embodiment, executed by the fingerprint unlocker 2, includes:
step 101: receiving fingerprint unlocking request information;
in this step, the fingerprint unlocker 2 receives the fingerprint unlocking request information sent by the fingerprint controller 1. In fig. 3, the fingerprint unlock request information is DT 1.
Step 102: responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time;
in the invention, the fingerprint unlocking request information additionally stipulates that the time information is required to be contained besides the fingerprint information to be identified, so that even if the fingerprint information of a user is stolen, an attacker cannot know the required time information, so that the attacker cannot forge and send correct fingerprint unlocking request information to the fingerprint unlocking device 2 in a remote attack scene, the electronic equipment cannot be unlocked smoothly, and the information security of the electronic equipment is ensured. In fig. 3, the fingerprint information is D1, and the first time is T1; if the fingerprint unlocking request information DT1 is encrypted, the step may be performed by first decrypting and then performing information separation processing.
As an alternative embodiment, after receiving the fingerprint unlocking request information (step 101), the method may include:
step 102': and refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
At this time, in a remote attack scene, since the attacker cannot know the time information required by the fingerprint unlocking request information, the attacker cannot forge and send correct fingerprint unlocking request information to the fingerprint unlocking device 2, so that the electronic device cannot be unlocked smoothly, and the information security of the electronic device is ensured.
Step 103: acquiring the current timing time of a timer 3 preset in the electronic equipment, wherein the current timing time is a second time;
in this step, the fingerprint unlocker 2 separates the fingerprint unlocking request information into fingerprint information and time information, and then obtains the current timing time (second time) of the timer 3 preset in the electronic device. In fig. 3, the second time is T2.
Step 104: in response to the difference value between the second time and the first time being smaller than a preset fingerprint effective time interval, comparing the fingerprint information with the prestored fingerprint information;
in fig. 3, the preset fingerprint effective time interval is T3, and in this step, when T2-T1< T3, the fingerprint information D1 is compared with the prestored fingerprint information D2, and a specific comparison algorithm may be implemented by using a conventional algorithm in the art, which is not described herein again.
In the fingerprint input stage (when used for the first time), the fingerprint controller 1 may prompt the user to set a fingerprint valid time interval (i.e., a preset fingerprint valid time interval), and store the fingerprint valid time interval in the memory B area, where the preset fingerprint valid time interval T3 is preferably less than or equal to 2 s; then, the user inputs the fingerprint, and the fingerprint can be stored in the area A of the memory after being encrypted. The fingerprint is only encrypted conventionally and no time information is added. The preset fingerprint valid time interval T3 and the user fingerprint data D2 are stored in the memory in an area, and under the condition that the outside is unclear, the stolen data are fingerprints and time intervals, but not fingerprints, and cannot be directly used, so that the safety of data storage is improved.
As an alternative embodiment, after acquiring the current timing time of a timer preset in the electronic device (step 103), the method may include:
step 104': and refusing unlocking in response to the fact that the difference value of the second time and the first time is larger than or equal to a preset fingerprint effective time interval.
In FIG. 3, this step is to refuse unlocking when T2-T1 ≧ T3.
Step 105: and if the fingerprint information comparison is passed, an unlocking instruction is sent.
As an alternative embodiment, after comparing the fingerprint information with the pre-stored fingerprint information (step 104) in response to the difference between the second time and the first time being less than the preset fingerprint valid time interval, the method may include:
step 105': and if the fingerprint information comparison fails, refusing to unlock.
In this step, if the fingerprint information comparison fails, unlocking is rejected, and the result can be fed back to the fingerprint controller 1.
As another alternative, it is conceivable that if the attacker knows the composition rule of the fingerprint unlocking request information, the fingerprint unlocking request information may be forged by acquiring the system time of the electronic device, so to increase the forging difficulty, the timing time of the timer 3 is preferably different from the system time of the electronic device, so as to further increase the security of the electronic device. Also, the timer 3 is preferably a specially configured timer, which does not provide an interface to the outside and is invisible to the outside, so as to prevent an attacker from remotely reading the timing time of the timer 3.
As another alternative embodiment, the fingerprint unlocking request information may be obtained by the fingerprint controller 1 of the electronic device acquiring the fingerprint information of the user and the current timing time of the timer 3 when the user presses the collected fingerprint, the current timing time being an initial time, and then combining the acquired fingerprint information of the user and the initial time to generate, and specifically, before the fingerprint unlocking request information is received (step 101), the method steps performed by the fingerprint controller 1 may include:
step 1001: when a user presses an acquired fingerprint, the fingerprint controller 1 acquires fingerprint information of the user and the current timing time of the timer 3, wherein the current timing time is initial time;
in this step, when the user needs to unlock, the finger presses the collected fingerprint, and the fingerprint controller 1 reads the time information of the timer 3. In fig. 3, the fingerprint information of the user thus collected is D0, and the current counting time (i.e., initial time) of the timer 3 is T0.
Step 1002: the fingerprint controller 1 combines the acquired fingerprint information of the user with the initial time to generate the fingerprint unlocking request information.
In fig. 3, after collecting the fingerprint data of the user, the fingerprint controller 1 merges the fingerprint information D0 and the time information T0 (or encrypts the data if necessary) to generate DT1 as the fingerprint unlock request information, and the fingerprint unlock request information DT1 carries time information for subsequent transmission to the fingerprint unlocker 2.
Thus, after the step 1001 and the step 1002, the technical scheme of the embodiment of the invention does not affect the normal use experience of the user for the user who collects the fingerprint on site for verification, but can achieve a good evading effect for the remote attack situation.
To sum up, the fingerprint unlocking method provided by the embodiment of the invention is applied to electronic equipment, firstly receives fingerprint unlocking request information, then responds to the fact that the fingerprint unlocking request information contains time information, separates the fingerprint unlocking request information into the fingerprint information and the time information, the time information is first time, then obtains the current timing time of a timer preset in the electronic equipment, the current timing time is second time, responds to the fact that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval, compares the fingerprint information with the fingerprint information stored in advance, and finally sends an unlocking instruction if the fingerprint information comparison is passed. Therefore, the embodiment of the invention provides a fingerprint management mechanism with timeliness, the fingerprint safety of a user is protected by adding time information/timeliness to fingerprint unlocking request information, even if an attacker steals the fingerprint information of the user, the attacker cannot know the time information required by the fingerprint unlocking request information, so that the attacker cannot forge and send correct fingerprint unlocking request information to a fingerprint unlocking device in a remote attack scene, the electronic equipment cannot be unlocked smoothly, the information safety of the electronic equipment is ensured, and the safety is greatly improved. Therefore, the embodiment of the invention can prevent remote attack and has high safety.
Fig. 3 is a flowchart illustrating a specific example of the fingerprint unlocking method of the present invention, wherein the related steps are described above, and thus are not repeated herein, and only the related 4 times T0 to T3 are described as follows:
t0 is the current time of the internal timer when the user touches the collected fingerprint during unlocking, and the value of the current time is uncertain;
the value of T1 is consistent with that of T0, T0 is encrypted after being synthesized with fingerprint data, and T1 is obtained when the data is decrypted, wherein T0 is data processed by the fingerprint controller 1 and T1 is data processed by the fingerprint unlocker 2 only for distinguishing;
t2 is the current time of the internal timer, which is read again after the data packet is decrypted and the time and fingerprint data in the data packet are separated, and its value is [ T0, T0+ T3) (i.e. T0 ═ T1 ═ T2< T0+ T3);
t3 is the time interval between unlocking within the valid time set by the user (the maximum time allowed for the user to press the fingerprint until the end of the fingerprint comparison, which is the timer time inside the fingerprint module, not the time of the external system), and generally takes the value T3 ═ 2 s.
On the other hand, an embodiment of the present invention provides a fingerprint unlocking device, which is applied to an electronic device, and as shown in fig. 4, the fingerprint unlocking device may include:
the receiving module 11 is configured to receive fingerprint unlocking request information;
the separation module 12 is configured to, in response to that the fingerprint unlocking request information includes time information, separate the fingerprint unlocking request information into fingerprint information and time information, where the time information is first time;
an obtaining module 13, configured to obtain a current timing time of a timer preset in the electronic device, where the current timing time is a second time;
a comparison module 14, configured to compare the fingerprint information with pre-stored fingerprint information in response to that a difference between the second time and the first time is smaller than a preset fingerprint valid time interval;
and the unlocking module 15 is used for sending an unlocking instruction if the fingerprint information comparison is passed.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Preferably, the apparatus comprises:
and the first unlocking unit is used for refusing unlocking in response to the fact that the fingerprint unlocking request information does not contain time information.
Preferably, the apparatus comprises:
and the second unlocking unit is used for refusing to unlock in response to the fact that the difference value of the second time and the first time is larger than or equal to the preset fingerprint effective time interval.
Preferably, the apparatus comprises:
and the third unlocking unit is used for refusing to unlock if the fingerprint information comparison fails.
Preferably, the timing time of the timer is different from the system time of the electronic device;
and/or the timer does not provide an interface to the outside and is not visible to the outside.
Preferably, the preset fingerprint valid time interval is less than or equal to 2 s.
Preferably, the fingerprint unlocking request information is obtained by acquiring, by a fingerprint controller of the electronic device, fingerprint information of a user and current timing time of the timer when the user presses an acquired fingerprint, where the current timing time is initial time, and then combining the acquired fingerprint information of the user and the initial time.
An embodiment of the present invention further provides an electronic device, fig. 5 is a schematic structural diagram of an embodiment of the electronic device of the present invention, and a flow of the embodiment shown in fig. 2 of the present invention may be implemented, as shown in fig. 5, where the electronic device may include: the device comprises a shell 41, a processor 42, a memory 43, a circuit board 44 and a power circuit 45, wherein the circuit board 44 is arranged inside a space enclosed by the shell 41, and the processor 42 and the memory 43 are arranged on the circuit board 44; a power supply circuit 45 for supplying power to each circuit or device of the electronic apparatus; the memory 43 is used for storing executable program code; the processor 42 executes a program corresponding to the executable program code by reading the executable program code stored in the memory 43, for performing the method described in any of the method embodiments described above.
The specific execution process of the above steps by the processor 42 and the steps further executed by the processor 42 by running the executable program code may refer to the description of the embodiment shown in fig. 2 of the present invention, and are not described herein again.
The electronic device exists in a variety of forms, including but not limited to:
(1) a mobile communication device: such devices are characterized by mobile communications capabilities and are primarily targeted at providing voice, data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) Ultra mobile personal computer device: the equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include: PDA, MID, and UMPC devices, etc., such as ipads.
(3) A portable entertainment device: such devices can display and play multimedia content. This type of device comprises: audio, video players (e.g., ipods), handheld game consoles, electronic books, and smart toys and portable car navigation devices.
(4) A server: the device for providing the computing service comprises a processor, a hard disk, a memory, a system bus and the like, and the server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic equipment with a data interaction function.
The embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the method steps described in any of the above method embodiments.
Embodiments of the invention also provide an application program, which is executed to implement the method provided by any one of the method embodiments of the invention.
It is to be noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on differences from other embodiments. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment. For convenience of description, the above devices are described separately in terms of functional division into various units/modules. Of course, the functionality of the units/modules may be implemented in one or more software and/or hardware implementations of the invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
It should be understood that the above-mentioned embodiments of the present invention are only examples for clearly illustrating the present invention, and are not intended to limit the embodiments of the present invention, and it will be obvious to those skilled in the art that other variations or modifications may be made on the basis of the above description, and all embodiments may not be exhaustive, and all obvious variations or modifications may be included within the scope of the present invention.

Claims (10)

1. A fingerprint unlocking method is applied to electronic equipment and is characterized by comprising the following steps:
receiving fingerprint unlocking request information;
responding to that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into fingerprint information and time information, wherein the time information is first time;
acquiring the current timing time of a timer preset in the electronic equipment, wherein the current timing time is a second time;
in response to the difference value between the second time and the first time being smaller than a preset fingerprint effective time interval, comparing the fingerprint information with the prestored fingerprint information;
and if the fingerprint information comparison is passed, an unlocking instruction is sent.
2. The method according to claim 1, wherein after receiving the fingerprint unlocking request information, the method comprises:
and refusing to unlock in response to the fact that the fingerprint unlocking request information does not contain time information.
3. The method according to claim 1, wherein after acquiring the current timing time of the timer preset in the electronic device, the method comprises:
and refusing unlocking in response to the fact that the difference value of the second time and the first time is larger than or equal to a preset fingerprint effective time interval.
4. The method of claim 1, wherein the comparing the fingerprint information with the pre-stored fingerprint information in response to the difference between the second time and the first time being less than the preset fingerprint validity time interval comprises:
and if the fingerprint information comparison fails, refusing to unlock.
5. The method according to any of claims 1-4, wherein the timer times at a different time than a system time of the electronic device;
and/or the timer does not provide an interface to the outside and is not visible to the outside.
6. The method according to any of claims 1-4, wherein the predetermined fingerprint validity time interval is less than or equal to 2 s.
7. The method according to any one of claims 1 to 4, wherein the fingerprint unlocking request information is generated by a fingerprint controller of the electronic device acquiring fingerprint information of the user and a current timing time of the timer when the user presses the collected fingerprint, and the current timing time is an initial time, and then combining the acquired fingerprint information of the user and the initial time.
8. The utility model provides a fingerprint unlocking device, is applied to electronic equipment, its characterized in that includes:
the receiving module is used for receiving fingerprint unlocking request information;
the separation module is used for responding to the fact that the fingerprint unlocking request information contains time information, and separating the fingerprint unlocking request information into the fingerprint information and the time information, wherein the time information is first time;
the acquisition module is used for acquiring the current timing time of a timer preset in the electronic equipment, and the current timing time is second time;
the comparison module is used for responding that the difference value between the second time and the first time is smaller than a preset fingerprint effective time interval, and comparing the fingerprint information with the fingerprint information stored in advance;
and the unlocking module is used for sending an unlocking instruction if the fingerprint information comparison is passed.
9. An electronic device, characterized in that the electronic device comprises: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory, for performing the method of any of the above claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores one or more programs which are executable by one or more processors to implement the method of any of the preceding claims 1-7.
CN202210617264.6A 2022-06-01 2022-06-01 Fingerprint unlocking method and device, electronic equipment and storage medium Active CN114969705B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210617264.6A CN114969705B (en) 2022-06-01 2022-06-01 Fingerprint unlocking method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210617264.6A CN114969705B (en) 2022-06-01 2022-06-01 Fingerprint unlocking method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114969705A true CN114969705A (en) 2022-08-30
CN114969705B CN114969705B (en) 2024-08-16

Family

ID=82958717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210617264.6A Active CN114969705B (en) 2022-06-01 2022-06-01 Fingerprint unlocking method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114969705B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069343A (en) * 2015-08-26 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method, fingerprint verification apparatus and terminal
CN106020418A (en) * 2016-05-16 2016-10-12 广东欧珀移动通信有限公司 Method and apparatus for reducing power consumption of mobile terminal, and mobile terminal
CN106951768A (en) * 2017-05-10 2017-07-14 广东欧珀移动通信有限公司 The ageing control method of unlocked by fingerprint, device, mobile terminal and storage medium
CN107315938A (en) * 2017-06-26 2017-11-03 上海斐讯数据通信技术有限公司 A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device
US20170344786A1 (en) * 2016-05-27 2017-11-30 Fu Tai Hua Industry (Shenzhen) Co., Ltd. Electronic device with fingerprint identification function and fingerprint identification method
WO2018145241A1 (en) * 2017-02-07 2018-08-16 廖建强 Method and device for electronic payment based on fingerprint information
US10078743B1 (en) * 2013-01-31 2018-09-18 Narus, Inc. Cross identification of users in cyber space and physical world
US20180268121A1 (en) * 2016-03-10 2018-09-20 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal
CN108563934A (en) * 2018-03-09 2018-09-21 青岛海信移动通信技术股份有限公司 A kind of method and device of unlocked by fingerprint
CN108710809A (en) * 2018-03-21 2018-10-26 清华大学 Method of controlling security, the apparatus and system of processor
CN109409126A (en) * 2018-10-22 2019-03-01 郑州云海信息技术有限公司 The guard method of data and device in distributed file storage system
US20190100166A1 (en) * 2016-07-20 2019-04-04 Tencent Technology (Shenzhen) Company Limited Data processing method and device, and system
CN110162952A (en) * 2019-05-30 2019-08-23 努比亚技术有限公司 Face unlocking method, device and readable storage medium storing program for executing based on the time difference
CN110955873A (en) * 2018-09-25 2020-04-03 华勤通讯技术有限公司 Fingerprint unlocking method of mobile terminal and mobile terminal
CN111310138A (en) * 2020-01-17 2020-06-19 珠海格力电器股份有限公司 Method and device for protecting equipment information security, storage medium and electronic equipment

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10078743B1 (en) * 2013-01-31 2018-09-18 Narus, Inc. Cross identification of users in cyber space and physical world
CN105069343A (en) * 2015-08-26 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Fingerprint verification method, fingerprint verification apparatus and terminal
US20180268121A1 (en) * 2016-03-10 2018-09-20 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method For Unlocking Screen Of Terminal Having Fingerprint Identification Sensors And Terminal
CN106020418A (en) * 2016-05-16 2016-10-12 广东欧珀移动通信有限公司 Method and apparatus for reducing power consumption of mobile terminal, and mobile terminal
US20170344786A1 (en) * 2016-05-27 2017-11-30 Fu Tai Hua Industry (Shenzhen) Co., Ltd. Electronic device with fingerprint identification function and fingerprint identification method
US20190100166A1 (en) * 2016-07-20 2019-04-04 Tencent Technology (Shenzhen) Company Limited Data processing method and device, and system
WO2018145241A1 (en) * 2017-02-07 2018-08-16 廖建强 Method and device for electronic payment based on fingerprint information
CN106951768A (en) * 2017-05-10 2017-07-14 广东欧珀移动通信有限公司 The ageing control method of unlocked by fingerprint, device, mobile terminal and storage medium
CN107315938A (en) * 2017-06-26 2017-11-03 上海斐讯数据通信技术有限公司 A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device
CN108563934A (en) * 2018-03-09 2018-09-21 青岛海信移动通信技术股份有限公司 A kind of method and device of unlocked by fingerprint
CN108710809A (en) * 2018-03-21 2018-10-26 清华大学 Method of controlling security, the apparatus and system of processor
CN110955873A (en) * 2018-09-25 2020-04-03 华勤通讯技术有限公司 Fingerprint unlocking method of mobile terminal and mobile terminal
CN109409126A (en) * 2018-10-22 2019-03-01 郑州云海信息技术有限公司 The guard method of data and device in distributed file storage system
CN110162952A (en) * 2019-05-30 2019-08-23 努比亚技术有限公司 Face unlocking method, device and readable storage medium storing program for executing based on the time difference
CN111310138A (en) * 2020-01-17 2020-06-19 珠海格力电器股份有限公司 Method and device for protecting equipment information security, storage medium and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨霞;刘志伟;雷航;: "基于TrustZone的指纹识别安全技术研究与实现", 计算机科学, no. 07, 15 July 2016 (2016-07-15) *

Also Published As

Publication number Publication date
CN114969705B (en) 2024-08-16

Similar Documents

Publication Publication Date Title
CN102523213B (en) Server and terminal authenticating method and server and terminal
US10187383B2 (en) Method of pushing passwords, and pushing system
EP1396824A3 (en) Authentication method, system and apparatus of an electronic value
CN108683667B (en) Account protection method, device, system and storage medium
US11676118B2 (en) Methods and systems for conducting multi-user interactions on a device using biometric authentication
CN110399708A (en) A kind of dual-identity authentication method, apparatus and electronic equipment
CN107437016B (en) Application control method and related product
CN104253818A (en) Server and terminal authentication method, server, terminal
CN105830079A (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
CN111862432A (en) Entrance guard verification method, entrance guard device, server and system
WO2016062200A1 (en) Fingerprint authentication method and apparatus, and server
CN108566371B (en) Social authentication method, system and terminal equipment
CN114969705A (en) Fingerprint unlocking method and device, electronic equipment and storage medium
CN111104653B (en) User operation processing method and device, electronic equipment and readable storage medium
EP3748980A1 (en) Interactive method and apparatus based on user action information, and electronic device
CN114581091A (en) Identity authentication method and device, computer equipment and storage medium
CN111581622A (en) Information processing method and device and electronic equipment
US20230108664A1 (en) Method for verifying liveness, and server using the same
CN110971609A (en) Anti-cloning method of DRM client certificate, storage medium and electronic equipment
CN105224885A (en) A kind of data processing method and terminal
CN113254904B (en) Intelligent processing method, device, equipment and medium for multi-dimensional information acquisition and identification
CN112580009A (en) Method and device for authenticating user identity in big data system and related products
CN109302422B (en) Method for logging in mobile application, mobile terminal, electronic equipment, system and storage medium
CN107423604B (en) Application control method and related product
JP2004310202A (en) Individual identification system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant