[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110929245A - Fast login method and terminal based on fingerprint - Google Patents

Fast login method and terminal based on fingerprint Download PDF

Info

Publication number
CN110929245A
CN110929245A CN202010000834.8A CN202010000834A CN110929245A CN 110929245 A CN110929245 A CN 110929245A CN 202010000834 A CN202010000834 A CN 202010000834A CN 110929245 A CN110929245 A CN 110929245A
Authority
CN
China
Prior art keywords
user
program
account
fingerprint information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010000834.8A
Other languages
Chinese (zh)
Inventor
丁平
李帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202010000834.8A priority Critical patent/CN110929245A/en
Publication of CN110929245A publication Critical patent/CN110929245A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a fingerprint-based quick login method and a terminal, wherein the identity of a user is verified by clicking fingerprint information of a set position by the user, the user can quickly login by clicking a screen program icon after setting a fingerprint login mode, effective safety verification is carried out under the non-inductive condition, the supervision requirement is met, the action of touching a fingerprint input device again is avoided, the speed of logging in an application program by the user is improved, and the experience of the user in using the application program is improved.

Description

Fast login method and terminal based on fingerprint
Technical Field
The invention relates to the technical field of application programs, in particular to a rapid login method and a terminal based on fingerprints.
Background
At present, the fingerprint identification technology is widely applied to the login function of the mobile phone, a user contacts a fingerprint identifier on the front side of the mobile phone or a fingerprint identifier on the back side of the mobile phone through a finger fingerprint, and the mobile phone compares a fingerprint image stored in the mobile phone with a received identification fingerprint of the fingerprint identifier to judge whether the user can log in the mobile phone.
Based on the scheme, for example, after a user clicks an application program APP, the user enters a fingerprint input prompting interface, a fingerprint is input by using a fingerprint identifier of the mobile phone, and then the fingerprint is compared with background fingerprint identification to judge whether the user can log in. This approach has several problems as follows:
1. the user operation is cumbersome. After clicking the application program, the user logs in the page, and after clicking login, the user can input the fingerprint.
2. The recording process is sensible. Fingerprint information can only be entered after the prompt.
3. Affecting the customer experience. The input process is complicated, and user experience is influenced.
Disclosure of Invention
In order to solve at least one of the above problems, an embodiment of an aspect of the present invention provides a fast login method based on a fingerprint, including:
responding to a set position of a terminal display area clicked by a user under a set interface, and opening a program interface; the setting interface is a program icon placing interface, and the setting position is a program icon placing position;
verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the set position clicked by the user;
and after the verification is passed, executing the login operation of the corresponding account.
In some embodiments, the verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the user clicking the set position includes:
and comparing the reserved fingerprint information with the fingerprint information of the set position clicked by the user, and if the comparison result is consistent, passing the verification.
In some embodiments, the performing the login operation of the corresponding account includes:
retrieving an account name and an account key stored in an encrypted format from a memory of the terminal;
sending the encrypted account name and account key to a server;
and receiving the account information which is sent after the server decrypts the account information.
In some embodiments, the reserved fingerprint information is stored in an encrypted format in a folder under the program's corresponding directory.
An embodiment of the present invention further provides a terminal, including:
the program interface opening module is used for responding to the set position of the terminal display area clicked by the user under the set interface and opening the program interface; the setting interface is a program icon placing interface, and the setting position is a program icon placing position;
the verification module verifies the identity of the user according to the reserved fingerprint information and the fingerprint information of the set position clicked by the user;
and a login module. And after the verification is passed, executing the login operation of the corresponding account.
In some embodiments, the verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the user clicking the set position includes:
and comparing the reserved fingerprint information with the fingerprint information of the set position clicked by the user, and if the comparison result is consistent, passing the verification.
In some embodiments, the performing the login operation of the corresponding account includes:
retrieving an account name and an account key stored in an encrypted format from a memory of the terminal;
sending the encrypted account name and account key to a server;
and receiving the account information which is sent after the server decrypts the account information.
In some embodiments, the reserved fingerprint information is stored in an encrypted format in a folder under the program's corresponding directory.
A further embodiment of the present invention provides a computer device, which includes a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor executes the program to implement the steps of the method described above.
A further embodiment of the invention provides a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method described above.
The invention has the following beneficial effects:
the invention provides a fingerprint-based quick login method and a terminal, wherein the identity of a user is verified by clicking fingerprint information of a set position by the user, the user can quickly login by clicking a screen program icon after setting a fingerprint login mode, effective safety verification is carried out under the non-inductive condition, the supervision requirement is met, the action of touching a fingerprint input device again is avoided, the speed of logging in an application program by the user is improved, and the experience of the user in using the application program is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a fast login method based on a fingerprint according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of a terminal in the embodiment of the present invention.
Fig. 3 shows a schematic diagram of an electronic device suitable for implementing the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 shows a fast login method based on a fingerprint in an embodiment of the present invention, as shown in fig. 1, including:
s1: responding to a set position of a terminal display area clicked by a user under a set interface, and opening a program interface; the setting interface is a program icon placing interface, and the setting position is a program icon placing position.
Specifically, the display screen of the terminal may sense a position coordinate clicked by the user, and compare the position coordinate with a coordinate of the program icon, so as to determine whether the user clicks the placement position of the program icon.
When the user clicks the set position, the operation of opening the program interface is executed, for example, the system for installing the application generates an application calling instruction or an application opening instruction according to the judged result, and then the operation of opening the program interface is executed.
The setting interface is a program icon placement interface, specifically, for example, a primary interface of a terminal system, or a main interface. When the mobile phone is used, the first-level interface is often provided with 4 × 4 grids, each grid is provided with an application program icon, and the coordinate of each grid is the coordinate position of the program icon.
S2: and verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the set position clicked by the user.
Specifically, this step may be performed after the program interface is opened, or during the opening of the program interface. For example, when the program is already loaded during the opening of the interface, the program itself may perform data processing and data transmission and reception, and the program itself may perform fingerprint verification, or a system installed in the terminal may perform fingerprint verification.
For the embodiment of performing the fingerprint verification work by using the program itself, no matter in the process of opening the program interface or after the program interface is opened, the program is in a loading or running state, and at the moment, the identity of the user is verified by calling the reserved fingerprint information and comparing whether the reserved fingerprint information is matched with the current fingerprint information.
The method comprises the steps that fingerprint verification work is conducted on a system carried by a terminal, after a user clicks a set position, the user identity verification work is conducted, specifically, a verification program of the system calls reserved fingerprint information, and then comparison is conducted to compare whether the reserved fingerprint information is matched with current fingerprint information or not, so that the identity of the user is verified.
That is, the logic subject of the present invention may be the application itself, and after loading or running, the user identity is verified by matching through the execution logic of the application itself.
The logic body of the present invention may be a system installed in a terminal, which performs an authentication operation by an independent second program (for distinction, a logged-in program is defined as a first program, and an independently operating authentication program is defined as a second program), that is, the steps of the present invention may be performed by one program, or may be performed by a plurality of programs, respectively, and the present invention is not limited thereto.
S3: and after the verification is passed, executing the login operation of the corresponding account.
Specifically, after the verification is passed, the first program may send the user account and the corresponding key to the server, and the server sends the registered account information and the updated program interface notification (or instruction) according to the account and the corresponding key, or after the verification is passed, the first program sends the verification passing information to the server, and the server directly sends the registered account information and the updated program interface notification (or instruction).
The invention provides a fingerprint-based quick login method, which is characterized in that the identity of a user is verified by clicking fingerprint information of a set position by the user, the user can quickly login by clicking a screen program icon after setting a fingerprint login mode, effective safety verification is carried out under the non-inductive condition, the supervision requirement is met, the action of touching a fingerprint input device again is avoided, the speed of logging in an application program by the user is improved, and the experience of the user in using the application program is improved.
In some embodiments, the account name and the account key are processed through encryption, so step S3 specifically includes:
s31: retrieving an account name and an account key stored in an encrypted format from a memory of the terminal;
s32: sending the encrypted account name and account key to a server;
s33: and receiving the account information which is sent after the server decrypts the account information.
The account name and the corresponding key stored in an encrypted manner may be stored in any logical location of the terminal memory, for example, under a root directory of the terminal memory, and for facilitating quick retrieval of the first program, the account name and the corresponding key stored in an encrypted manner may be stored in a folder stored under the corresponding directory of the program.
Based on the same principle, in order to facilitate the fast calling of the first program, the reserved fingerprint information may also be stored in the folder under the directory corresponding to the program in an encrypted format, and the advantages thereof are not described herein again.
Certainly, in the present invention, the terminal needs to include a fingerprint identification module, and the fingerprint identification module can collect fingerprint information when the display screen is touched, that is, the orthographic projection of the fingerprint area covers the display area, and the terminal of "fingerprint under screen" based on the ultrasonic identification technology can be used, which is not described in detail herein.
Based on the same inventive concept, an embodiment of the present invention further provides a terminal, as shown in fig. 2, including:
the program interface opening module 1 is used for responding to the set position of the terminal display area clicked by a user under the set interface and opening the program interface; the setting interface is a program icon placing interface, and the setting position is a program icon placing position;
the verification module 2 is used for verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the set position clicked by the user;
and the login module 3 executes login operation of the corresponding account after the verification is passed.
The invention provides a terminal, which can verify the identity of a user by clicking the fingerprint information of a set position by the user, can realize quick login by clicking a screen program icon after the user sets a fingerprint login mode, and can perform effective safety verification under the non-inductive condition, thereby not only meeting the supervision requirement, but also getting rid of the action of touching a fingerprint input device again, improving the speed of logging in an application program by the user, and improving the experience of the user in using the application program.
In some embodiments, the verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the user clicking the set position includes:
and comparing the reserved fingerprint information with the fingerprint information of the set position clicked by the user, and if the comparison result is consistent, passing the verification.
In some embodiments, the performing the login operation of the corresponding account includes:
retrieving an account name and an account key stored in an encrypted format from a memory of the terminal;
sending the encrypted account name and account key to a server;
and receiving the account information which is sent after the server decrypts the account information.
In some embodiments, the reserved fingerprint information is stored in an encrypted format in a folder under the program's corresponding directory.
An embodiment of the present invention further provides a specific implementation manner of an electronic device, which is capable of implementing all steps in the fast login method based on a fingerprint in the foregoing embodiment, and referring to fig. 3, the electronic device specifically includes the following contents:
a processor (processor)601, a memory (memory)602, a communication interface (communications interface)603, and a bus 604;
the processor 601, the memory 602 and the communication interface 603 complete mutual communication through the bus 604; the communication interface 603 is used for realizing information transmission between related devices such as a fingerprint-based fast login device and a user terminal;
the processor 601 is used to call the computer program in the memory 602, and when the processor executes the computer program, the processor implements all the steps of the fingerprint-based fast login method in the above embodiments.
As can be seen from the above description, in the electronic device provided in the embodiment of the present invention, the header combination information is obtained through image recognition, and then the task file including the instruction information is generated according to the header combination information including the instruction related information, the method and the system can get rid of a manner of manually entering the instruction elements by opening the image document, reduce the manual processing time, improve the service processing efficiency, fit the service usage scenario, have high accuracy and strong expandability, and can automatically generate the instruction by recognizing the instruction elements of the instruction image, and recognize the fax or mail instructions of different formats of the client into the information entry system in the standard format that can be recognized by the hosting system, and the operator only needs to confirm or modify the operation, thereby reducing the labor cost of the hosting operator, and improving the degree of the system automation processing.
An embodiment of the present invention further provides a computer-readable storage medium capable of implementing all the steps in the fingerprint-based fast login method in the above embodiment, where the computer-readable storage medium stores a computer program, and the computer program implements all the steps of the fingerprint-based fast login method in the above embodiment when being executed by a processor, for example, the processor implements the following steps when executing the computer program.
As can be seen from the above description, the computer-readable storage medium according to the embodiments of the present invention obtains header combination information through image recognition, and then generates a task file including instruction information according to the header combination information including instruction-related information, so that the present invention can get rid of a manner of manually entering instruction elements by opening an image document, reduce manual processing time, improve service processing efficiency, fit a service usage scenario, have high accuracy and strong expandability, and can automatically generate an instruction by recognizing the instruction image, and identify a fax or mail instruction in a different format for a client as information in a standard format that can be recognized by a hosting system, so that the operator only needs to confirm or modify operations, thereby reducing the labor cost of the hosting operator, and improving the degree of automated processing of the system.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the hardware + program class embodiment, since it is substantially similar to the method embodiment, the description is simple, and the relevant points can be referred to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Although the present invention provides method steps as described in the examples or flowcharts, more or fewer steps may be included based on routine or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or client product executes, it may execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the embodiments or methods shown in the figures.
The apparatuses, modules or units illustrated in the above embodiments may be specifically implemented by a computer chip or an entity, or implemented by an article with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a vehicle-mounted human-computer interaction device, a cellular telephone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Although embodiments of the present description provide method steps as described in embodiments or flowcharts, more or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. When an actual apparatus or end product executes, it may execute sequentially or in parallel (e.g., parallel processors or multi-threaded environments, or even distributed data processing environments) according to the method shown in the embodiment or the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in a process, method, article, or apparatus that comprises the recited elements is not excluded.
For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. Of course, in implementing the embodiments of the present description, the functions of each module may be implemented in one or more software and/or hardware, or a module implementing the same function may be implemented by a combination of multiple sub-modules or sub-units, and the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another apparatus, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, apparatus or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The embodiments of this specification may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The described embodiments may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment. In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of an embodiment of the specification. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
The above description is only an example of the embodiments of the present disclosure, and is not intended to limit the embodiments of the present disclosure. Various modifications and variations to the embodiments described herein will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the embodiments of the present specification should be included in the scope of the claims of the embodiments of the present specification.

Claims (10)

1. A fast login method based on fingerprint is characterized by comprising the following steps:
responding to a set position of a terminal display area clicked by a user under a set interface, and opening a program interface; the setting interface is a program icon placing interface, and the setting position is a program icon placing position;
verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the set position clicked by the user;
and after the verification is passed, executing the login operation of the corresponding account.
2. The fast login method of claim 1, wherein the verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the user clicking the set location comprises:
and comparing the reserved fingerprint information with the fingerprint information of the set position clicked by the user, and if the comparison result is consistent, passing the verification.
3. The fast login method according to claim 2, wherein the performing of the login operation of the corresponding account comprises:
retrieving an account name and an account key stored in an encrypted format from a memory of the terminal;
sending the encrypted account name and account key to a server;
and receiving the account information which is sent after the server decrypts the account information.
4. The fast login method of claim 1, wherein the reserved fingerprint information is stored in an encrypted format in a folder under the corresponding directory of the program.
5. A terminal, comprising:
the program interface opening module is used for responding to the set position of the terminal display area clicked by the user under the set interface and opening the program interface; the setting interface is a program icon placing interface, and the setting position is a program icon placing position;
the verification module verifies the identity of the user according to the reserved fingerprint information and the fingerprint information of the set position clicked by the user;
and the login module executes login operation of the corresponding account after the verification is passed.
6. The terminal according to claim 5, wherein the verifying the identity of the user according to the reserved fingerprint information and the fingerprint information of the user clicking the set position comprises:
and comparing the reserved fingerprint information with the fingerprint information of the set position clicked by the user, and if the comparison result is consistent, passing the verification.
7. The terminal according to claim 6, wherein the performing of the login operation of the corresponding account comprises:
retrieving an account name and an account key stored in an encrypted format from a memory of the terminal;
sending the encrypted account name and account key to a server;
and receiving the account information which is sent after the server decrypts the account information.
8. The terminal of claim 5, wherein the reserved fingerprint information is stored in an encrypted format in a folder under the corresponding directory of the program.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 4 are implemented when the program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 4.
CN202010000834.8A 2020-01-02 2020-01-02 Fast login method and terminal based on fingerprint Pending CN110929245A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010000834.8A CN110929245A (en) 2020-01-02 2020-01-02 Fast login method and terminal based on fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010000834.8A CN110929245A (en) 2020-01-02 2020-01-02 Fast login method and terminal based on fingerprint

Publications (1)

Publication Number Publication Date
CN110929245A true CN110929245A (en) 2020-03-27

Family

ID=69854362

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010000834.8A Pending CN110929245A (en) 2020-01-02 2020-01-02 Fast login method and terminal based on fingerprint

Country Status (1)

Country Link
CN (1) CN110929245A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN103593214A (en) * 2013-11-07 2014-02-19 健雄职业技术学院 Method for starting and logging onto software through touch display screen and touch display screen
CN109814801A (en) * 2019-01-31 2019-05-28 Oppo广东移动通信有限公司 Using login method, device, terminal and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103425914A (en) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 Login method of application program and communication terminal
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN103593214A (en) * 2013-11-07 2014-02-19 健雄职业技术学院 Method for starting and logging onto software through touch display screen and touch display screen
CN109814801A (en) * 2019-01-31 2019-05-28 Oppo广东移动通信有限公司 Using login method, device, terminal and storage medium

Similar Documents

Publication Publication Date Title
CN112053161B (en) Binding processing method, device and equipment
US11003754B2 (en) Method and apparatus for user authentication based on feature information
CN108958844B (en) Application program control method and terminal
US9990209B2 (en) Digital assistance device for facilitating multi-stage setup
US10878212B2 (en) Two-dimensional code scanning interaction methods and apparatuses
US10389710B2 (en) Method and system for extracting characteristic information
CN106648384B (en) Service calling method and device
CN107317928B (en) Information processing method, mobile terminal and computer readable storage medium
CN107533596B (en) Fingerprint identification method and mobile terminal
CN110581921A (en) Control method and device for folding screen equipment
CN107330848A (en) Image processing method, mobile terminal and storage device
CN112241362B (en) Test method, test device, server and storage medium
CN108289080B (en) Method, device and system for accessing file system
CN111753270A (en) Application program login verification method, device, equipment and storage medium
CN110688632A (en) Application program login method, device, equipment and storage medium
CN108509228B (en) Page loading method, terminal equipment and computer readable storage medium
CN109063430A (en) A kind of method, device and equipment of data storage and authentication
CN110929245A (en) Fast login method and terminal based on fingerprint
CN107272989A (en) Using startup method, device and terminal device
CN108255715B (en) Test result processing method and terminal equipment
CN117389655A (en) Task execution method, device, equipment and storage medium in cloud native environment
CN108270741B (en) Mobile terminal authentication method and system
CN110928754A (en) Operation and maintenance auditing method, device, equipment and medium
US10470015B1 (en) System with automatic creation of application-orchestration widgets for multi-application interaction
CN109104759B (en) Interaction method of electronic equipment, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327