Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal

A technology for intelligent terminals and control of intelligent terminals, which can be used in digital data authentication, electrical components, transmission systems, etc.

Active Publication Date: 2014-01-22
刘子茂
View PDF10 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this authorization method is relatively cumbersome for users, and it cannot prevent non-smart terminal users from using smart terminals to control the operation authorization of the client.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
  • Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
  • Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080] The first embodiment aims to describe the operation authorization process of the client. See figure 1 , Which is a flowchart of a method for realizing client operation authorization through fingerprint confirmation disclosed in the first embodiment of the present invention, and the method includes the following steps:

[0081] Step 101: The client sends an authorization request carrying client-related information to the server;

[0082] In order to facilitate the description and understanding of the technical solution of the present invention, all steps in this embodiment are based on a specific application scenario. For example, client A pays an online shopping fee and sends an operation authorization request to confirm payment to application server B. , And the message can also carry payment bank account number, payment amount and other information, such as figure 2 As shown, after the user enters the bank account sa*****liu1, enters the payment amount of 50 yuan, and cli...

Embodiment 2

[0106] The difference between this embodiment and the first embodiment is that the server further randomly generates a verification code, and when sending the verification code to the client, it also sends an operation authorization request message carrying the verification code to the controlling intelligent terminal of the client. See Image 6 , Which is a flowchart of a method for realizing client operation authorization through fingerprint confirmation disclosed in the second embodiment of the present invention, including the following steps:

[0107] Step 201: The client sends an authorization request carrying client-related information to the server;

[0108] Step 202: After the server receives the operation authorization request sent by the client, it searches for a smart terminal in a networked state;

[0109] Step 203: The server randomly generates a verification code;

[0110] Step 204: The server sends the verification code to the client;

[0111] Step 205: The server forwar...

Embodiment 3

[0122] The difference between this embodiment and Embodiment 1 or Embodiment 2 is that the smart terminal matches the result of the user's fingerprint scan on the smart terminal with the fingerprint that has been entered for the control client operation authorization, and the matching result is whether it is authorized or The processing result of rejecting client authorization. See Picture 9 , Which is a flowchart of a method for realizing client operation authorization through fingerprint confirmation disclosed in the second embodiment of the present invention, including the following steps:

[0123] Step 301: The client sends an authorization request carrying client-related information to the server;

[0124] Step 302: After the server receives the operation authorization request sent by the client, it searches for a smart terminal in a networked state, and the smart terminal found is a control smart terminal that authorizes or denies the client operation;

[0125] Step 303: The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method of realizing client operation authorization through fingerprint confirmation, and an intelligent terminal. The method comprises the following steps: an operation authorization request is transmitted to a server by a client, after the operation authorization request transmitted by the client is received by the server, the intelligent terminal in a networking state is searched for, and a request of confirming whether operation of the client is authorized is transmitted to the intelligent terminal, after the operation authorization request transmitted by server is received by the intelligent terminal, a user is prompted to scan a fingerprint to confirm to authorize the operation, the user scans the fingerprint on the intelligent terminal, the scanned fingerprint is matched to the recorded fingerprint capable of confirming the authorization request, if matching is successful, the authorization is confirmed, the server allows the operation of the client, and the client operation authorization is successful, if the intelligent terminal refuses or the fingerprint matching is failed, the client operation is refused to authorize. According to the embodiment of the invention, an operation authorization process is safer, simple and easy, and convenient for user operation.

Description

Technical field [0001] The present invention relates to the field of computer application technology, in particular to a method and an intelligent terminal for realizing client operation authorization through fingerprint confirmation. Background technique [0002] In many network application scenarios, users generally need to enter a password in the client first, so that some high-security functions of the client can be successfully authorized on the server that provides network application services, and the user can use these high-security levels on the client Function. For example, account login, online transfer, online payment, workflow approval, etc. are all such authorization mechanisms to provide users with network application services. However, the password will be exposed to the public network and easily intercepted by intruders, resulting in loss of the password and lack of security in the authorization process; [0003] Another traditional authorization method is that t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/32
Inventor 刘琦
Owner 刘子茂
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More