Fingerprint authentication method, fingerprint authentication apparatus, and terminal

A fingerprint verification and terminal technology, applied in digital data authentication, character and pattern recognition, instruments, etc., can solve problems such as inability to guarantee user information security, Jiugongge connection, easy stealing and cracking of sliding numbers, and failure to use user identity features, etc. , to achieve the effect of increasing diversity and improving safety

Inactive Publication Date: 2015-12-02
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current method of locking and unlocking the terminal screen is relatively simple. When the user unlocks the terminal screen, the user’s identity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fingerprint authentication method, fingerprint authentication apparatus, and terminal
  • Fingerprint authentication method, fingerprint authentication apparatus, and terminal
  • Fingerprint authentication method, fingerprint authentication apparatus, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0033] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0034] figure 1 A flow chart of a fingerprint verification method according to an embodiment of the present invention is shown.

[0035] Such as figure 1 As shown, the fingerprint verification met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a fingerprint authentication method, a fingerprint authentication apparatus, and a terminal. The fingerprint authentication method comprises: collecting multiple pieces of fingerprint information by using a fingerprint collecting apparatus; detecting whether the multiple pieces of fingerprint information, position information of the multiple pieces of fingerprint information, and a collecting sequence of the multiple pieces of fingerprint information all meet predetermined conditions; and when a detection result is yes, accepting fingerprint authentication, and otherwise, denying fingerprint authentication. According to the technical scheme of the present invention, only when the position information of the multiple pieces of fingerprint information is consistent with the predetermined position information, the collecting sequence is also consistent with the predetermined sequence, and the multiple pieces of fingerprint information are all consistent with the predetermined fingerprint information, the fingerprint authentication is accepted, thereby increasing the authentication conditions of fingerprint information and improving security of the fingerprint authentication.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a fingerprint verification method, a fingerprint verification device and a terminal. Background technique [0002] At present, the terminal screen unlocking method generally adopts Jiugongge connection method, sliding method, and digital method to unlock. This is mainly to ensure the security of user information and prevent user information from being leaked. [0003] However, the current method of locking and unlocking the terminal screen is relatively simple. When the user unlocks the terminal screen, the user identity feature is not used, and the Jiugongge connection, sliding, and numbers are easy to steal and crack, which cannot guarantee the user's information security. [0004] Therefore, a new technical solution is needed, which can increase the verification conditions of fingerprint information and improve the security of fingerprint verification. Contents of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06K9/00G06V40/13
CPCG06F21/32G06F2221/2141G06V40/13G06F18/00
Inventor 张明臣
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products