Method and device for using fingerprint information
A fingerprint information and fingerprint technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve the problems of slow writing and reading of security data, slow operation of fingerprint information, and poor user experience, etc., to improve speed effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] Figure 1a It is a schematic flowchart of a method for using fingerprint information provided by Embodiment 1 of the present invention. The method can be executed by a device for using fingerprint information, wherein the device can be implemented by software and / or hardware, and can be built as a part of an intelligent terminal Inside the smart terminal, the smart terminal may be an electronic terminal such as a smart phone or a tablet computer. Such as Figure 1a As shown, the implementation process includes:
[0020] Step 11. Obtain the decrypted fingerprint information preloaded into the volatile memory corresponding to the security application program when the fingerprint information use event is detected.
[0021] In this embodiment, the fingerprint information use event refers to an event that needs to use the fingerprint information pre-stored in the smart terminal, such as a fingerprint information matching event, a fingerprint information sending event, etc., ...
Embodiment 2
[0033] This embodiment provides a new method for using fingerprint information on the basis of the first embodiment above. figure 2 It is a schematic flowchart of a method for using fingerprint information provided by Embodiment 2 of the present invention, as shown in figure 2 As shown, the implementation process may specifically include:
[0034] Step 21. Obtain the decrypted fingerprint information preloaded into the volatile memory corresponding to the security application program when the fingerprint information usage event is detected.
[0035] Step 22. Execute the processing program of the fingerprint information use event according to the obtained decrypted fingerprint information.
[0036] Step 23. When a fingerprint information storage event is detected, control the user interface thread to acquire the fingerprint information input by the user and store the acquired fingerprint information in the volatile memory corresponding to the security application.
[0037] ...
Embodiment 3
[0043] This embodiment provides a new method for using fingerprint information on the basis of the first embodiment above. In this embodiment, the fingerprint information use event is a fingerprint information identification event. image 3 It is a schematic flowchart of a method for using fingerprint information provided by Embodiment 3 of the present invention, as shown in image 3As shown, the implementation process may specifically include:
[0044] Step 31 , when a fingerprint information identification event is detected, obtain the decrypted fingerprint information preloaded into the volatile memory corresponding to the security application program.
[0045] In this embodiment, when it is detected that the user clicks on a fingerprint identification button such as a fingerprint unlock button, a fingerprint information identification event is generated. The smart terminal directly obtains the decrypted fingerprint information from the volatile memory corresponding to the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


