A method and device for logging in using a fingerprint key
A fingerprint and fingerprint verification technology, applied in the field of information security, can solve the problems of fingerprint Key verification use, fingerprint Key cannot be used, and fingerprint verification is not supported.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0076] Embodiment 1 of the present invention provides a method for logging in using a fingerprint key, including:
[0077] When the second function is called, the device obtains the login verification method, and returns the login verification method to the operating system;
[0078] Specifically, in this embodiment, when the second function is called by the operating system, it also includes: the operating system judges whether the acquisition of the login verification method is successful through the return value of the second function, and if the second function returns the login verification method, then the login verification method is obtained. The method is successful, otherwise, the login verification method fails to be obtained.
[0079] In this embodiment, the device obtains the login verification method specifically as follows: the device sets the external PIN code verification method in the second function parameter as the first preset value; preferably, the device...
Embodiment 2
[0114] Embodiment 2 of the present invention provides a method for logging in using a fingerprint key, such as figure 1 shown, including:
[0115] When the operating system receives the login trigger information, it prompts the user to insert the fingerprint key; if it detects that the fingerprint key is inserted, it obtains all user certificates in the fingerprint key and displays them, prompting the user to select the certificate used for login; when the operating system receives The first function is called when the user selects the certificate used for login;
[0116] Step 101: when the first function is called, the device returns the function address list to the operating system;
[0117] Specifically, in this embodiment, the first function is CardAcquireContext, wherein the parameters passed in include: the first data structure; the device returning the function address list to the operating system includes: initializing the first data structure, obtaining the second F...
Embodiment 3
[0161] Embodiment 3 of the present invention provides a device for logging in using a fingerprint key, such as image 3 As shown, it includes a second operating module 302, a third operating module 303, a fourth operating module 304 and a fifth operating module 305;
[0162] The second operation module 302 is configured to obtain a login verification method, and return the login verification method to the operating system;
[0163] In this embodiment, the second operation module 302 is specifically configured to set the external PIN code verification method in the second function parameter to the first preset value, and return the external PIN code verification method of the first preset value to the operation System; preferably, the second operation module 302 is specifically configured to set the external PIN code verification method in the third data structure in the second function parameter as the first preset value, and set the external PIN code of the first preset value...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


