Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and device for safely operating file upon fingerprint identification sensor

A technology of fingerprint identification and safe operation, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as loss, troublesome important information, etc.

Active Publication Date: 2015-02-04
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, fingerprint recognition sensors are more used in the field of encryption, such as file encryption, mobile phone encryption, and extended fields such as fingerprint recognition and unlocking, etc., but usually fingerprint recognition and unlocking are only one-time verification, such as password unlocking of the screen, as long as the fingerprint After the password is successfully verified, there is no need to verify again. Once the smart mobile terminal is handed over to the surrounding people, others can perform various operations on the smart mobile terminal, such as processing important information-deleting, cutting, etc. Once some files are deleted or cut and dragged to other folders by mistake, it will be more troublesome or even cause irreversible loss of important information if you want to retrieve them again.
Now there is an urgent need for a convenient and quick method of assigning encryption means to the operation of important information, which can not only encrypt the operation of important information, but also not affect the convenience of operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safely operating file upon fingerprint identification sensor
  • Method and device for safely operating file upon fingerprint identification sensor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] See figure 1 , figure 1 It is a flow chart of the method for securely operating files based on the fingerprint recognition sensor in the first embodiment. figure 1 The shown method for securely operating files based on a fingerprint recognition sensor is applied to an intelligent mobile terminal equipped with a fingerprint recognition sensor. The fingerprint recognition sensor recognizes gestures, and combined with fingerprint verification, it realizes the encryption function of special operations related to important information, and at the same time ensures the convenience of special operations related to important information without affecting the user's operating experience.

[0069] Wherein the intelligent mobile terminal includes a mobile phone, a tablet computer, a palm Internet device and the like.

[0070] Such as figure 1 As shown, the method for safely operating files based on fingerprint recognition sensors disclosed in this embodiment includes the follow...

Embodiment 2

[0096] See figure 2 , figure 2It is a block diagram of a device for securely operating files based on a fingerprint recognition sensor in the second embodiment.

[0097] This embodiment discloses a device for securely operating files based on a fingerprint recognition sensor, which is applied to an intelligent mobile terminal equipped with a fingerprint recognition sensor, wherein the intelligent mobile terminal includes a mobile phone, a tablet computer, and a palm Internet device and the like.

[0098] Such as figure 2 As shown, the device specifically includes the following units:

[0099] A. User fingerprint entry unit,

[0100] Specifically, the unit includes:

[0101] A.1. The fingerprint entry setting request module, which is used for the smart mobile terminal operating system to receive the fingerprint entry setting request sent by the user.

[0102] A.2. Request response and fingerprint acquisition module, which is used for the smart mobile terminal operating ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for safely operating a file upon a fingerprint identification sensor. The method is applied to an intelligent mobile terminal configured with the fingerprint identification sensor, and comprises the following steps: S1, starting the fingerprint identification sensor after to-be-operated target information is selected; S2, capturing first fingerprint image data, and recording the capture time and the capture position; S3, capturing second fingerprint image data, and recording the capture time and the capture position; S4, judging and comparing the first fingerprint image data, the second fingerprint image data and user preset fingerprint image data; S5, judging a gesture glide direction according to the first fingerprint capture position and the second fingerprint capture position; S6, calling a gesture and information operation mapping relation table, looking up a corresponding target information operating mode, and operating the target information. According to the method disclosed by the invention, gesture glide is identified by utilizing the fingerprint identification sensor; meanwhile, by combining fingerprint verification, not only is the encryption function of the related special operation of the important information file realized but also the convenience of the related special operation of the important information file is guaranteed.

Description

technical field [0001] The invention relates to the technical field of the combination of an intelligent mobile terminal and a fingerprint recognition sensor, in particular to a method and device for safely operating files based on a fingerprint recognition sensor. Background technique [0002] The nearly 20 years from the end of the 20th century to the beginning of the 21st century was the golden growth stage of the rapid development of mobile communications. Mobile electronic devices have been widely popularized and applied. The update speed of mobile phone electronic products is dizzying. The leapfrog development from 2G GSM to 4G LTE, and the mobile phone has evolved from an electronic device with only a single call function to an intelligent operating platform including various application software such as call management, games and entertainment, and office notes. Smart mobile terminals usually store a large amount of important information of the user, such as address ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32G06F21/60
CPCG06F21/32G06F21/602G06F2221/2107G06F2221/2141
Inventor 张强
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products