[go: up one dir, main page]

CN114465818A - APP fingerprint login method based on artificial intelligence and related equipment - Google Patents

APP fingerprint login method based on artificial intelligence and related equipment Download PDF

Info

Publication number
CN114465818A
CN114465818A CN202210292396.6A CN202210292396A CN114465818A CN 114465818 A CN114465818 A CN 114465818A CN 202210292396 A CN202210292396 A CN 202210292396A CN 114465818 A CN114465818 A CN 114465818A
Authority
CN
China
Prior art keywords
fingerprint
login
verification
user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210292396.6A
Other languages
Chinese (zh)
Inventor
卢中华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN202210292396.6A priority Critical patent/CN114465818A/en
Publication of CN114465818A publication Critical patent/CN114465818A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Telephone Function (AREA)

Abstract

The application provides an APP fingerprint login method, an APP fingerprint login device, electronic equipment and a storage medium based on artificial intelligence, wherein the APP fingerprint login method based on artificial intelligence comprises the following steps: acquiring hardware information of a terminal where an APP is located to generate a terminal identifier; acquiring login information of a user according to a preset login mode to generate a fingerprint login verification password; storing the terminal identifier and the fingerprint login authentication password to a server as authentication data when a user logs in by a fingerprint; when a user logs in a fingerprint, sequentially verifying a terminal identifier and a fingerprint login verification password in the verification data according to a server to obtain a verification result; and determining the fingerprint login state of the user based on the verification result. According to the fingerprint login method and device, when the user logs in through the fingerprint, login is completed according to the server through verification, the safety risk caused by different environments when the user logs in through the fingerprint is effectively prevented, and the security of fingerprint login is improved.

Description

APP fingerprint login method based on artificial intelligence and related equipment
Technical Field
The application relates to the technical field of artificial intelligence, in particular to an APP fingerprint login method and device based on artificial intelligence, electronic equipment and a storage medium.
Background
In the prior art, when fingerprint login is started, a user name and a password of a user are usually encrypted and then stored locally, when the user passes fingerprint login verification, the user name and the password stored locally are decrypted, and a login interface at the rear end is called to obtain a login credential to complete the whole process of the user logging in by using a fingerprint.
However, the security means is single, and the password is easy to crack, which brings security risks to the system and the user, and is easy to leak the personal information of the user.
Disclosure of Invention
In view of the foregoing, there is a need for an APP fingerprint login method based on artificial intelligence and related devices to solve the technical problem of how to improve the security of fingerprint login on a terminal APP, where the related devices include an APP fingerprint login apparatus based on artificial intelligence, an electronic device and a storage medium.
The application provides an APP fingerprint login method based on artificial intelligence, which comprises the following steps:
acquiring hardware information of a terminal where an APP is located to generate a terminal identifier;
acquiring login information of a user according to a preset login mode to generate a fingerprint login verification password;
storing the terminal identifier and the fingerprint login authentication password to a server as authentication data when a user logs in by a fingerprint;
when a user logs in a fingerprint, sequentially verifying a terminal identifier and a fingerprint login verification password in the verification data according to a server to obtain a verification result;
and determining the fingerprint login state of the user based on the verification result.
Therefore, the terminal identifier is generated according to the hardware information of the terminal where the APP is located, the login information of the user is acquired, and the fingerprint login verification password is generated, so that when the user performs fingerprint login, the user can complete login by checking according to the server, personal information registered by the user can be stored in the terminal without the need of storing the personal information, the safety risk caused by different environments when the user performs fingerprint login is effectively prevented, and the security of fingerprint login is improved.
In some embodiments, the obtaining hardware information of a terminal where the APP is located to generate the terminal identifier includes:
acquiring hardware information of a terminal where the APP is located according to a preset script command;
splicing the hardware information to obtain a spliced character string;
coding the splicing character string according to a user-defined coding tool, and taking the code as terminal coding data;
and encrypting the terminal coding data according to an encryption algorithm to obtain the terminal identifier.
Therefore, the terminal identifier of each acquired terminal can be unique, the terminal identifier can be distinguished conveniently, the terminal identifier is difficult to acquire after encryption, and the value of the terminal identifier cannot be changed no matter a user reloads the terminal through unloading, or clears the APP cache, or restarts the mobile phone and other operations.
In some embodiments, the obtaining login information of the user according to a preset login manner to generate the fingerprint login authentication password includes:
sending a login request to a server according to a preset login mode to log in a terminal;
the server sends return value data to the terminal after checking through the login request, wherein the return value data comprises a login certificate and a user ID;
coding the login certificate, the user ID and the current system time according to a user-defined coding tool to obtain login coding data;
and encrypting the login encoding data according to an encryption algorithm to generate the fingerprint login authentication password.
Therefore, the login authentication password can be unique, the security strength of the password can be effectively improved after encryption, and potential safety hazards caused by password acquisition are reduced.
In some embodiments, said storing said terminal identifier and said fingerprint login authentication password to a server as authentication data at the time of a user fingerprint login comprises:
storing the user ID and the fingerprint login authentication password to a terminal database in a key value pair mode;
and interacting the terminal database and the server according to the HTTPS to acquire verification data, wherein the verification data comprises a user ID, a fingerprint login verification password and a terminal identifier.
Therefore, the user ID and the fingerprint login authentication password are stored in the terminal database in a key value pair mode, so that the authentication data can be rapidly accessed, and the authentication efficiency during fingerprint login is improved.
In some embodiments, when the user performs fingerprint login, sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result includes:
fingerprint verification is carried out on the user according to a preset API;
after the verification is passed, matching the user ID with a corresponding fingerprint login verification password in the terminal database to obtain the verification data;
and the terminal sends the terminal identifier and the fingerprint login authentication password in the authentication data to the server for sequentially verifying to obtain the verification result.
Therefore, the verification is carried out according to the server, the personal information registered by the user does not need to be stored in the terminal, the safety risk caused by different environments when the user carries out fingerprint login is effectively prevented, and the safety of the fingerprint login is improved.
In some embodiments, the fingerprint verification of the user according to the preset API includes:
acquiring a user fingerprint according to a fingerprint sensor to construct a fingerprint database, wherein the user ID in the fingerprint database corresponds to the user fingerprint one by one;
matching the user ID with the fingerprint database to obtain a matching result, wherein the matching result comprises matching success and matching failure;
if the matching result is successful, returning the fingerprint characteristic template corresponding to the user for fingerprint verification;
and if the matching result is matching failure, returning the matching result and ending the fingerprint verification process.
Therefore, before fingerprint verification login, the user ID is required to be matched in the fingerprint database to search the fingerprint template corresponding to the current user, so that illegal login of other people who are unexpected to the user is further prevented, and the security of fingerprint login is improved.
In some embodiments, said determining the fingerprint login status of the user based on the verification result comprises:
the verification result comprises verification passing and verification failing;
if the verification result is that the verification is passed, the fingerprint login state is login success, the server generates a new login certificate and sends the user ID and the new login certificate to the terminal to generate a new fingerprint login password;
and if the verification result is that the verification is not passed, the fingerprint login state is login failure, the fingerprint login process is ended, and a new fingerprint login process is started.
Therefore, when the verification result is that the verification is passed, preparation can be made for the next fingerprint login of the user again, a new fingerprint login password can be generated in time, and the security of the user in fingerprint login every time is further improved.
The embodiment of the application still provides an APP fingerprint login device based on artificial intelligence, the device includes:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring hardware information of a terminal where an APP is located so as to generate a terminal identifier;
the generating unit is used for acquiring login information of a user according to a preset login mode so as to generate a fingerprint login verification password;
the storage unit is used for storing the terminal identifier and the fingerprint login authentication password to a server to serve as authentication data when a user logs in by a fingerprint;
the verification unit is used for sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result when the user logs in the fingerprint;
and the determining unit is used for determining the fingerprint login state of the user based on the verification result.
An embodiment of the present application further provides an electronic device, where the electronic device includes:
a memory storing at least one instruction;
and the processor executes the instructions stored in the memory to realize the artificial intelligence based APP fingerprint login method.
The embodiment of the present application further provides a computer-readable storage medium, where at least one instruction is stored, and the at least one instruction is executed by a processor in an electronic device to implement the artificial intelligence based APP fingerprint login method.
Drawings
FIG. 1 is a flow chart of a preferred embodiment of an artificial intelligence based APP fingerprint enrollment method to which the present application relates.
Fig. 2 is a flowchart of a preferred embodiment of obtaining hardware information of a terminal where an APP is located to generate a terminal identifier according to the present application.
FIG. 3 is a flowchart illustrating a preferred embodiment of obtaining login information of a user according to a predetermined login manner to generate a fingerprint login authentication password according to the present application.
Fig. 4 is a flowchart of a preferred embodiment according to the present application, when a user performs fingerprint login, sequentially verifying a terminal identifier and a fingerprint login verification password in the verification data according to a server to obtain a verification result.
FIG. 5 is a functional block diagram of a preferred embodiment of an artificial intelligence based APP fingerprint login device to which the present application relates.
Fig. 6 is a schematic structural diagram of an electronic device according to a preferred embodiment of an artificial intelligence based APP fingerprint login method according to the present application.
Detailed Description
For a clearer understanding of the objects, features and advantages of the present application, reference is made to the following detailed description of the present application along with the accompanying drawings and specific examples. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict. In the following description, numerous specific details are set forth to provide a thorough understanding of the present application, and the described embodiments are merely a subset of the embodiments of the present application and are not intended to be a complete embodiment.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
The embodiment of the Application provides an artificial intelligence-based APP fingerprint login method, which can be applied to one or more electronic devices, wherein the electronic devices are devices capable of automatically performing numerical calculation and/or information processing according to preset or stored instructions, and hardware of the electronic devices includes but is not limited to a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The electronic device may be any electronic product capable of performing human-computer interaction with a client, for example, a Personal computer, a tablet computer, a smart phone, a Personal Digital Assistant (PDA), a game machine, an Internet Protocol Television (IPTV), an intelligent wearable device, and the like.
The electronic device may also include a network device and/or a client device. The network device includes, but is not limited to, a single network server, a server group consisting of a plurality of network servers, or a Cloud Computing (Cloud Computing) based Cloud consisting of a large number of hosts or network servers.
The Network where the electronic device is located includes, but is not limited to, the internet, a wide area Network, a metropolitan area Network, a local area Network, a Virtual Private Network (VPN), and the like.
Fig. 1 is a flowchart illustrating a preferred embodiment of an APP fingerprint registration method based on artificial intelligence according to the present application. The order of the steps in the flow chart may be changed and some steps may be omitted according to different needs.
And S10, acquiring the hardware information of the terminal where the APP is located to generate the terminal identifier.
Referring to fig. 2, in an alternative embodiment, the obtaining hardware information of the terminal where the APP is located to generate the terminal identifier includes:
s101, acquiring hardware information of the terminal where the APP is located according to a preset script command.
In this optional embodiment, the hardware information of the terminal includes ANDROID _ ID (settings.secure.android _ ID), terminal motherboard information (build.board), terminal product name (build.product), terminal model (build.model), hardware manufacturer (build.manufacturer), unique device identification code (FINGERPRINT), display screen parameter (build.display), CPU instruction set (build.supported _ ABIS), and system version number (build.view.release), and the hardware information of the terminal may be obtained through Build class provided by the ANDROID system, for example, the terminal motherboard information may be obtained through build.board instruction.
And S102, splicing the hardware information to obtain a spliced character string.
In this optional embodiment, the obtained hardware information of the terminal is subjected to character string splicing through a StringBuffer to obtain a spliced character string, where the StringBuffer is a class provided by an Android system and is used for efficiently splicing the character string.
And S103, coding the splicing character string according to a custom coding tool, and taking the code as terminal coding data.
In this optional embodiment, the spliced character string is encoded according to a self-defined Base64 encoding tool to obtain terminal encoded data, wherein the Base64 encoding mode is to convert the spliced character string into a byte array, and then convert the byte array into 64 defined characters according to an ASCII code table, and the self-defined Base64 encoding mode is to encode self-defined binary data into character value logic of the character data.
For example, if the binary data 11 is encoded into the character data a by the Base64 encoding method carried by the system, and the binary data 11 is encoded into the character data F by the custom Base64 encoding method, the character value logic of the binary data encoded into the character data is changed.
S104, encrypting the terminal coding data according to an encryption algorithm to obtain the terminal identifier.
In this alternative embodiment, the terminal encoded data is encrypted according to the MD5 algorithm to generate a 16-byte hash value, and this scheme uses this hash value as the terminal identifier. The MD5 encryption algorithm is a widely used cryptographic hash function that generates a 128-bit (16-byte) hash value to ensure the integrity of information transmission.
In this optional embodiment, the commit () method is called by the SharedPreferences class provided by the Android system, and the terminal identifier is stored in the terminal database in the xml format.
Therefore, the terminal identifier of each acquired terminal can be unique, the terminal identifier can be distinguished conveniently, the terminal identifier is difficult to acquire after encryption, and the value of the terminal identifier cannot be changed no matter a user reloads the terminal through unloading, or clears the APP cache, or restarts the mobile phone and other operations.
And S11, acquiring login information of the user according to a preset login mode to generate a fingerprint login authentication password.
Referring to fig. 3, in an alternative embodiment, the obtaining login information of the user according to a preset login manner to generate the fingerprint login authentication password includes:
and S111, sending a login request to the server according to a preset login mode so as to log in the terminal.
In an optional embodiment, a precondition for the user to perform fingerprint login is that the user has logged in the terminal through a preset login manner, where the preset login manner may be a short message authentication code login, a gesture login, or the like.
S112, the server sends return value data to the terminal after checking the login request, wherein the return value data comprises a login certificate and a user ID.
In the optional embodiment, after the server passes the verification, the server sends return value data to the front end of the APP, where the return value data includes a login credential and a user ID, where the login credential refers to a necessary credential when the APP client accesses the back-end system, so as to determine whether the current user is a valid user, and when the user login authentication passes (for example, the user inputs a correct short message verification code), the server generates a login credential, and sends the login credential and the user ID as return value data to the APP front end.
S113, the login certificate, the user ID and the current system time are coded according to the user-defined coding tool to obtain login coding data.
In this alternative embodiment, the login credentials, user ID, and system current time (system currenttimemillis) are also encoded via custom Base64 encoding tools to obtain the login encoded data.
S114, encrypting the login coding data according to an encryption algorithm to generate the fingerprint login verification password.
In this alternative embodiment, the MD5 algorithm may also be used to encrypt the encoded data to obtain a 16-byte hash value, and use this hash value as the fingerprint login authentication password.
Therefore, the login authentication password can be unique, the security strength of the password can be effectively improved after encryption, and potential safety hazards caused by password acquisition are reduced.
And S12, storing the terminal identifier and the fingerprint login authentication password to a server as authentication data when the user logs in by fingerprint.
In an optional embodiment, storing the terminal identifier and the fingerprint login authentication password to the server as authentication data when the user fingerprint login occurs comprises:
and S121, storing the user ID and the fingerprint login authentication password in a terminal database in a key value pair mode.
In this alternative embodiment, the user ID may be used as a key, the fingerprint login authentication password may be used as a value, and the data may be stored in the terminal database by SharedPreferences.
And S122, interacting the terminal database and the server according to the HTTPS to acquire verification data, wherein the verification data comprises a user ID, a fingerprint login verification password and a terminal identifier.
In this optional embodiment, the user ID, the fingerprint login authentication password, and the terminal identifier are used as the authentication data, and the authentication data is requested to interact with a server in the public network through the HTTPS network, so as to be stored in the server at the back end, where the login credential and the user ID are placed in the request header of HTTPS, and the terminal identifier and the fingerprint login authentication password are placed in the body of HTTPS to be transmitted as parameters.
Therefore, the user ID and the fingerprint login authentication password are stored in the terminal database in a key value pair mode, so that the authentication data can be rapidly accessed, and the authentication efficiency during fingerprint login is improved.
And S13, when the user logs in the fingerprint, sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result.
Referring to fig. 4, in an alternative embodiment, when the user performs fingerprint login, sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result includes:
s131, fingerprint verification is conducted on the user according to a preset API.
In this alternative embodiment, when the user logs in the fingerprint, the API of biomeric, which is an SDK library for fingerprint authentication provided by Google officer, is used to invoke the fingerprint verification function of the mobile phone system, and the fingerprint collection is performed by the fingerprint sensor in the terminal.
In this optional embodiment, the performing fingerprint verification on the user according to the preset API includes: acquiring a user fingerprint according to a fingerprint sensor to construct a fingerprint database, wherein the user ID in the fingerprint database corresponds to the user fingerprint one by one; matching the user ID with the fingerprint database to obtain a matching result, wherein the matching result comprises matching success and matching failure; if the matching result is successful, returning the fingerprint characteristic template corresponding to the user for fingerprint verification; and if the matching result is matching failure, returning the matching result and ending the fingerprint verification process.
In this alternative embodiment, the fingerprint is collected by a fingerprint sensor in the user terminal, and the user ID is collected by an RFID card. And then, binding the user ID collected by the RFID card with the user fingerprint collected by the fingerprint sensor.
And S132, after the verification is passed, matching the user ID with the corresponding fingerprint login verification password in the terminal database to obtain the verification data.
In this optional embodiment, after the fingerprint identification verification passes, the fingerprint login verification password stored in the terminal may be acquired by using the user ID as a key.
S133, the terminal sends the terminal identifier and the fingerprint login authentication password in the authentication data to the server for verification in sequence to obtain the verification result.
In this optional embodiment, the server verifies the verification data sent by the terminal according to the stored verification data, and if the verification data sent by the terminal is consistent with the verification data stored by the server, the verification result is that the verification is passed; and if the verification data sent by the terminal is inconsistent with the verification data stored by the server, the verification result is that the verification fails.
Therefore, the verification is carried out according to the server, the personal information registered by the user does not need to be stored in the terminal, the safety risk caused by different environments when the user carries out fingerprint login is effectively prevented, and the safety of the fingerprint login is improved.
And S14, determining the fingerprint login state of the user based on the verification result.
In this optional embodiment, the verification result includes a pass verification and a fail verification, if the verification result is a pass verification, the fingerprint login status is login success, the server generates a new login credential, and sends the user ID and the new login credential to the terminal to generate a new fingerprint login password; and if the verification result is that the verification is not passed, the fingerprint login state is login failure, the fingerprint login process is ended, and a new fingerprint login process is started.
Therefore, when the verification result is that the verification is passed, preparation can be made for the next fingerprint login of the user again, a new fingerprint login password can be generated in time, and the security of the user in fingerprint login every time is further improved.
Referring to fig. 5, fig. 5 is a functional block diagram of a preferred embodiment of an APP fingerprint registration apparatus based on artificial intelligence according to the present application. The artificial intelligence based APP fingerprint login device 11 comprises an acquisition unit 110, a generation unit 111, a storage unit 112, a verification unit 113 and a determination unit 114. A module/unit as referred to herein is a series of computer readable instruction segments capable of being executed by the processor 13 and performing a fixed function, and is stored in the memory 12. In the present embodiment, the functions of the modules/units will be described in detail in the following embodiments.
In an optional embodiment, the obtaining unit 110 is configured to obtain hardware information of a terminal where the APP is located to generate the terminal identifier.
In an optional embodiment, the obtaining hardware information of the terminal where the APP is located to generate the terminal identifier includes:
acquiring hardware information of a terminal where the APP is located according to a preset script command;
splicing the hardware information to obtain a spliced character string;
coding the splicing character string according to a user-defined coding tool, and taking the code as terminal coding data;
and encrypting the terminal coding data according to an encryption algorithm to obtain the terminal identifier.
In this optional embodiment, the hardware information of the terminal includes the ANDROID _ ID of the terminal (settings, secure, ANDROID _ ID), the terminal motherboard information (Build, board), the terminal product name (Build, product), the terminal model (Build, model), the hardware manufacturer (Build, manufacturer), the unique device identifier (FINGERPRINT), the display parameter (Build, display), the CPU instruction set (Build, supported _ ABIS), and the system version number (Build, version, release), and the hardware information of the terminal may be obtained through the Build class provided by the ANDROID system, for example, the terminal motherboard information may be obtained through the Build.
In this optional embodiment, the obtained hardware information of the terminal is subjected to character string splicing through a StringBuffer to obtain a spliced character string, where the StringBuffer is a class provided by an Android system and is used for efficiently splicing the character string.
In this optional embodiment, the spliced character string is encoded according to a self-defined Base64 encoding tool to obtain terminal encoded data, wherein the Base64 encoding mode is to convert the spliced character string into a byte array, and then convert the byte array into 64 defined characters according to an ASCII code table, and the self-defined Base64 encoding mode is to encode self-defined binary data into character value logic of the character data.
For example, if the binary data 11 is encoded into the character data a by the system-owned Base64 encoding method, and the binary data 11 is encoded into the character data F by the custom Base64 encoding method, the character value logic of the binary data encoded into the character data is changed.
In this alternative embodiment, the terminal encoded data is encrypted according to the MD5 algorithm to generate a 16-byte hash value, and this scheme uses this hash value as the terminal identifier. The MD5 encryption algorithm is a widely used cryptographic hash function that generates a 128-bit (16-byte) hash value to ensure the integrity of information transmission.
In this optional embodiment, the commit () method is called by the SharedPreferences class provided by the Android system, and the terminal identifier is stored in the terminal database in the xml format.
In an alternative embodiment, the generating unit 111 is configured to obtain login information of a user according to a preset login manner to generate a fingerprint login authentication password.
In an optional embodiment, the obtaining login information of the user according to a preset login manner to generate the fingerprint login authentication password includes:
sending a login request to a server according to a preset login mode to log in a terminal;
the server sends return value data to the terminal after checking through the login request, wherein the return value data comprises a login certificate and a user ID;
coding the login certificate, the user ID and the current system time according to a user-defined coding tool to obtain login coding data;
and encrypting the login encoding data according to an encryption algorithm to generate the fingerprint login authentication password.
In an optional embodiment, a precondition for the user to perform fingerprint login is that the user has logged in the terminal through a preset login manner, where the preset login manner may be a short message authentication code login, a gesture login, or the like.
In the optional embodiment, after the server passes the verification, the server sends return value data to the front end of the APP, where the return value data includes a login credential and a user ID, where the login credential refers to a necessary credential when the APP client accesses the back-end system, so as to determine whether the current user is a valid user, and when the user login authentication passes (for example, the user inputs a correct short message verification code), the server generates a login credential, and sends the login credential and the user ID as return value data to the APP front end.
In this alternative embodiment, the login credentials, user ID, and system current time (system currenttimemillis) are also encoded via custom Base64 encoding tools to obtain the login encoded data.
In this alternative embodiment, the MD5 algorithm may also be used to encrypt the encoded data to obtain a 16-byte hash value, and use this hash value as the fingerprint login authentication password.
In an alternative embodiment, the storage unit 112 is configured to store the terminal identifier and the fingerprint login authentication password to the server as authentication data of the user at the time of fingerprint login.
In an optional embodiment, the storing the terminal identifier and the fingerprint login authentication password to a server as authentication data when the user logs in by fingerprint comprises:
storing the user ID and the fingerprint login verification password to a terminal database in a key value pair mode;
and interacting the terminal database and the server according to the HTTPS to acquire verification data, wherein the verification data comprises a user ID, a fingerprint login verification password and a terminal identifier.
In this alternative embodiment, the user ID may be used as a key, the fingerprint login authentication password may be used as a value, and the data may be stored in the terminal database by SharedPreferences.
In this optional embodiment, the user ID, the fingerprint login authentication password, and the terminal identifier are used as the authentication data, and the authentication data is requested to interact with a server in the public network through the HTTPS network, so as to be stored in the server at the back end, where the login credential and the user ID are placed in the request header of HTTPS, and the terminal identifier and the fingerprint login authentication password are placed in the body of HTTPS to be transmitted as parameters.
In an optional embodiment, the verification unit 113 is configured to, when the user performs fingerprint login, sequentially verify the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result.
In an optional embodiment, when the user performs fingerprint login, sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result includes:
fingerprint verification is carried out on the user according to a preset API;
after the verification is passed, matching the user ID with a corresponding fingerprint login verification password in the terminal database to obtain the verification data;
and the terminal sends the terminal identifier and the fingerprint login authentication password in the authentication data to the server for sequentially verifying to obtain the verification result.
In this alternative embodiment, when the user logs in the fingerprint, the API of biomeric, which is an SDK library for fingerprint authentication provided by Google officer, is used to invoke the fingerprint verification function of the mobile phone system, and the fingerprint collection is performed by the fingerprint sensor in the terminal.
In this optional embodiment, the performing fingerprint verification on the user according to the preset API includes: acquiring a user fingerprint according to a fingerprint sensor to construct a fingerprint database, wherein the user ID in the fingerprint database corresponds to the user fingerprint one by one; matching the user ID with the fingerprint database to obtain a matching result, wherein the matching result comprises matching success and matching failure; if the matching result is successful, returning the fingerprint characteristic template corresponding to the user for fingerprint verification; and if the matching result is matching failure, returning the matching result and ending the fingerprint verification process.
In this alternative embodiment, the fingerprint is acquired by a fingerprint sensor in the user terminal, and the user ID is acquired by an RFID card. And then, binding the user ID collected by the RFID card with the user fingerprint collected by the fingerprint sensor.
In this optional embodiment, after the fingerprint identification verification passes, the fingerprint login verification password stored in the terminal may be acquired by using the user ID as a key.
In this optional embodiment, the server verifies the verification data sent by the terminal according to the stored verification data, and if the verification data sent by the terminal is consistent with the verification data stored by the server, the verification result is that the verification is passed; and if the verification data sent by the terminal is inconsistent with the verification data stored by the server, the verification result is that the verification fails.
In an alternative embodiment, the determination unit 114 is configured to determine the fingerprint login status of the user based on the verification result.
In this optional embodiment, the verification result includes a pass verification and a fail verification, if the verification result is a pass verification, the fingerprint login status is login success, the server generates a new login credential, and sends the user ID and the new login credential to the terminal to generate a new fingerprint login password; and if the verification result is that the verification is not passed, the fingerprint login state is login failure, the fingerprint login process is ended, and a new fingerprint login process is started.
According to the technical scheme, the terminal identifier can be generated according to the hardware information of the terminal where the APP is located, the login information of the user is acquired, and the fingerprint login verification password is generated, so that when the user logs in the fingerprint, the login is completed according to the verification of the server, the personal information registered by the user can be stored in the terminal, the safety risk caused by different environments when the user logs in the fingerprint is effectively prevented, and the security of the fingerprint login is improved.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. The electronic device 1 comprises a memory 12 and a processor 13. The memory 12 is used for storing computer readable instructions, and the processor 13 is used for executing the computer readable instructions stored in the memory to implement the artificial intelligence based APP fingerprint login method described in any one of the above embodiments.
In an alternative embodiment, the electronic device 1 further comprises a bus, a computer program stored in said memory 12 and executable on said processor 13, such as an artificial intelligence based APP fingerprint login program.
Fig. 6 only shows the electronic device 1 with the memory 12 and the processor 13, and it will be understood by those skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
In connection with fig. 1, said memory 12 in the electronic device 1 stores a plurality of computer readable instructions to implement an artificial intelligence based APP fingerprint login method, said processor 13 being executable to implement:
acquiring hardware information of a terminal where the APP is located to generate a terminal identifier;
acquiring login information of a user according to a preset login mode to generate a fingerprint login verification password;
storing the terminal identifier and the fingerprint login authentication password to a server as authentication data when a user logs in by a fingerprint;
when a user logs in a fingerprint, sequentially verifying a terminal identifier and a fingerprint login verification password in the verification data according to a server to obtain a verification result;
and determining the fingerprint login state of the user based on the verification result.
Specifically, the processor 13 may refer to the description of the relevant steps in the embodiment corresponding to fig. 1 for a specific implementation method of the instruction, which is not described herein again.
It will be understood by those skilled in the art that the schematic diagram is only an example of the electronic device 1, and does not constitute a limitation to the electronic device 1, the electronic device 1 may have a bus-type structure or a star-shaped structure, the electronic device 1 may further include more or less hardware or software than those shown in the figures, or different component arrangements, for example, the electronic device 1 may further include an input and output device, a network access device, etc.
It should be noted that the electronic device 1 is only an example, and other existing or future electronic products, such as may be adapted to the present application, should also be included in the scope of protection of the present application, and is included by reference.
Memory 12 includes at least one type of readable storage medium, which may be non-volatile or volatile. The readable storage medium includes flash memory, removable hard disks, multimedia cards, card type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disks, optical disks, etc. The memory 12 may in some embodiments be an internal storage unit of the electronic device 1, for example a removable hard disk of the electronic device 1. The memory 12 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the electronic device 1. The memory 12 may be used not only for storing application software installed in the electronic device 1 and various types of data, such as codes of an artificial intelligence based APP fingerprint login program, etc., but also for temporarily storing data that has been output or is to be output.
The processor 13 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 13 is a Control Unit (Control Unit) of the electronic device 1, connects various components of the whole electronic device 1 by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (for example, executing an artificial intelligence based APP fingerprint login program and the like) stored in the memory 12 and calling data stored in the memory 12.
The processor 13 executes an operating system of the electronic device 1 and various installed application programs. The processor 13 executes the application program to implement the steps in each of the above embodiments of artificial intelligence based APP fingerprint login methods, such as the steps shown in fig. 1 to 4.
Illustratively, the computer program may be partitioned into one or more modules/units, which are stored in the memory 12 and executed by the processor 13 to accomplish the present application. The one or more modules/units may be a series of computer-readable instruction segments capable of performing certain functions, which are used to describe the execution of the computer program in the electronic device 1. For example, the computer program may be divided into an acquisition unit 110, a generation unit 111, a storage unit 112, a verification unit 113, a determination unit 114.
The integrated unit implemented in the form of a software functional module may be stored in a computer-readable storage medium. The software functional module is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a computer device, or a network device) or a processor (processor) to execute parts of the artificial intelligence based APP fingerprint login method according to the embodiments of the present application.
The integrated modules/units of the electronic device 1 may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, all or part of the processes in the methods of the embodiments described above may be implemented by a computer program, which may be stored in a computer-readable storage medium and executed by a processor, to implement the steps of the embodiments of the methods described above.
Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), random-access Memory and other Memory, etc.
Further, the computer-readable storage medium may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the blockchain node, and the like.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one arrow is shown in FIG. 6, but this does not indicate only one bus or one type of bus. The bus is arranged to enable connection communication between the memory 12 and at least one processor 13 or the like.
An embodiment of the present application further provides a computer-readable storage medium (not shown), in which computer-readable instructions are stored, and the computer-readable instructions are executed by a processor in an electronic device to implement the artificial intelligence based APP fingerprint login method according to any of the above embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the specification may also be implemented by one unit or means through software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only used for illustrating the technical solutions of the present application and not for limiting, and although the present application is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions can be made on the technical solutions of the present application without departing from the spirit and scope of the technical solutions of the present application.

Claims (10)

1. An artificial intelligence based APP fingerprint login method is characterized by comprising the following steps:
acquiring hardware information of a terminal where an APP is located to generate a terminal identifier;
acquiring login information of a user according to a preset login mode to generate a fingerprint login verification password;
storing the terminal identifier and the fingerprint login authentication password to a server as authentication data when a user logs in by a fingerprint;
when a user logs in a fingerprint, sequentially verifying a terminal identifier and a fingerprint login verification password in the verification data according to a server to obtain a verification result;
and determining the fingerprint login state of the user based on the verification result.
2. The artificial intelligence-based APP fingerprint login method of claim 1, wherein the obtaining hardware information of a terminal where the APP is located to generate a terminal identifier comprises:
acquiring hardware information of a terminal where the APP is located according to a preset script command;
splicing the hardware information to obtain a spliced character string;
coding the splicing character string according to a custom coding tool, and taking the code as terminal coding data;
and encrypting the terminal coding data according to an encryption algorithm to obtain the terminal identifier.
3. The artificial intelligence-based APP fingerprint login method of claim 1, wherein the obtaining login information of a user according to a preset login manner to generate a fingerprint login authentication password comprises:
sending a login request to a server according to a preset login mode to log in a terminal;
the server sends return value data to the terminal after checking through the login request, wherein the return value data comprises a login certificate and a user ID;
coding the login certificate, the user ID and the current system time according to a user-defined coding tool to obtain login coding data;
and encrypting the login encoding data according to an encryption algorithm to generate the fingerprint login authentication password.
4. The artificial intelligence-based APP fingerprint login method of claim 1, wherein said storing the terminal identifier and the fingerprint login authentication password to a server as authentication data at the time of user fingerprint login comprises:
storing the user ID and the fingerprint login authentication password to a terminal database in a key value pair mode;
and interacting the terminal database and the server according to the HTTPS to acquire verification data, wherein the verification data comprises a user ID, a fingerprint login verification password and a terminal identifier.
5. The APP fingerprint login method based on artificial intelligence of claim 1, wherein the sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain the verification result when the user performs fingerprint login comprises:
fingerprint verification is carried out on the user according to a preset API;
after the verification is passed, matching the user ID with a corresponding fingerprint login verification password in the terminal database to obtain the verification data;
and the terminal sends the terminal identifier and the fingerprint login authentication password in the authentication data to the server for sequentially verifying to obtain the verification result.
6. The artificial intelligence-based APP fingerprint login method of claim 5, wherein the fingerprint verification of the user according to the preset API comprises:
acquiring a user fingerprint according to a fingerprint sensor to construct a fingerprint database, wherein the user ID in the fingerprint database corresponds to the user fingerprint one by one;
matching the user ID with the fingerprint database to obtain a matching result, wherein the matching result comprises matching success and matching failure;
if the matching result is successful, returning the fingerprint characteristic template corresponding to the user for fingerprint verification;
and if the matching result is matching failure, returning the matching result and ending the fingerprint verification process.
7. The artificial intelligence-based APP fingerprint login method of claim 1, wherein the determining a fingerprint login state of a user based on the verification result comprises:
the verification result comprises verification passing and verification failing;
if the verification result is that the verification is passed, the fingerprint login state is login success, the server generates a new login certificate and sends the user ID and the new login certificate to the terminal to generate a new fingerprint login password;
and if the verification result is that the verification is not passed, the fingerprint login state is login failure, the fingerprint login process is ended, and a new fingerprint login process is started.
8. An artificial intelligence based APP fingerprint login device, the device comprising:
the device comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring hardware information of a terminal where an APP is located so as to generate a terminal identifier;
the generating unit is used for acquiring login information of a user according to a preset login mode so as to generate a fingerprint login verification password;
the storage unit is used for storing the terminal identifier and the fingerprint login authentication password to a server to serve as authentication data when a user logs in by a fingerprint;
the verification unit is used for sequentially verifying the terminal identifier and the fingerprint login verification password in the verification data according to the server to obtain a verification result when the user logs in the fingerprint;
and the determining unit is used for determining the fingerprint login state of the user based on the verification result.
9. An electronic device, characterized in that the electronic device comprises:
a memory storing computer readable instructions; and
a processor executing computer readable instructions stored in the memory to implement the artificial intelligence based APP fingerprint login method of any one of claims 1 to 7.
10. A computer readable storage medium having computer readable instructions stored thereon which, when executed by a processor, implement the artificial intelligence based APP fingerprint login method of any one of claims 1 to 7.
CN202210292396.6A 2022-03-23 2022-03-23 APP fingerprint login method based on artificial intelligence and related equipment Pending CN114465818A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210292396.6A CN114465818A (en) 2022-03-23 2022-03-23 APP fingerprint login method based on artificial intelligence and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210292396.6A CN114465818A (en) 2022-03-23 2022-03-23 APP fingerprint login method based on artificial intelligence and related equipment

Publications (1)

Publication Number Publication Date
CN114465818A true CN114465818A (en) 2022-05-10

Family

ID=81418112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210292396.6A Pending CN114465818A (en) 2022-03-23 2022-03-23 APP fingerprint login method based on artificial intelligence and related equipment

Country Status (1)

Country Link
CN (1) CN114465818A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130074165A1 (en) * 2010-03-24 2013-03-21 E-Bo Enterprises Trusted Content Distribution System
CN104899492A (en) * 2015-05-29 2015-09-09 国家电网公司 Device capable of carrying out fingerprint identification login and replacing password of operating system in fixed time and use method
CN106357672A (en) * 2016-10-18 2017-01-25 深圳市金立通信设备有限公司 Login method and terminal
CN106453245A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Method and apparatus for verifying identity
CN106648125A (en) * 2016-11-30 2017-05-10 上海斐讯数据通信技术有限公司 Fingerprint keyboard, verification system and method based on fingerprint keyboard
CN113630253A (en) * 2021-08-11 2021-11-09 中国工商银行股份有限公司 Login method, device, computer system and readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130074165A1 (en) * 2010-03-24 2013-03-21 E-Bo Enterprises Trusted Content Distribution System
CN104899492A (en) * 2015-05-29 2015-09-09 国家电网公司 Device capable of carrying out fingerprint identification login and replacing password of operating system in fixed time and use method
CN106453245A (en) * 2016-08-30 2017-02-22 北京小米移动软件有限公司 Method and apparatus for verifying identity
CN106357672A (en) * 2016-10-18 2017-01-25 深圳市金立通信设备有限公司 Login method and terminal
CN106648125A (en) * 2016-11-30 2017-05-10 上海斐讯数据通信技术有限公司 Fingerprint keyboard, verification system and method based on fingerprint keyboard
CN113630253A (en) * 2021-08-11 2021-11-09 中国工商银行股份有限公司 Login method, device, computer system and readable storage medium

Similar Documents

Publication Publication Date Title
CN108900464B (en) Electronic device, block chain-based data processing method, and computer storage medium
US12074990B2 (en) Database multi-authentication method and system, terminal, and storage medium
CN109088902B (en) Register method and device, authentication method and device
JP2018501567A (en) Device verification method and equipment
CN112464212B (en) Data authority control reconstruction method based on mature complex service system
WO2017143757A1 (en) Trustworthiness measuring method and device for cloud computing platform
CN106936588B (en) Hosting method, device and system of hardware control lock
CN113360868A (en) Application program login method and device, computer equipment and storage medium
CN112165382A (en) Software authorization method and device, authorization server and terminal equipment
WO2024011863A1 (en) Communication method and apparatus, sim card, electronic device, and terminal device
CN112862484A (en) Secure payment method and device based on multi-terminal interaction
WO2022073336A1 (en) Secure payment method and apparatus, electronic device, and storage medium
CN113051622B (en) Index construction method, device, equipment and storage medium
CN113378224B (en) Medical image storage method, device, equipment and storage medium
CN112560062B (en) Anti-counterfeiting method and device for prescription signature, electronic equipment and storage medium
CN119005980A (en) Block chain account generation method and system
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN116305092B (en) Method and system for realizing trusted virtualization system
CN109981593B (en) Data interaction method and server
CN117593021A (en) Anti-counterfeiting method, system, medium and equipment for filter element
CN114465818A (en) APP fingerprint login method based on artificial intelligence and related equipment
CN114185702B (en) Cross-platform calling method, device and equipment for shared application and storage medium
CN114139131A (en) Operating system login method and device and electronic equipment
CN115766192A (en) UKEY-based offline security authentication method, device, equipment and medium
CN113595731A (en) Protection method and device for shared link and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220510

WD01 Invention patent application deemed withdrawn after publication