[go: up one dir, main page]

CN110661833B - Information processing method, control medium and system - Google Patents

Information processing method, control medium and system Download PDF

Info

Publication number
CN110661833B
CN110661833B CN201810694984.6A CN201810694984A CN110661833B CN 110661833 B CN110661833 B CN 110661833B CN 201810694984 A CN201810694984 A CN 201810694984A CN 110661833 B CN110661833 B CN 110661833B
Authority
CN
China
Prior art keywords
fingerprint
fingerprint feature
information
user
cloud server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810694984.6A
Other languages
Chinese (zh)
Other versions
CN110661833A (en
Inventor
黎国梁
陈彬
张东胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Intelligent Technology Beijing Co ltd
Original Assignee
Yunding Intelligent Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Intelligent Technology Beijing Co ltd filed Critical Yunding Intelligent Technology Beijing Co ltd
Priority to CN201810694984.6A priority Critical patent/CN110661833B/en
Priority to PCT/CN2019/093933 priority patent/WO2020001652A1/en
Publication of CN110661833A publication Critical patent/CN110661833A/en
Priority to US17/137,281 priority patent/US20210119803A1/en
Application granted granted Critical
Publication of CN110661833B publication Critical patent/CN110661833B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an information processing method, a control medium and a system, wherein a first terminal device uploads fingerprint characteristic information to the control medium after generating the fingerprint characteristic information, and the control medium sends a fingerprint characteristic file containing the fingerprint characteristic information to a cloud server for storage, so that after a memory for storing the fingerprint characteristic information on the first terminal device is damaged and a new memory is replaced, the fingerprint characteristic information can be downloaded from the cloud terminal server through the control medium and sent to the first terminal device, and therefore, the user identity authentication can be realized without recording a fingerprint again by a user of the first terminal device to form new fingerprint characteristic information, and the convenience of the user is improved.

Description

Information processing method, control medium and system
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to an information processing method, a control medium, and a system.
Background
At present, more and more terminal devices use fingerprint identification technology to verify the identity of a user, and the implementation process is as follows: the terminal equipment generates and stores fingerprint characteristic information according to fingerprints input by the user for many times, when the terminal equipment needs to authenticate the identity of the user, the terminal equipment collects the fingerprint of the user again, and compares the characteristic information of the fingerprint collected again with the fingerprint characteristic information stored in advance so as to authenticate the identity of the user.
However, when the memory for storing the fingerprint feature information on the terminal device is damaged and a new memory is replaced, the original stored fingerprint feature information is lost, and the user needs to re-enter the fingerprint to regenerate the fingerprint feature information, which brings inconvenience to the user.
Disclosure of Invention
In view of the above, the present invention has been made to provide an information processing method, a control medium, and a system that overcome or at least partially solve the above problems.
An information processing method applied to a control medium, comprising:
receiving a first fingerprint feature file sent by first terminal equipment; the first fingerprint feature file at least comprises fingerprint feature information of a user;
sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file;
sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user;
receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user;
sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device or the second terminal device.
Preferably, the receiving the first fingerprint feature file sent by the first terminal device includes:
and receiving a first fingerprint feature file in a first ciphertext form sent by the first terminal device.
In the above method, preferably, the first fingerprint feature file further includes an identification of the user; the sending of the second fingerprint feature file to the cloud server includes:
sending the identification mark of the first terminal device and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file;
or,
the first fingerprint feature file does not comprise the identification of the user; the sending of the second fingerprint feature file to the cloud server includes:
and sending the identification mark of the first terminal device, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
In the above method, preferably, the fingerprint feature information download request further carries an identification identifier of the target terminal device;
the receiving of the fingerprint feature information corresponding to the identification identifier of the user, which is sent by the cloud server, includes:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
Preferably, the receiving the first fingerprint feature file sent by the first terminal device includes:
receiving a plurality of data packets sent by the first terminal equipment; the data packets are obtained by splitting the first fingerprint feature file.
In the above method, preferably, the first fingerprint feature file further includes: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information before the second fingerprint characteristic file is stored, and the second fingerprint characteristic file is stored when the verification is passed.
Preferably, the method further includes, after sending the fingerprint feature information download request to the cloud server:
receiving second check information of the fingerprint feature information corresponding to the identification mark of the user, which is sent by the cloud server;
and sending second verification information of the fingerprint characteristic information to the target terminal equipment so that the target terminal can verify the received fingerprint characteristic information by using the second verification information after receiving the fingerprint characteristic information.
A control medium, comprising:
the first receiving module is used for receiving a first fingerprint feature file sent by first terminal equipment; the first fingerprint feature file at least comprises fingerprint feature information of a user;
the first sending module is used for sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file;
the second sending module is used for sending a fingerprint feature information downloading request to the cloud server, wherein the fingerprint feature information downloading request carries the identification mark of the user;
the second receiving module is used for receiving fingerprint characteristic information which is sent by the cloud server and corresponds to the identification mark of the user;
the third sending module is used for sending the fingerprint characteristic information to the target terminal equipment; the target terminal device is the first terminal device or the second terminal device.
Preferably, the control medium further includes a first receiving module, configured to:
and receiving a first fingerprint feature file in a first ciphertext form sent by the first terminal device.
In the control medium, preferably, the first fingerprint feature file further includes an identification of the user; the first sending module is specifically configured to: sending the identification mark of the first terminal device and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file;
or,
the first fingerprint feature file does not comprise the identification of the user; the first sending module is specifically configured to: and sending the identification mark of the first terminal device, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
Preferably, the control medium further includes an identifier of the target terminal device in the fingerprint feature information download request;
the second receiving module is specifically configured to:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
Preferably, the control medium further includes a first receiving module, configured to:
receiving a plurality of data packets sent by the first terminal equipment; the data packets are obtained by splitting the first fingerprint feature file.
Preferably, the control medium further includes, in the first fingerprint feature file: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information after receiving a second fingerprint characteristic file, and the second fingerprint characteristic file is stored when the verification is passed.
Preferably, the control medium is further configured to receive second verification information of the fingerprint feature information corresponding to the identification identifier of the user, which is sent by the cloud server;
the third sending module is further configured to send second verification information of the fingerprint feature information to the target terminal device, so that the target terminal verifies the received fingerprint feature information by using the second verification information after receiving the fingerprint feature information.
An information processing system comprising: a control medium, a first terminal device and at least one second terminal device;
the first terminal equipment is used for collecting fingerprints of a user, generating fingerprint characteristic information and sending a first fingerprint characteristic file at least containing the fingerprint characteristic information to the control medium; the fingerprint identification module is also used for receiving fingerprint characteristic information which is sent by the control medium and corresponds to the identification mark of the user;
the control medium is used for receiving the first fingerprint characteristic file; sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file; sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user; receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user; sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device and/or the second terminal device;
the second terminal device is used for receiving the fingerprint feature information which is sent by the control medium and corresponds to the identification mark of the user.
By means of the technical scheme, according to the information processing method, the control medium and the system, after the first terminal device generates the fingerprint characteristic information, the fingerprint characteristic information is uploaded to the control medium, the control medium sends the fingerprint characteristic file containing the fingerprint characteristic information to the cloud server for storage, and therefore after a storage used for storing the fingerprint characteristic information on the first terminal device is damaged and a new storage is replaced, the fingerprint characteristic information can be downloaded from the cloud terminal server through the control medium and sent to the first terminal device, the user identity authentication can be achieved without the need that a user of the first terminal device enters a fingerprint again to form new fingerprint characteristic information, and convenience of the user is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 shows a flow chart of one implementation of an information processing method provided by the present application;
FIG. 2 is a flow chart of another implementation of the information processing method provided in the present application;
FIG. 3 is a flow chart of another implementation of the information processing method provided in the present application;
fig. 4 shows a schematic structural diagram of an information processing apparatus provided in the present application.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, fig. 1 is a flowchart of an implementation of an information processing method according to an embodiment of the present application, which may include:
step S11: the method comprises the steps that a control medium receives a first fingerprint feature file sent by first terminal equipment; the first fingerprint feature file at least comprises fingerprint feature information of a user.
The first terminal device sends a first fingerprint characteristic file to the control medium, wherein the first fingerprint characteristic file at least comprises fingerprint characteristic information of a user.
The first terminal device can actively upload the fingerprint characteristic information to the control medium after actively collecting the fingerprint of the user and generating the fingerprint characteristic information according to the collected fingerprint. I.e. the first fingerprint profile does not include the identification of the user. Or,
the first terminal device can actively upload the fingerprint feature file containing the fingerprint feature information and the user identification mark to the control medium after actively collecting the fingerprint of the user and generating the fingerprint feature information according to the collected fingerprint. That is, the first fingerprint feature file includes both fingerprint feature information and the identification of the user. Or,
the first terminal device can collect the user fingerprint in response to the fingerprint input instruction after receiving the fingerprint input instruction sent by the control medium, generate fingerprint characteristic information according to the collected fingerprint, and upload the fingerprint characteristic information to the control medium. I.e. the first fingerprint feature information does not include the identification of the user. Or,
the first terminal device can collect the user fingerprint in response to the fingerprint input instruction after receiving the fingerprint input instruction sent by the control medium, generate fingerprint characteristic information according to the collected fingerprint, and upload the fingerprint characteristic file containing the fingerprint characteristic information and the user identification mark to the control medium. That is, the first fingerprint feature file includes both fingerprint feature information and the identification of the user.
The first terminal device can transmit the first fingerprint feature file to the control medium and can store the fingerprint feature information locally, so that the first terminal device can authenticate the identity of the user by using the locally stored fingerprint feature information.
In this embodiment of the application, the first terminal device may only upload the fingerprint feature information to the control medium, and may also upload both the fingerprint feature information and the user identification identifier to the control medium. For example, if the first terminal device cannot acquire the user identification, the first terminal device may only upload the fingerprint feature information to the control medium; if the first terminal equipment can acquire the user identification mark, the first terminal equipment can upload the fingerprint characteristic information and the user identification mark to the control medium together; or, even if the first terminal device can obtain the user identification, the first terminal device may only upload the fingerprint feature information to the control medium.
The control medium refers to software or equipment capable of communicating with the first terminal device, and for example, the control medium may be equipment such as an upper computer, a mobile phone, a gateway, and the like. Alternatively, the control medium may be application software installed in the electronic device. The first terminal device can be an electronic device such as a mobile phone, a door lock, a fingerprint reader or an entrance guard.
The control medium and the first terminal device may perform data transmission through a channel with a lower data transmission rate, such as bluetooth or zigbee, or perform data transmission through a channel with a higher data transmission rate, such as WIFI.
If the control medium and the first terminal device communicate with each other through a channel with a low data transmission rate, the first terminal device may split the first fingerprint feature file uploaded to the control medium into a plurality of data packets with fixed lengths, and upload the plurality of data packets to the control medium one by one.
Step S12: and the control medium sends a second fingerprint feature file to the cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file.
In a case that the first terminal device does not upload the user identifier to the control medium, the user identifier may be obtained by the control medium, for example, the control medium may receive the user identifier input by the user, or the control medium collects the identifier information of the user through the collecting device (for example, reads the id card information, or collects the user image, etc.).
The control medium can automatically send the second fingerprint feature file to the cloud server after receiving the first fingerprint feature file sent by the first terminal device, and can also send the second fingerprint feature file to the cloud server after receiving a sending instruction triggered by a user.
If the first fingerprint feature file comprises the fingerprint feature information and the identification mark of the user, the control medium can directly forward the first fingerprint feature file to the cloud server after receiving the first fingerprint feature file sent by the first terminal device. Or, after receiving the first fingerprint feature file sent by the first terminal device, the control medium performs simple verification on the first fingerprint feature file, for example, determines whether the total data length of the first fingerprint feature file is the same as the total data length reported by the first terminal device, if so, the verification is passed, otherwise, the verification is not passed. And only when the verification is passed, the control medium forwards the first fingerprint feature file to the cloud server, otherwise, the control medium forbids to forward the first fingerprint feature file to the cloud server. That is to say, when the first fingerprint feature file includes both the fingerprint feature information and the identification of the user, the second fingerprint feature file is the first fingerprint feature file.
If the first fingerprint feature file does not contain the identification mark of the user, the control medium can directly send a second fingerprint feature file containing the first fingerprint feature file and the locally obtained identification mark of the user to the cloud server after receiving the first fingerprint feature file sent by the first terminal device. Or, after receiving the first fingerprint feature file sent by the first terminal device, the control medium performs simple verification on the first fingerprint feature file, for example, determines whether the total data length of the first fingerprint feature file is the same as the total data length reported by the first terminal device, if so, the verification is passed, otherwise, the verification is not passed. And only when the verification is passed, the control medium sends the second fingerprint feature file to the cloud server, otherwise, the control medium prohibits sending the second fingerprint feature file to the cloud server.
After receiving the second fingerprint feature file, the cloud server may store the second fingerprint feature file in a plaintext form, or may store the second fingerprint feature file in a ciphertext form.
Step S13: and the control medium sends a fingerprint characteristic information downloading request to the cloud server, wherein the fingerprint characteristic information downloading request carries the identification mark of the user.
The request for downloading the fingerprint feature information sent by the control medium to the cloud server may be generated by triggering the control medium by a user operating the control medium. Or,
the request sent by the control medium to the cloud server to download the fingerprint feature information may be triggered and generated and sent to the control medium by the user operating the first terminal device, or triggered and generated and sent to the control medium by the user operating the second terminal device. That is, the control intermediary forwards the request for downloading the fingerprint feature information sent by the first terminal device or the second terminal device to the cloud server.
Step S14: and the control medium receives the fingerprint characteristic information sent by the cloud server.
And the cloud server responds to the fingerprint characteristic information downloading request and sends the fingerprint characteristic information corresponding to the identification mark of the user to the control medium.
The fingerprint feature information corresponding to the identification mark of the user is the fingerprint feature information contained in the second fingerprint feature file containing the identification mark of the user.
In an optional embodiment, in a case that the fingerprint feature information download request is generated and sent by the control medium, after receiving the fingerprint feature information download request, the cloud server may first determine whether the control medium has an authority to download the fingerprint feature information before issuing the fingerprint feature information to the control medium, and if the control medium has the authority to download the fingerprint feature information, the cloud server issues the fingerprint feature information to the control medium, otherwise, the cloud server prohibits issuing the fingerprint feature information to the control medium.
Furthermore, in addition to determining whether the control medium has the right to download the fingerprint feature information, it may also determine whether the terminal device (i.e., the terminal device corresponding to the identification identifier of the terminal device carried in the request for downloading the fingerprint feature information) has the right to download the fingerprint feature information. The cloud server issues the fingerprint feature information to the control medium only under the condition that the terminal equipment and the control medium both have the authority of downloading the fingerprint feature information, otherwise, the cloud server prohibits issuing the fingerprint feature information to the control medium.
One implementation manner of determining whether the control medium has the right to download the fingerprint feature information may be:
and judging whether the identification mark of the control medium carried in the request for downloading the fingerprint characteristic information is a preset first identification mark or not.
If the judgment result is yes, determining that the control medium has the authority for downloading the fingerprint characteristic information, otherwise, determining that the control medium does not have the authority for downloading the fingerprint characteristic information.
One implementation manner of determining whether the terminal device has the right to download the fingerprint feature information may be:
and judging whether the identification mark of the terminal equipment carried in the request for downloading the fingerprint characteristic information is a preset second identification mark.
If the judgment result is yes, the terminal equipment is determined to have the authority for downloading the fingerprint characteristic information, otherwise, the terminal equipment is determined not to have the authority for downloading the fingerprint characteristic information.
In an optional embodiment, in a case that the fingerprint feature information download request is generated and sent by the terminal device, after receiving the fingerprint feature information download request, the cloud server may first determine whether the terminal device has an authority to download the fingerprint feature information before issuing the fingerprint feature information to the control medium, and if the terminal device has the authority to download the fingerprint feature information, the cloud server issues the fingerprint feature information to the control medium, otherwise, the cloud server prohibits issuing the fingerprint feature information to the control medium.
Furthermore, in addition to determining whether the terminal device has the right to download the fingerprint feature information, it may also determine whether the control medium has the right to download the fingerprint feature information. The cloud server issues the fingerprint feature information to the control medium only under the condition that the terminal equipment and the control medium both have the authority of downloading the fingerprint feature information, otherwise, the cloud server prohibits issuing the fingerprint feature information to the control medium.
Step S15: the control medium sends the fingerprint characteristic information to the target terminal equipment; the target terminal device is a first terminal device or a second terminal device.
The second terminal device can be an electronic device such as a mobile phone, a door lock or an entrance guard. The first terminal equipment and the second terminal equipment have fingerprint collection and fingerprint authentication functions. The first terminal device and the second terminal device are different electronic devices.
Based on the embodiment of the application, when the first terminal device needs to use the fingerprint feature information (for convenience of description, it is recorded as the first fingerprint feature information) to perform user identity authentication, and the first terminal device does not locally store the first fingerprint feature information (for example, a memory in the first terminal device for storing the first fingerprint feature information is replaced, or the first terminal device recovers factory settings, etc.), the first fingerprint feature information may be downloaded from the cloud server by the control medium, and the first fingerprint feature information may be sent to the first terminal device. Or,
when the second terminal device needs to use the first fingerprint feature information to perform identity authentication on the user, the control medium can also download the first fingerprint feature information from the cloud server and send the first fingerprint feature information to the second terminal device.
According to the information processing method, after the first terminal device generates the fingerprint characteristic information, the control medium sends the fingerprint characteristic file containing the fingerprint characteristic information to the cloud server for storage, so that after a storage used for storing the fingerprint characteristic information on the first terminal device is damaged and replaced by a new storage, the control medium can download the fingerprint characteristic information from the cloud terminal server and issue the fingerprint characteristic information to the first terminal device, user identity authentication can be achieved without the need that a user of the first terminal device enters a fingerprint again to form new fingerprint characteristic information, and convenience of the user is improved.
Similarly, when the second terminal device needs to use the first fingerprint feature information to perform identity authentication on the user, the control medium can also download the first fingerprint feature information from the cloud server and send the first fingerprint feature information to the second terminal device, so that the second terminal device does not need to input fingerprints for many times to generate new fingerprint feature information, and the convenience of the user is improved.
In addition, the communication connection between the cloud server and the terminal equipment is established through the control medium, low-speed data transmission can be carried out between the control medium and the terminal equipment, and high-speed data transmission can be carried out between the control medium and the cloud server through a high-speed network; on the other hand, in some application scenarios where the fingerprint feature information is updated frequently (for example, in a hotel, the updating frequency of the fingerprint feature information in the door lock of each room is relatively high), the administrator can perform unified management on the acquisition, storage and distribution of the fingerprint feature information through a control medium (for example, a computer located at the front desk), so that the operation of the administrator is facilitated.
In addition, after receiving the fingerprint feature information downloading request, the cloud server does not directly issue the fingerprint feature information to the control medium, but issues the fingerprint feature information to the control medium after judging that the control medium and/or the terminal device has the downloading authority, otherwise, does not issue the fingerprint feature information to the control medium, and further improves the security of the fingerprint feature information.
In an alternative embodiment, one implementation manner of controlling the medium to receive the first fingerprint feature file sent by the first terminal device may be as follows:
the control medium receives a first fingerprint feature file in a first ciphertext form sent by the first terminal device.
In the embodiment of the application, the first terminal device sends the first fingerprint feature file to the control medium in a ciphertext mode.
If the first terminal equipment uploads the fingerprint feature file to the control medium by dividing into a plurality of data packets, the first terminal equipment encrypts each data packet and uploads the data packet to the control medium. Or the first terminal equipment encrypts the first fingerprint feature file, divides the first fingerprint feature file in the form of the ciphertext into a plurality of data packets and transmits the data packets to the control medium.
The first terminal device may encrypt the first fingerprint feature file by using a private key of the first terminal device to obtain a first fingerprint feature file in a first ciphertext form.
In an optional embodiment, the first fingerprint feature file further includes an identification of the user; one implementation way for the control medium to send the second fingerprint feature file to the cloud server may be:
and the control medium sends the identification identifier of the first terminal device and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file. The technology for controlling the medium to obtain the identification of the first terminal device is mature, and detailed description is omitted in this application.
In another alternative embodiment, the first fingerprint profile does not include an identification of the user; one implementation way for the control medium to send the second fingerprint feature file to the cloud server may be:
and sending the identification mark of the first terminal equipment, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
The cloud server side stores a decryption algorithm corresponding to an encryption algorithm which is encrypted by the first terminal device through the private key of the first terminal device. After receiving the second fingerprint feature file, the cloud server may determine a private key corresponding to the identification identifier of the first terminal device by using the identification identifier of the first terminal device and a pre-stored correspondence between the device identification identifier and the private key, and decrypt the first fingerprint feature file in the second fingerprint feature file or the second fingerprint feature file through the private key to obtain the second fingerprint feature file in a plaintext form or the first fingerprint feature file in a plaintext form.
The cloud server stores the decrypted second fingerprint feature file in the form of a plaintext; alternatively, a fingerprint profile is stored which is composed of the first fingerprint profile in clear text and the identification of the user.
It should be noted that, in this embodiment, the storing of the fingerprint feature file in the plaintext form refers not to storing the feature file in the plaintext form, but to storing the decrypted fingerprint feature file. Specifically, when the fingerprint feature file obtained by decryption is stored, the fingerprint feature file obtained by decryption may be stored in a plaintext form, or the fingerprint feature file obtained by decryption may be stored in a ciphertext form.
When the fingerprint feature file in the plaintext form is stored, if the fingerprint feature file in the plaintext form is stored in the ciphertext form, the fingerprint feature file in the plaintext form can be encrypted into a fingerprint feature file in a second ciphertext form, and the fingerprint feature file in the second ciphertext form is stored, namely the fingerprint feature file is stored in the second ciphertext form, wherein the encryption key used for obtaining the first fingerprint feature file in the first ciphertext form is different from the encryption key used for obtaining the fingerprint feature file in the second ciphertext form. The encryption algorithm used for obtaining the fingerprint feature file in the second ciphertext form and the encryption algorithm used for obtaining the first fingerprint feature file in the first ciphertext form may be the same or different.
In the embodiment of the application, when the first terminal device sends the first fingerprint feature file to the control medium, the first fingerprint feature file is encrypted by using the private key of the first terminal device, so that the safety problem caused by the fact that the control medium is cracked by a third party and then the received first fingerprint feature file is maliciously stored and applied to other terminal devices is avoided.
In an optional embodiment, the fingerprint feature information download request sent by the control medium to the cloud server further carries an identification identifier of the target terminal device. The id of the target terminal device may be manually entered into the control medium by the user or selected by the user from a list of device ids provided by the control medium.
The fingerprint feature information corresponding to the identification identifier of the user and sent to the control medium by the cloud server is fingerprint feature information in a third ciphertext form, the fingerprint feature information in the third ciphertext form is obtained by determining a private key of the target terminal device by the cloud server according to the identification identifier of the target terminal device and a preset corresponding relationship between the device identification identifier and the private key, and encrypting the fingerprint feature information by using the private key.
The encryption algorithm used by the cloud server when encrypting the fingerprint feature file by using the private key of the target terminal device may be the same as or different from the encryption algorithm used by the first terminal device when encrypting the first fingerprint feature file by using the private key of the first terminal device. That is to say, the fingerprint feature information in the third ciphertext form may be the fingerprint feature information in the first ciphertext form, or may not be the fingerprint feature information in the first ciphertext form.
On the target terminal device side, a decryption algorithm corresponding to an encryption algorithm used by the cloud server when encrypting the fingerprint feature file with the private key of the target terminal device is stored.
And after receiving the fingerprint characteristic information in the third ciphertext form sent by the control medium, the target terminal equipment decrypts the fingerprint characteristic information in the third ciphertext form by using the private key of the target terminal equipment to obtain the fingerprint characteristic information in the plaintext form.
In an optional embodiment, the first fingerprint feature file may further include: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information before the second fingerprint characteristic file is stored, and the second fingerprint characteristic file is stored when the verification is passed.
If the second fingerprint feature file received by the cloud server is in a plaintext form, directly checking the fingerprint feature information in the second fingerprint feature file according to the first checking information; if the second fingerprint feature file received by the cloud server is the second fingerprint feature file in the form of the ciphertext or the first fingerprint feature file in the second fingerprint feature file is the first fingerprint feature file in the form of the ciphertext, the cloud server decrypts the second fingerprint feature file or the first fingerprint feature file first, and then verifies the fingerprint feature information in the second fingerprint feature file in the form of the plaintext or the first fingerprint feature file in the form of the plaintext obtained by decryption by using the first verification information. That is, the first verification information is calculated from the fingerprint feature information in the form of plaintext.
The cloud server stores the second fingerprint feature file in the plaintext form, before the second fingerprint feature file in the plaintext form is stored, the fingerprint feature information in the second fingerprint feature file in the plaintext form is firstly verified, the second fingerprint feature file in the plaintext form is stored only when the verification is passed, otherwise, the second fingerprint feature file is not stored, and the integrity and the effectiveness of the stored fingerprint feature file are ensured.
When the second fingerprint feature file in the plaintext form is stored, the second fingerprint feature file can be directly stored in the plaintext form or stored in the ciphertext form.
When the encrypted file is stored in the form of the ciphertext, the second fingerprint feature file can be encrypted by using the private key of the cloud server.
In an optional embodiment, after sending the fingerprint feature information download request to the cloud server, the controlling media may further include:
and the control medium receives second check information of the fingerprint characteristic information corresponding to the identification mark of the user, which is sent by the cloud server.
After receiving the fingerprint feature information downloading request, the cloud server calculates verification information (marked as second verification information) of the fingerprint feature information corresponding to the identification identifier of the user, and sends the fingerprint feature information corresponding to the identification identifier of the user to the control medium and also sends the second verification information of the fingerprint feature information to the control medium.
And the control medium sends the fingerprint characteristic information to the target terminal equipment and also sends second check information of the fingerprint characteristic information to the target terminal equipment, so that the target terminal checks the received fingerprint characteristic information by utilizing the second check information after receiving the fingerprint characteristic information.
Generally, the second check information is fingerprint information obtained by calculating fingerprint feature information in a plaintext form, after the target terminal device receives the fingerprint feature information, if the fingerprint feature information is a plaintext, the second check information can be directly used for checking the fingerprint feature information, if the fingerprint feature information is a ciphertext, the fingerprint feature information is decrypted first, and then the fingerprint feature information obtained by decryption is checked by using the second check information.
Another implementation flowchart of the information processing method provided by the present application is shown in fig. 2, and may include:
step S201: the control medium sends a fingerprint entry command to the first terminal device.
The fingerprint input instruction can be triggered and generated by the operation of the control medium on the control medium by a user of the control medium.
Step S202: the first terminal equipment responds to the fingerprint input command and starts a fingerprint input flow to collect fingerprints. And the user A presses the fingerprint sensor of the first terminal equipment by using the same finger for multiple times according to the operation prompt, and the fingerprint processing chip of the first terminal equipment extracts the characteristics of the fingerprint acquired by the fingerprint sensor for multiple times to obtain the fingerprint characteristic information of the user A.
Step S203: the first terminal device reports a recording completion command to the control medium.
Step S204: and the control medium issues a fingerprint feature file uploading command to the first terminal equipment.
The fingerprint file upload command may be triggered by a control medium user operating the control medium. Or the control medium can be automatically generated after receiving the recording completion command.
Step S205: the first terminal device responds to the fingerprint feature file uploading command, generates a fingerprint feature file and encrypts the fingerprint feature file, wherein the fingerprint feature file comprises fingerprint feature information of the user A and an identification mark (for convenience of description, the identification mark is recorded as a first user identification mark) of the user A. The first user identification is manually input into the first terminal device by a user or automatically acquired by the first terminal device.
The first terminal device encrypts the fingerprint feature file by using a private key of the first terminal device.
Optionally, before encrypting the fingerprint feature file, a check value of the fingerprint feature file, such as a CRC check value, may also be calculated. And after the check value is calculated, encrypting the fingerprint feature file.
Step S206: the first terminal equipment divides the fingerprint feature file in the form of the ciphertext into a plurality of data packets and sends the data packets to the control medium.
Optionally, if the check value is calculated, the first terminal device further sends the check value to the control medium. The check value may be sent to the control medium in a certain data packet or in a separate data packet.
Step S207: and the first terminal equipment sends a fingerprint feature file uploading ending command to the control medium after all the data packets are sent to the control medium.
Step S208: and after receiving the fingerprint feature file uploading finishing command, the control medium uploads the fingerprint feature file in the form of the ciphertext to the cloud server.
Step S209: and after receiving the fingerprint feature file in the ciphertext form, the cloud server decrypts the fingerprint feature file in the ciphertext form by using the private key of the first terminal device and stores the decrypted fingerprint feature file.
Optionally, if the control medium further uploads the check value, the cloud server decrypts the fingerprint characteristic file to obtain the fingerprint characteristic file, then verifies the fingerprint characteristic file obtained by decryption by using the check value, and stores the fingerprint characteristic file when the verification is passed.
When the cloud server stores the decrypted fingerprint feature file, the fingerprint feature information can be stored in a plaintext form or a ciphertext form. When the fingerprint characteristic information is stored in the form of the ciphertext, the private key of the cloud server can be used for encrypting the fingerprint characteristic information in the fingerprint characteristic file in the form of the plaintext, and the encrypted fingerprint characteristic information is stored in a manner of being associated with the identification mark of the user.
The above steps are a specific implementation process of the scheme for inputting fingerprints and uploading fingerprint feature files, and the process of issuing fingerprint feature information is described below.
Step S210: the control medium sends a fingerprint feature information downloading instruction to the cloud server, wherein the fingerprint feature information downloading instruction carries a first user identification (namely, an identification of the user A) and an identification of the first terminal device.
Step S211: after receiving the fingerprint feature information downloading instruction, the cloud server acquires corresponding fingerprint feature information (namely, the fingerprint feature information of the user A) according to the first user identification identifier. If the acquired fingerprint characteristic information is a ciphertext, the fingerprint characteristic information in the form of the ciphertext is decrypted by using the private key of the cloud server to obtain the fingerprint characteristic information in the form of a plaintext.
Step S212: the cloud server acquires the corresponding private key of the first terminal device by using the identification mark of the first terminal device.
Step S213: the cloud server encrypts the fingerprint feature information in the form of plaintext by using the private key of the first terminal device.
Optionally, before encrypting the fingerprint feature information in the plaintext form, the check value of the fingerprint feature information in the plaintext form may be calculated first, and then the fingerprint feature information in the plaintext form may be encrypted.
Step S214: and the cloud server transmits the fingerprint characteristic information in the form of the ciphertext to the control medium.
Optionally, if the cloud server further calculates the check value, the check value is issued to the control medium together.
Step S3215: and the control medium transmits the fingerprint characteristic information in the form of the ciphertext to the first terminal equipment in a subpackaging manner.
Step S216: and the first terminal equipment decrypts and stores the fingerprint characteristic information in the form of the ciphertext by using the private key of the first terminal equipment.
Optionally, if the cloud server further issues a check value, the first terminal device further checks the fingerprint feature information obtained by decryption by using the check value.
Steps S210 to S216 describe a process of controlling the intermediary to download fingerprint feature information of the user a required by the first terminal device from the cloud server. The following describes a process of controlling the intermediary to download fingerprint feature information of the user a required by the second terminal device from the cloud server. Referring to fig. 3, fig. 3 is a flowchart of another implementation of an information processing method according to an embodiment of the present application, where the method includes:
step S301: the control medium sends a fingerprint entry command to the first terminal device.
Step S302: the first terminal equipment responds to the fingerprint input command and starts a fingerprint input flow to collect fingerprints.
Step S303: the first terminal device reports a recording completion command to the control medium.
Step S304: and the control medium issues a fingerprint feature file uploading command to the first terminal equipment.
Step S305: the first terminal device responds to the fingerprint feature file uploading command, generates a fingerprint feature file and encrypts the fingerprint feature file, wherein the fingerprint feature file comprises fingerprint feature information of the user A and an identification mark (for convenience of description, the identification mark is recorded as a first user identification mark) of the user A. The first user identification is manually input into the first terminal device by a user or automatically acquired by the first terminal device.
Step S306: the first terminal equipment divides the fingerprint feature file in the form of the ciphertext into a plurality of data packets and sends the data packets to the control medium.
Step S307: and the first terminal equipment sends a fingerprint feature file uploading ending command to the control medium after all the data packets are sent to the control medium.
Step S308: and after receiving the fingerprint feature file uploading finishing command, the control medium uploads the fingerprint feature file in the form of the ciphertext to the cloud server.
Step S309: and after receiving the fingerprint feature file in the ciphertext form, the cloud server decrypts the fingerprint feature file in the ciphertext form and stores the decrypted fingerprint feature file.
The implementation process of steps S301 to S309 is the same as that of steps S201 to S209, and is not described in detail here.
Step S310: the control medium sends a fingerprint feature information downloading instruction to the cloud server, wherein the fingerprint feature information downloading instruction carries a first user identification (namely, an identification of the user A) and an identification of the second terminal device.
Step S311: after receiving the fingerprint feature information downloading instruction, the cloud server acquires corresponding fingerprint feature information (namely, the fingerprint feature information of the user A) according to the first user identification identifier.
Step S312: and the cloud server acquires the private key of the second terminal equipment by using the identification mark of the second terminal equipment.
Step S313: and the cloud server encrypts the fingerprint characteristic information in the form of plaintext by using the private key of the second terminal device.
Optionally, before encrypting the fingerprint feature information in the plaintext form, the check value of the fingerprint feature information in the plaintext form may be calculated first, and then the fingerprint feature information in the plaintext form may be encrypted.
Step S314: and the cloud server transmits the fingerprint characteristic information in the form of the ciphertext to the control medium.
Optionally, if the cloud server further calculates the check value, the check value is issued to the control medium together.
Step S315: and the control medium transmits the fingerprint characteristic information in the form of the ciphertext to the second terminal equipment in a subpackaging manner.
Step S316: and the second terminal equipment decrypts and stores the fingerprint characteristic information in the form of the ciphertext by using the private key of the second terminal equipment.
Optionally, if the cloud server further issues a check value, the second terminal device further checks the fingerprint feature information obtained by decryption by using the check value.
The following illustrates an application scenario of the present application.
Application scenario one
The unlocking mode of the mobile phone of the user a is fingerprint unlocking, after the user a inputs fingerprints for a plurality of times (for example, 3 times) according to the prompt of the mobile phone, the mobile phone generates fingerprint characteristic information according to the acquired fingerprints for 3 times, the fingerprint characteristic information is stored locally, meanwhile, a fingerprint characteristic file containing the fingerprint characteristic information and a mobile phone identification (such as a mobile phone number, an identification code of a UIM card and the like) is uploaded to a cloud server through a control medium (such as a router, a gateway server or certain software in the mobile phone and the like), and the cloud server stores the received fingerprint characteristic information in a manner of being associated with the identification of the mobile phone of the user a. If the memory card of the mobile phone of the user a has a problem and cannot be read, and a new memory card needs to be replaced, the fingerprint feature information stored before is lost after the new memory card is replaced. At this time, the user a does not need to re-enter the fingerprint so that the mobile phone can generate the fingerprint feature information, but directly downloads the fingerprint feature information uploaded before from the cloud server through the control medium.
Application scenario two
When a user B wants to check in a hotel, the user B inputs a fingerprint on fingerprint input equipment of a foreground when a foreground checks in procedures, the fingerprint input equipment generates fingerprint characteristic information from the input fingerprint, the fingerprint characteristic information is encrypted by a private key of the fingerprint input equipment and then is sent to a computer of the foreground, and the computer transmits the fingerprint characteristic information in a cryptograph form to a cloud server in a related mode together with an identification mark (such as an identity card number) of the user B.
After receiving the fingerprint characteristic information in the form of the ciphertext and the identity card number of the user B, the cloud server decrypts the fingerprint characteristic information in the form of the ciphertext by using a private key of the fingerprint input equipment to obtain the fingerprint characteristic information in the form of the plaintext, and encrypts and stores the fingerprint characteristic file comprising the fingerprint characteristic information in the form of the plaintext and the identity card number of the user B locally by using the private key of the cloud server. Before saving, the feature code of the identification mark of the user B can be calculated through a preset algorithm, and the feature code is saved in a manner of being associated with the fingerprint feature file in the form of the ciphertext.
The foreground staff operates the computer, so that the computer sends a request for downloading the fingerprint characteristic information of the user B to the cloud server, wherein the request carries the identity card number of the user B and the identification mark of the door lock of the first room distributed to the user B.
After receiving the request for downloading the fingerprint characteristic information of the user B, the cloud server searches the fingerprint characteristic file in the corresponding ciphertext form through the characteristic code of the identity card number of the user B, decrypts the fingerprint characteristic file in the searched ciphertext form, then searches the private key of the door lock of the first room by using the identification mark of the door lock of the first room, encrypts the fingerprint characteristic information in the fingerprint characteristic file obtained by decryption by using the private key of the door lock of the first room, and sends the fingerprint characteristic information in the ciphertext form to the computer.
And after receiving the fingerprint characteristic information in the ciphertext form, the computer sends the fingerprint characteristic information in the ciphertext form to the door lock of the first room.
After the door lock of the first room receives the fingerprint characteristic information in the form of the ciphertext, the fingerprint characteristic information in the form of the ciphertext is decrypted and stored by using the private key of the door lock.
After the user B inputs the fingerprint at the door lock of the first room, the door lock of the first room extracts the characteristics of the input fingerprint, the user B is authenticated according to the extracted characteristics and the locally stored fingerprint characteristic information, and when the authentication is passed, the unlocking is carried out, otherwise, the unlocking is forbidden.
In addition, after the user B enters the first room, if the user B is not satisfied with the first room, when the user B wants to change the room, the front desk worker only needs to download the fingerprint feature information of the user B again from the cloud server through the computer, and send the downloaded fingerprint feature information to the door lock of the second room newly allocated to the user B, and the user B does not need to re-enter the fingerprint in the front desk to form new fingerprint feature information. In particular, the method comprises the following steps of,
and the foreground staff sends a request for downloading the fingerprint characteristic information of the user B to the cloud server through computer operation, wherein the request carries the identity card number of the user B and the identification mark of the door lock of the second room distributed to the user B.
After receiving the request for downloading the fingerprint characteristic information of the user B, the cloud server searches the fingerprint characteristic file in the corresponding ciphertext form through the characteristic code of the identity card number of the user B, decrypts the fingerprint characteristic file in the searched ciphertext form, then searches the private key of the door lock of the second room by using the identification mark of the door lock of the second room, encrypts the fingerprint characteristic information in the fingerprint characteristic file obtained by decryption by using the private key of the door lock of the second room, and sends the fingerprint characteristic information in the ciphertext form to the computer.
And after receiving the fingerprint characteristic information in the ciphertext form, the computer sends the fingerprint characteristic information in the ciphertext form to the door lock of the second room.
And after receiving the fingerprint characteristic information in the form of the ciphertext, the door lock of the second room decrypts and stores the fingerprint characteristic information in the form of the ciphertext by using the private key of the door lock.
After the user B inputs the fingerprint at the door lock of the second room, the door lock of the second room extracts the characteristics of the input fingerprint, the user B is authenticated according to the extracted characteristics and the locally stored fingerprint characteristic information, and when the authentication is passed, the unlocking is carried out, otherwise, the unlocking is forbidden.
After the fingerprint characteristic information of the user B is sent to the user B, the computer can also send an instruction for deleting the fingerprint characteristic information of the user B to the door lock of the first room according to the operation of a front desk worker.
And after the door lock of the first room receives the instruction of deleting the fingerprint characteristic information of the user B, the fingerprint characteristic information of the user B is deleted.
Corresponding to the method embodiment, the application also provides a control medium. A schematic structural diagram of the control medium provided in the present application is shown in fig. 4, and may include:
a first receiving module 41, a first transmitting module 42, a second transmitting module 43, a second receiving module 44 and a third transmitting module 45; wherein,
the first receiving module 41 is configured to receive a first fingerprint feature file sent by a first terminal device; the first fingerprint feature file at least comprises fingerprint feature information of a user;
the first sending module 42 is configured to send a second fingerprint feature file to a cloud server, where the second fingerprint feature file includes an identification identifier of the user and fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file;
the second sending module 43 is configured to send a fingerprint feature information downloading request to the cloud server, where the fingerprint feature information downloading request carries an identification identifier of the user;
the second receiving module 44 is configured to receive fingerprint feature information corresponding to the identification identifier of the user, which is sent by the cloud server;
the third sending module 45 is configured to send the fingerprint feature information to a target terminal device; the target terminal device is the first terminal device or the second terminal device.
The application provides a control medium, first terminal equipment is after generating fingerprint characteristic information, send the fingerprint characteristic file that contains this fingerprint characteristic information to cloud server by the control medium and save, thereby after the memory that is used for storing fingerprint characteristic information on first terminal equipment takes place to damage and changes new memory, can download fingerprint characteristic information and issue this fingerprint characteristic information to first terminal equipment from cloud terminal server through the control medium, thereby need not first terminal equipment user to enter the fingerprint once more and form new fingerprint characteristic information and just can realize user authentication, improve user's convenience.
In an optional embodiment, the first receiving module 41 may specifically be configured to:
and receiving a first fingerprint feature file in a first ciphertext form sent by the first terminal device.
In an optional embodiment, the first fingerprint feature file further includes an identification of the user; the first sending module 42 is specifically configured to: and sending the identification identifier of the first terminal device and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
In an alternative embodiment, the first fingerprint profile does not include an identification of the user; the first sending module 42 is specifically configured to: and sending the identification mark of the first terminal device, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
In an optional embodiment, the fingerprint feature information downloading request further carries an identification identifier of the target terminal device;
the second receiving module 44 is specifically configured to:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
In an optional embodiment, the first receiving module 41 may specifically be configured to:
receiving a plurality of data packets sent by the first terminal equipment; the data packets are obtained by splitting the first fingerprint feature file.
In an optional embodiment, the first fingerprint feature file further includes: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information after receiving a second fingerprint characteristic file, and the second fingerprint characteristic file is stored when the verification is passed.
In an optional embodiment, the second receiving module 44 is further configured to receive second verification information of the fingerprint feature information corresponding to the identification identifier of the user, sent by the cloud server;
the third sending module 45 is further configured to send second verification information of the fingerprint feature information to the target terminal device, so that the target terminal verifies the received fingerprint feature information by using the second verification information after receiving the fingerprint feature information.
The present application also provides an information processing system, including: a control medium, a first terminal device and at least one second terminal device;
the first terminal equipment is used for collecting fingerprints of a user, generating fingerprint characteristic information and sending a first fingerprint characteristic file at least containing the fingerprint characteristic information to the control medium; the fingerprint identification module is also used for receiving fingerprint characteristic information which is sent by the control medium and corresponds to the identification mark of the user;
the control medium is used for receiving the first fingerprint characteristic file; sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file; sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user; receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user; sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device and/or the second terminal device;
the second terminal device is used for receiving the fingerprint feature information which is sent by the control medium and corresponds to the identification mark of the user.
The control medium may include a processor and a memory, and the first receiving module 41, the first sending module 42, the second sending module 43, the second receiving module 44, the third sending module 45, and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to implement corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and convenience of a user is improved by adjusting kernel parameters.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present invention provides a storage medium having a program stored thereon, the program implementing the information processing method when executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the information processing method is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the program and realizes the following steps:
an information processing method applied to a control medium, comprising:
receiving a first fingerprint feature file sent by first terminal equipment; the first fingerprint feature file at least comprises fingerprint feature information of a user;
sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file;
sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user;
receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user;
sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device or the second terminal device.
Preferably, the receiving the first fingerprint feature file sent by the first terminal device includes:
and receiving a first fingerprint feature file in a first ciphertext form sent by the first terminal device.
In the above method, preferably, the first fingerprint feature file further includes an identification of the user; the sending of the second fingerprint feature file to the cloud server includes:
sending the identification mark of the first terminal device and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file;
or,
the first fingerprint feature file does not comprise the identification of the user; the sending of the second fingerprint feature file to the cloud server includes:
and sending the identification mark of the first terminal device, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
In the above method, preferably, the fingerprint feature information download request further carries an identification identifier of the target terminal device;
the receiving of the fingerprint feature information corresponding to the identification identifier of the user, which is sent by the cloud server, includes:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
Preferably, the receiving the first fingerprint feature file sent by the first terminal device includes:
receiving a plurality of data packets sent by the first terminal equipment; the data packets are obtained by splitting the first fingerprint feature file.
In the above method, preferably, the first fingerprint feature file further includes: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information before the second fingerprint characteristic file is stored, and the second fingerprint characteristic file is stored when the verification is passed.
Preferably, the method further includes, after sending the fingerprint feature information download request to the cloud server:
receiving second check information of the fingerprint feature information corresponding to the identification mark of the user, which is sent by the cloud server;
and sending second verification information of the fingerprint characteristic information to the target terminal equipment so that the target terminal can verify the received fingerprint characteristic information by using the second verification information after receiving the fingerprint characteristic information.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
an information processing method applied to a control medium, comprising:
receiving a first fingerprint feature file sent by first terminal equipment; the first fingerprint feature file at least comprises fingerprint feature information of a user;
sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, so that the cloud server stores the second fingerprint feature file;
sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user;
receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user;
sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device or the second terminal device.
Preferably, the receiving the first fingerprint feature file sent by the first terminal device includes:
and receiving a first fingerprint feature file in a first ciphertext form sent by the first terminal device.
In the above method, preferably, the first fingerprint feature file further includes an identification of the user; the sending of the second fingerprint feature file to the cloud server includes:
sending the identification mark of the first terminal device and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file;
or,
the first fingerprint feature file does not comprise the identification of the user; the sending of the second fingerprint feature file to the cloud server includes:
and sending the identification mark of the first terminal device, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
In the above method, preferably, the fingerprint feature information download request further carries an identification identifier of the target terminal device;
the receiving of the fingerprint feature information corresponding to the identification identifier of the user, which is sent by the cloud server, includes:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
Preferably, the receiving the first fingerprint feature file sent by the first terminal device includes:
receiving a plurality of data packets sent by the first terminal equipment; the data packets are obtained by splitting the first fingerprint feature file.
In the above method, preferably, the first fingerprint feature file further includes: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information before the second fingerprint characteristic file is stored, and the second fingerprint characteristic file is stored when the verification is passed.
Preferably, the method further includes, after sending the fingerprint feature information download request to the cloud server:
receiving second check information of the fingerprint feature information corresponding to the identification mark of the user, which is sent by the cloud server;
and sending second verification information of the fingerprint characteristic information to the target terminal equipment so that the target terminal can verify the received fingerprint characteristic information by using the second verification information after receiving the fingerprint characteristic information.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (12)

1. An information processing method applied to a control medium, comprising:
receiving a first fingerprint feature file in a first ciphertext form sent by a first terminal device; the first fingerprint feature file at least comprises fingerprint feature information of a user; the first fingerprint feature file in the first ciphertext form is obtained by encrypting the first fingerprint feature file through a private key of the first terminal device;
sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, which are acquired by the control medium, so that the cloud server encrypts the second fingerprint feature file by using a private key of the cloud server to obtain and store a second fingerprint feature file in a second ciphertext form;
sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user;
receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user;
sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device or the second terminal device.
2. The method of claim 1, wherein sending the second fingerprint profile to the cloud server comprises:
and sending the identification mark of the first terminal device, the identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
3. The method according to claim 1, wherein the fingerprint feature information download request further carries an identification of the target terminal device;
the receiving of the fingerprint feature information corresponding to the identification identifier of the user, which is sent by the cloud server, includes:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
4. The method of claim 1, wherein the receiving the first fingerprint profile sent by the first terminal device comprises:
receiving a plurality of data packets sent by the first terminal equipment; the data packets are obtained by splitting the first fingerprint feature file.
5. The method of claim 1, wherein the first fingerprint profile further comprises: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information before encrypting the second fingerprint characteristic file by using a private key of the cloud server to obtain a fingerprint characteristic file in a second ciphertext form and storing the fingerprint characteristic file, and when the verification is passed, the private key of the cloud server is used for encrypting the second fingerprint characteristic file to obtain the fingerprint characteristic file in the second ciphertext form and storing the fingerprint characteristic file.
6. The method of claim 1, after sending the fingerprint feature information download request to the cloud server, further comprising:
receiving second check information of the fingerprint feature information corresponding to the identification mark of the user, which is sent by the cloud server;
and sending second verification information of the fingerprint characteristic information to the target terminal equipment so that the target terminal can verify the received fingerprint characteristic information by using the second verification information after receiving the fingerprint characteristic information.
7. A control medium, comprising:
the first receiving module is used for receiving a first fingerprint feature file in a first ciphertext form sent by first terminal equipment; the first fingerprint feature file at least comprises fingerprint feature information of a user; the first fingerprint feature file in the first ciphertext form is obtained by encrypting the first fingerprint feature file through a private key of the first terminal device;
the first sending module is used for sending a second fingerprint feature file to the cloud server, wherein the second fingerprint feature file comprises the identification of the user and the fingerprint feature information of the user, which are acquired by the control medium, so that the cloud server encrypts the second fingerprint feature file by using a private key of the cloud server to obtain and store a second ciphertext fingerprint feature file;
the second sending module is used for sending a fingerprint feature information downloading request to the cloud server, wherein the fingerprint feature information downloading request carries the identification mark of the user;
the second receiving module is used for receiving fingerprint characteristic information which is sent by the cloud server and corresponds to the identification mark of the user;
the third sending module is used for sending the fingerprint characteristic information to the target terminal equipment; the target terminal device is the first terminal device or the second terminal device.
8. The control medium of claim 7, wherein the first sending module is specifically configured to: and sending the identification mark of the first terminal device, the acquired identification mark of the user and the first fingerprint feature file in the first ciphertext form to the cloud server as a second fingerprint feature file.
9. The control medium of claim 7, wherein the fingerprint feature information download request further carries an identifier of the target terminal device;
the second receiving module is specifically configured to:
receiving fingerprint feature information in a third ciphertext form sent by the cloud server; and the fingerprint characteristic information in the third ciphertext form is obtained by encrypting the fingerprint characteristic information corresponding to the identification identifier of the user by the cloud server through a private key corresponding to the identification identifier of the target terminal device.
10. The control medium of claim 7, wherein the first fingerprint profile further comprises: the first verification information of the fingerprint characteristic information of the user is used for facilitating the cloud server to verify the fingerprint characteristic information of the user according to the first verification information after receiving a second fingerprint characteristic file, and the second fingerprint characteristic file is stored when the verification is passed.
11. The control medium of claim 7, wherein the second receiving module is further configured to receive second verification information of the fingerprint feature information corresponding to the identification of the user, sent by the cloud server;
the third sending module is further configured to send second verification information of the fingerprint feature information to the target terminal device, so that the target terminal verifies the received fingerprint feature information by using the second verification information after receiving the fingerprint feature information.
12. An information processing system, comprising: a control medium, a first terminal device and at least one second terminal device;
the first terminal equipment is used for collecting fingerprints of a user, generating fingerprint characteristic information and sending a first fingerprint characteristic file at least containing the fingerprint characteristic information in a first ciphertext mode to the control medium; the fingerprint identification module is also used for receiving fingerprint characteristic information which is sent by the control medium and corresponds to the identification mark of the user;
the control medium is used for receiving the first fingerprint characteristic file; sending a second fingerprint feature file to a cloud server, wherein the second fingerprint feature file comprises the identification mark of the user and the fingerprint feature information of the user, which are acquired by the control medium, so that the cloud server stores the second fingerprint feature file; sending a fingerprint feature information downloading request to a cloud server, wherein the fingerprint feature information downloading request carries an identification mark of the user; receiving fingerprint feature information which is sent by the cloud server and corresponds to the identification mark of the user; sending the fingerprint characteristic information to target terminal equipment; the target terminal device is the first terminal device and/or the second terminal device;
the second terminal device is used for receiving the fingerprint feature information which is sent by the control medium and corresponds to the identification mark of the user.
CN201810694984.6A 2018-06-29 2018-06-29 Information processing method, control medium and system Active CN110661833B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201810694984.6A CN110661833B (en) 2018-06-29 2018-06-29 Information processing method, control medium and system
PCT/CN2019/093933 WO2020001652A1 (en) 2018-06-29 2019-06-29 Systems and methods for informarion management
US17/137,281 US20210119803A1 (en) 2018-06-29 2020-12-29 Systems and methods for information management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810694984.6A CN110661833B (en) 2018-06-29 2018-06-29 Information processing method, control medium and system

Publications (2)

Publication Number Publication Date
CN110661833A CN110661833A (en) 2020-01-07
CN110661833B true CN110661833B (en) 2021-01-01

Family

ID=69027609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810694984.6A Active CN110661833B (en) 2018-06-29 2018-06-29 Information processing method, control medium and system

Country Status (1)

Country Link
CN (1) CN110661833B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873244A (en) * 2012-12-13 2014-06-18 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN106330442A (en) * 2015-06-17 2017-01-11 中兴通讯股份有限公司 Identity authentication method, device and system
CN106878025A (en) * 2017-04-24 2017-06-20 乐鑫信息科技(上海)有限公司 Internet of Things controlling switch and method based on fingerprint recognition control of authority

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100384948B1 (en) * 2000-08-03 2003-05-22 구홍식 Fingerprints recognition electronic card key, door opening-shutting device, management system for electronic card key, and method for controlling access to door using the sames
CN103036853B (en) * 2011-09-30 2016-01-27 中国移动通信集团公司 Business datum sending method and device, method for processing business and device
CN102769531A (en) * 2012-08-13 2012-11-07 鹤山世达光电科技有限公司 Identity authentication device and method thereof
US9286455B2 (en) * 2012-10-04 2016-03-15 Msi Security, Ltd. Real identity authentication
CN104144049B (en) * 2014-03-11 2016-02-17 腾讯科技(深圳)有限公司 A kind of encryption communication method, system and device
CN104065652B (en) * 2014-06-09 2015-10-14 北京石盾科技有限公司 A kind of auth method, device, system and relevant device
CN104660719B (en) * 2015-03-20 2018-11-27 云丁网络技术(北京)有限公司 A kind of electronic lock system and its intelligent management implementation method
CN105072117B (en) * 2015-08-14 2018-09-04 广东欧珀移动通信有限公司 Finger prints processing method and relevant apparatus and system
CN105224933A (en) * 2015-10-23 2016-01-06 云丁网络技术(北京)有限公司 A kind of safety long-distance authorization method of finger print information and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873244A (en) * 2012-12-13 2014-06-18 航天信息股份有限公司 Identity authentication method and system in mobile payment based on fingerprint identification
CN106330442A (en) * 2015-06-17 2017-01-11 中兴通讯股份有限公司 Identity authentication method, device and system
CN106878025A (en) * 2017-04-24 2017-06-20 乐鑫信息科技(上海)有限公司 Internet of Things controlling switch and method based on fingerprint recognition control of authority

Also Published As

Publication number Publication date
CN110661833A (en) 2020-01-07

Similar Documents

Publication Publication Date Title
US20180167394A1 (en) Controlling access to a locked space using cryptographic keys stored on a blockchain
CN102624699B (en) Method and system for protecting data
CN110661832B (en) Information processing method, cloud server and system
CN103607284B (en) Identity authentication method and equipment and server
US10284560B2 (en) Secure unmanned vehicle operation and communication
CN103873454A (en) Authentication method and equipment
CN112673600A (en) Multi-security authentication system and method between mobile phone terminal and IoT (Internet of things) equipment based on block chain
US8707444B2 (en) Systems and methods for implementing application control security
WO2005008502A1 (en) Access method
CN113572728B (en) Method, device, equipment and medium for authenticating Internet of things equipment
CN109064596B (en) Password management method and device and electronic equipment
US20150326402A1 (en) Authentication Systems
CN104615929A (en) Security key device for secure cloud services, and system and method of providing security cloud services
EP3975015B9 (en) Applet package sending method and device and computer readable medium
CN110287725B (en) Equipment, authority control method thereof and computer readable storage medium
KR101473656B1 (en) Method and apparatus for security of mobile data
CN110661833B (en) Information processing method, control medium and system
KR101133210B1 (en) Mobile Authentication System and Central Control System
CN103916404A (en) Data management method and system
KR101745482B1 (en) Communication method and apparatus in smart-home system
CN104732166A (en) Data storing and reading method and device and equipment
WO2019216847A2 (en) A sim-based data security system
US20140335847A1 (en) Method for establishing secure card history and audit for property hand-over
CN112422281B (en) Method and system for changing secret key in security module
EP3939199B1 (en) Method for provisioning white-box assets and corresponding device, server and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant