CN107729836A - Face identification method and Related product - Google Patents
Face identification method and Related product Download PDFInfo
- Publication number
- CN107729836A CN107729836A CN201710941356.9A CN201710941356A CN107729836A CN 107729836 A CN107729836 A CN 107729836A CN 201710941356 A CN201710941356 A CN 201710941356A CN 107729836 A CN107729836 A CN 107729836A
- Authority
- CN
- China
- Prior art keywords
- face
- recognition
- event
- strategy
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/161—Detection; Localisation; Normalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/16—Human faces, e.g. facial parts, sketches or expressions
- G06V40/168—Feature extraction; Face representation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Oral & Maxillofacial Surgery (AREA)
- Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Signal Processing (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Hardware Design (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present application discloses a kind of face identification method and Related product, including:When detecting the recognition of face request for the first event, it is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of first event;And according to the first face recognition strategy, pass through the first face characteristic of recognition of face trusted application acquisition active user;And the face template during the first face characteristic is closed with the first face template set in security system by the recognition of face trusted application is matched, to generate the first matching result;And first event is handled according to first matching result.The embodiment of the present application is advantageous to be lifted the security for the face recognition process that mobile terminal handles the first event.
Description
Technical field
The application is related to technical field of mobile terminals, and in particular to a kind of face identification method and Related product.
Background technology
With a large amount of popularization and applications of smart mobile phone, the application that smart mobile phone can be supported is more and more, and function is increasingly
Powerful, smart mobile phone develops towards variation, personalized direction, turns into indispensable appliance and electronic in user's life.
At present, as the higher and higher security requirement of smart mobile phone, a variety of biological information unblock schemes are arisen at the historic moment, example
Such as unlocked by fingerprint, face unblock, iris unblock etc., wherein, due to the unblock speed of face unblock, recognition success rate compared with
Height, become the primary selection of numerous smart mobile phones.
The content of the invention
The embodiment of the present application provides a kind of face identification method and Related product, knows to lift the face of mobile terminal
Other security and flexibility.
In a first aspect, the embodiment of the present application provides a kind of mobile terminal, including processor, the face of the processor is connected
Image collecting device and memory, wherein:
The human face image collecting device, for gathering facial image;
The memory, for storing face template;
The processor, for when detecting the recognition of face request for the first event, determining first event
Event type corresponding to recognition of face strategy be the first face recognition strategy;And according to the first face recognition strategy,
The first face characteristic of active user is obtained by recognition of face trusted application;And answered by the way that the recognition of face is credible
Matched with the face template during the first face characteristic is closed with the first face template set in security system, with
Generate the first matching result;And first event is handled according to first matching result.
Second aspect, the embodiment of the present application provide a kind of face identification method, applied to mobile terminal, the mobile terminal
Operation has security system, and being run in the security system has recognition of face trusted application, and methods described includes:
When detecting the recognition of face request for the first event, corresponding to the event type that determines first event
Recognition of face strategy is the first face recognition strategy;
According to the first face recognition strategy, the first of active user is obtained by the recognition of face trusted application
Face characteristic;
By the recognition of face trusted application by first in the first face characteristic and the security system
Face template in face template set is matched, to generate the first matching result;
First event is handled according to first matching result.
The third aspect, the embodiment of the present application provide a kind of mobile terminal, and the running of mobile terminal has security system, described
Operation has a recognition of face trusted application in security system, the mobile terminal include determining unit, acquiring unit, matching unit and
Processing unit,
The determining unit, for when detecting the recognition of face request for the first event, determining first thing
Recognition of face strategy corresponding to the event type of part is the first face recognition strategy;
The acquiring unit, for according to the first face recognition strategy, being obtained by the recognition of face trusted application
Take the first face characteristic of active user;
The matching unit, for by the recognition of face trusted application by the first face characteristic with it is described
Face template during the first face template set in security system closes is matched, to generate the first matching result;
The processing unit, for handling first event according to first matching result.
Fourth aspect, the embodiment of the present application provide a kind of mobile terminal, including processor, memory, communication interface and
One or more programs, wherein, one or more of programs are stored in the memory, and are configured by described
Manage device to perform, described program includes being used for the instruction for performing the step in the embodiment of the present application second aspect either method.
5th aspect, the embodiment of the present application provide a kind of computer-readable recording medium, wherein, it is described computer-readable
Storage medium stores the computer program for electronic data interchange, wherein, the computer program causes computer to perform such as
Part or all of step described in the embodiment of the present application second aspect either method, the computer include mobile terminal.
6th aspect, the embodiment of the present application provide a kind of computer program product, wherein, the computer program product
Non-transient computer-readable recording medium including storing computer program, the computer program are operable to make calculating
Machine is performed such as the part or all of step described in the embodiment of the present application second aspect either method.The computer program product
Can be a software installation bag, the computer includes mobile terminal.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of application, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of structural representation for mobile terminal that the embodiment of the present application provides;
Fig. 2A is a kind of schematic flow sheet of face identification method disclosed in the embodiment of the present application;
Fig. 2 B are a kind of Android system disclosed in the embodiment of the present application and the example architecture figure of security system;
Fig. 3 is the schematic flow sheet of another face identification method disclosed in the embodiment of the present application;
Fig. 4 is the schematic flow sheet of another face identification method disclosed in the embodiment of the present application;
Fig. 5 is a kind of structural representation of mobile terminal disclosed in the embodiment of the present application;
Fig. 6 is a kind of functional unit composition block diagram of mobile terminal disclosed in the embodiment of the present application.
Embodiment
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application
Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only
Some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belong to the scope of the application protection.
Term " first ", " second " in the description and claims of this application and the accompanying drawing etc. are to be used to distinguish
Different objects, rather than for describing particular order.In addition, term " comprising " and " having " and their any deformations, it is intended that
It is to cover non-exclusive include.Such as process, method, system, product or the equipment for containing series of steps or unit do not have
The step of being defined in the step of having listed or unit, but alternatively also including not listing or unit, or alternatively also wrap
Include for other intrinsic steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Mobile terminal involved by the embodiment of the present application can include the various handheld devices with radio communication function,
Mobile unit, wearable device, computing device or other processing equipments for being connected to radio modem, and various forms
User equipment (User Equipment, UE), mobile station (Mobile Station, MS), terminal device (terminal
Device) etc..For convenience of description, apparatus mentioned above is referred to as mobile terminal.
Mobile terminal described by the embodiment of the present application is provided with human face image collecting device, and human face image collecting device can
To be universal camera shooting head mould group, such as front camera.The embodiment of the present application is described in detail below.
A kind of structural representation of mobile terminal 100, the movement are provided referring to Fig. 1, Fig. 1 is the embodiment of the present application
Terminal 100 includes:Housing, touching display screen, mainboard, battery and subplate, be provided with mainboard processor 110, memory 120,
Front camera 130 and sim card slot etc., oscillator, integral sound chamber, VOOC are provided with subplate and is dodged and fills interface, the preposition shooting
First 130 form the human face image collecting device of the mobile terminal 100, and the human face image collecting device can include camera,
Wherein,
The human face image collecting device 130, for gathering facial image;
The memory 120, for storing face template;
The processor 110, for when detecting the recognition of face request for the first event, determining first thing
Recognition of face strategy corresponding to the event type of part is the first face recognition strategy;And according to the first recognition of face plan
Slightly, the first face characteristic of active user is obtained by recognition of face trusted application;And can by the recognition of face
Letter is using the face template progress during the first face template set in the first face characteristic and security system is closed
Match somebody with somebody, to generate the first matching result;And first event is handled according to first matching result.
Wherein, processor 110 is the control centre of mobile terminal, utilizes various interfaces and the whole mobile terminal of connection
Various pieces, by running or performing the software program and/or module that are stored in memory 120, and call and be stored in
Data in memory 120, the various functions and processing data of mobile terminal are performed, so as to carry out overall prison to mobile terminal
Control.Optionally, processor 110 can integrate application processor and modem processor, wherein, application processor mainly handles behaviour
Make system, user interface and application program etc., modem processor mainly handles radio communication.It is it is understood that described
Modem processor can not also be integrated into processor 110.
Wherein, memory 120 can be used for storage software program and module, and processor 110 is stored in storage by operation
The software program and module of device 120, so as to perform the various function application of mobile terminal and data processing.Memory 120
Storing program area and storage data field can mainly be included, wherein, storing program area can storage program area, at least one function institute
Application program needed etc.;Storage data field can store uses created data etc. according to mobile terminal.In addition, memory
120 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic disk storage
Part, flush memory device or other volatile solid-state parts.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system
Face identification service;The processor 110 is additionally operable to:When detecting the recognition of face request for second event, it is determined that described
Recognition of face strategy corresponding to the event type of second event is the second recognition of face strategy;And know according to second face
It is not tactful, the second face characteristic data of collection active user are serviced, by second face characteristic by the recognition of face
Data are matched and generated the second matching with the face template in the second face template set in the Android system and tied
Fruit;And the second event is handled according to second matching result.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute
State the data volume of each face template in the second face template set.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching
Second matching degree of fruit association.
In a possible example, it is described detecting for the first event recognition of face request when, determine institute
In terms of recognition of face strategy corresponding to the event type of the first event is stated as the first face recognition strategy, the processor 110 has
Body is used for:When detecting the recognition of face request for the first event, marked by inquiry of the event type of first event
Know, the mapping relations inquired about between default event type and recognition of face strategy, determine the event type of first event
For the first face recognition strategy.
Fig. 2A is referred to, Fig. 2A is that the embodiment of the present application provides a kind of schematic flow sheet of face identification method, application
In mobile terminal, the running of mobile terminal has Android system and security system, and being run in the Android system has recognition of face
Service is serviced, being run in the security system has recognition of face trusted application TA, as illustrated, this face identification method bag
Include:
S201, mobile terminal determine first event when detecting the recognition of face request for the first event
Recognition of face strategy corresponding to event type is the first face recognition strategy;
Wherein, event type can be the event type divided according to function or task, and such as unblock (such as puts out screen solution
Lock, using starting unblock, file unblock etc.), pay (such as wholesale payment, small amount payment, quick payment, offline electronic payment) etc..
The event type can also be the event type divided according to safe class, such as high safety grade type, middle safe class
Type, lower security rating-type etc..Unique restriction is not done herein.
Wherein, different event types corresponds to different recognition of face strategies, mobile terminal can prestore event type and
Mapping relations between face equipment strategy, the corresponding first face recognition strategy of event type of such as the first event of setting, second
Corresponding second recognition of face strategy of the event type of event etc..The mapping relations can specifically be set by user, or by servicing
Device is pushed to mobile terminal, is either preset or based on machine learning such as big data analyses by developer before dispatching from the factory
Algorithm Intelligent statistical history usage record does not do unique restriction herein to analyze to obtain.
S202, the mobile terminal are obtained according to the first face recognition strategy by the recognition of face trusted application
Take the first face characteristic of active user;
Wherein, recognition of face trusted application TA is the application in security system, and as shown in Figure 2 B, running of mobile terminal has richness
Performing environment (Rich Execution Environment, REE, REE) and credible performing environment (Trust Execution
Environment, TEE), TEE has the execution space of its own, that is to say, that also has an operation system in the environment of TEE
System.TEE environment is higher than the level of security of Rich OS (normal operating system).The software and hardware resources that TEE can be accessed be with
Rich OS separation.TEE provides trusted application TA secure execution environments, while also protects TA resource and the guarantor of data
Close property, integrality and access rights.In order to ensure the trusted roots of TEE in itself, TEE is to pass through checking in secure launch process
And isolate with Android operation system.In TEE, each TA is separate, and can not be in the case of unauthorized
Access mutually.The recognition of face TA is credible performing environment (Trust corresponding to the security system of the mobile terminal
Execution Environment, TEE) trusted application in the application supported.
S203, the mobile terminal by the recognition of face trusted application by the first face characteristic with it is described
Face template during the first face template set in security system closes is matched, to generate the first matching result;
S204, the mobile terminal handle first event according to first matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system
Face identification service;Methods described also includes:The mobile terminal is when detecting the recognition of face request for second event, really
Recognition of face strategy corresponding to the event type of the fixed second event is the second recognition of face strategy;According to second face
Recognition strategy, by the recognition of face service collection active user the second face characteristic data, will second face spy
Sign data are matched and generated the second matching with the face template in the second face template set in the Android system
As a result;The second event is handled according to second matching result.
Wherein, because the security of the face recognition process of the recognition of face TA based on security system is higher than based on Android
The face recognition process of the recognition of face service of system, so for safety perspective, can be higher by security requirement
The recognition of face TA that the face recognition process of event distributes to security system goes to complete, and by the relatively low thing of safety grades
The recognition of face service that the face recognition process of part distributes to Android system goes to complete.
For example, as type of payment that EventSelect safety grades are higher, handling duration is longer is the first
Face recognition strategy, starting types of events selection for application, safety grades are relatively low, faster second recognition of face of processing speed
Strategy, it can so be directed to the selection that becomes more meticulous that different event type realizes face recognition process.
It can be seen that in this example, mobile terminal is directed to different events, can be based on event type corresponding to the event, spirit
Recognition of face strategy corresponding to selection living is advantageous to improve becoming more meticulous for mobile terminal progress recognition of face to carry out recognition of face
Degree and flexibility.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute
State the data volume of each face template in the second face template set.
Wherein, the data volume of the template data included by face template is more, then requires constant feelings in matching degree
Under condition, the match complexity of the face template more than data volume is higher, so as to need the face characteristic number of that more current users
According to being matched, corresponding security can be higher.
It can be seen that in this example, by the data volume of the face characteristic data of differentiation face template, differentiation can be realized
Face recognition process, be advantageous to improve the comprehensive and flexibility that mobile terminal carries out recognition of face.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching
Second matching degree of fruit association.
Wherein, matching degree is higher, and the match is successful, and difficulty is bigger, and security is higher, but computation complexity is also lifted simultaneously.
It can be seen that in this example, by differentiation matching degree, differentiation face recognition process can be realized, is advantageous to improve
Mobile terminal carries out the comprehensive and flexibility of recognition of face.
It is described when detecting the recognition of face request for the first event in a possible example, it is determined that described
Recognition of face strategy corresponding to the event type of first event is the first face recognition strategy, including:
When detecting the recognition of face request for the first event, marked by inquiry of the event type of first event
Know, the mapping relations inquired about between default event type and recognition of face strategy, determine the event type of first event
For the first face recognition strategy.
It can be seen that in this example, the first recognition of face can fast, be accurately determined by way of inquiring about mapping relations
Strategy.
It is consistent with the embodiment shown in described Fig. 2A, referring to Fig. 3, Fig. 3 is a kind of people that the embodiment of the present application provides
The schematic flow sheet of face recognition method, applied to mobile terminal, the running of mobile terminal has Android system and security system, institute
Stating operation in Android system has recognition of face to service Service, and being run in the security system has recognition of face trusted application TA.
As illustrated, this face identification method includes:
S301, mobile terminal determine first event when detecting the recognition of face request for the first event
Recognition of face strategy corresponding to event type is the first face recognition strategy;
S302, the mobile terminal are obtained according to the first face recognition strategy by the recognition of face trusted application
Take the first face characteristic of active user;
S303, the mobile terminal by the recognition of face trusted application by the first face characteristic with it is described
Face template during the first face template set in security system closes is matched, to generate the first matching result;
S304, the mobile terminal handle first event according to first matching result.
S305, the mobile terminal determine second thing when detecting the recognition of face request for second event
Recognition of face strategy corresponding to the event type of part is the second recognition of face strategy;
S306, the mobile terminal are worked as according to the second recognition of face strategy by recognition of face service collection
The second face characteristic data of preceding user, by the second face template in the second face characteristic data and the Android system
Face template in set is matched and generated the second matching result;
S307, the mobile terminal handle the second event according to second matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In addition, mobile terminal is directed to different events, event type corresponding to the event can be based on, is flexibly chosen corresponding
Recognition of face strategy to carry out recognition of face, such as type of payment EventSelect safety grades are higher, handling duration
The first longer face recognition strategy, for types of events selection safety grades are relatively low, processing speed is faster using starting
Second recognition of face strategy, the selection that becomes more meticulous that different event type realizes face recognition process can be so directed to, is advantageous to
Improve precision degree and flexibility that mobile terminal carries out recognition of face.
It is consistent with the embodiment shown in described Fig. 2A, referring to Fig. 4, Fig. 4 is a kind of people that the embodiment of the present application provides
The schematic flow sheet of face recognition method, applied to mobile terminal, the running of mobile terminal has Android system and security system, institute
Stating operation in Android system has recognition of face to service Service, and being run in the security system has recognition of face trusted application TA.
As illustrated, this face identification method includes:
S401, mobile terminal is when detecting the recognition of face request for the first event, with the thing of first event
Part type identifies for inquiry, the mapping relations inquired about between default event type and recognition of face strategy, determines described first
The event type of event is the first face recognition strategy.
S402, the mobile terminal are obtained according to the first face recognition strategy by the recognition of face trusted application
Take the first face characteristic of active user;
S403, the mobile terminal by the recognition of face trusted application by the first face characteristic with it is described
Face template during the first face template set in security system closes is matched, to generate the first matching result;
S404, the mobile terminal handle first event according to first matching result.
S405, the mobile terminal determine second thing when detecting the recognition of face request for second event
Recognition of face strategy corresponding to the event type of part is the second recognition of face strategy;
S406, the mobile terminal are worked as according to the second recognition of face strategy by recognition of face service collection
The second face characteristic data of preceding user, by the second face template in the second face characteristic data and the Android system
Face template in set is matched and generated the second matching result;
Wherein, the data volume of each face template during the first face template set closes is more than second face template
The data volume of each face template in set.
Wherein, the first matching degree of the first matching result association is higher than second that second matching result associates
With degree.
S407, the mobile terminal handle the second event according to second matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In addition, mobile terminal is directed to different events, event type corresponding to the event can be based on, is flexibly chosen corresponding
Recognition of face strategy to carry out recognition of face, such as type of payment EventSelect safety grades are higher, handling duration
The first longer face recognition strategy, for types of events selection safety grades are relatively low, processing speed is faster using starting
Second recognition of face strategy, the selection that becomes more meticulous that different event type realizes face recognition process can be so directed to, is advantageous to
Improve precision degree and flexibility that mobile terminal carries out recognition of face.
In addition, the data volume for the face characteristic data for passing through differentiation face template, can realize differentiation recognition of face
Process, be advantageous to improve the comprehensive and flexibility that mobile terminal carries out recognition of face.
In addition, by differentiation matching degree, differentiation face recognition process can be realized, is advantageous to raising mobile terminal and enters
The comprehensive and flexibility of row recognition of face.
It is consistent with the embodiment shown in described Fig. 2A, Fig. 3, Fig. 4, provided referring to Fig. 5, Fig. 5 is the embodiment of the present application
A kind of mobile terminal structural representation, as illustrated, the mobile terminal include processor, memory, communication interface and
One or more programs, wherein, one or more of programs are stored in the memory, and are configured by described
Manage device to perform, described program includes being used for the instruction for performing following steps;
When detecting the recognition of face request for the first event, corresponding to the event type that determines first event
Recognition of face strategy is the first face recognition strategy;
According to the first face recognition strategy, the first of active user is obtained by the recognition of face trusted application
Face characteristic;
By the recognition of face trusted application by first in the first face characteristic and the security system
Face template in face template set is matched, to generate the first matching result;
First event is handled according to first matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system
Face identification service;Described program also includes being used to perform the instruction operated below:Detecting the face knowledge for second event
Do not invite when asking, it is the second recognition of face strategy to determine recognition of face strategy corresponding to the event type of the second event;And
According to the second recognition of face strategy, by the recognition of face service collection active user the second face characteristic data,
The second face characteristic data are matched with the face template in the second face template set in the Android system,
And the second matching result of generation;And the second event is handled according to second matching result.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute
State the data volume of each face template in the second face template set.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching
Second matching degree of fruit association.
In a possible example, it is described detecting for the first event recognition of face request when, determine institute
In terms of recognition of face strategy corresponding to the event type of the first event is stated as the first face recognition strategy, the instruction in described program
Specifically for performing following operate:When detecting the recognition of face request for the first event, with the thing of first event
Part type identifies for inquiry, the mapping relations inquired about between default event type and recognition of face strategy, determines described first
The event type of event is the first face recognition strategy.
Consistent with above-described embodiment, Fig. 6 is a kind of functional unit composition for mobile terminal that the embodiment of the present application provides
Block diagram, the running of mobile terminal have Android system and security system, and being run in the Android system has recognition of face service
Service, in the security system operation have recognition of face trusted application TA, the mobile terminal 600 includes:Determining unit 601,
Acquiring unit 602, matching unit 603 and processing unit 604, wherein,
The determining unit 601, for when detecting the recognition of face request for the first event, determining described first
Recognition of face strategy corresponding to the event type of event is the first face recognition strategy;
The acquiring unit 602, for according to the first face recognition strategy, passing through the recognition of face trusted application
Obtain the first face characteristic of active user;
The matching unit 603, for by the recognition of face trusted application by the first face characteristic with
Face template during the first face template set in the security system closes is matched, to generate the first matching result;
The processing unit 604, for handling first event according to first matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event,
It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face
Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through
Face template during trusted application closes the first face characteristic with the first face template set in security system is matched,
To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run
In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application
The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or
The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system
Face identification service;The determining unit 601, it is additionally operable to, when detecting the recognition of face request for second event, determine institute
It is the second recognition of face strategy to state recognition of face strategy corresponding to the event type of second event;
The acquiring unit 602, it is additionally operable to, according to the second recognition of face strategy, adopt by the recognition of face service
Collect the second face characteristic data of active user;
The matching unit 603, it is additionally operable to the second people in the second face characteristic data and the Android system
Face template in face template set is matched and generated the second matching result;
The processing unit 604, it is additionally operable to handle the second event according to second matching result.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute
State the data volume of each face template in the second face template set.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching
Second matching degree of fruit association.
In a possible example, it is described detecting for the first event recognition of face request when, determine institute
In terms of recognition of face strategy corresponding to the event type of the first event is stated as the first face recognition strategy, the determining unit 601
It is specifically used for:When detecting the recognition of face request for the first event, using the event type of first event as inquiry
Identify, the mapping relations inquired about between default event type and recognition of face strategy, determine the event class of first event
Type is the first face recognition strategy.
It should be noted that the mobile terminal described by the application device embodiment is presented in the form of functional unit.
Term " unit " used herein above should be understood to implication as most wide as possible, for realizing function described by each " unit "
Object for example can be integrated circuit ASIC, single circuit, for performing the processing of one or more softwares or firmware program
Device (shared, special or chipset) and memory, combinational logic circuit, and/or other conjunctions for realizing above-mentioned function are provided
Suitable component.
Wherein, the determining unit 601, the matching unit 603 and processing unit 604 can be processor or control
Device, the acquiring unit 602 can be communication interfaces.
The embodiment of the present application also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium is stored for electricity
The computer program that subdata exchanges, the computer program cause computer to perform any as described in methods described embodiment
The part or all of step of method, the computer include mobile terminal.
The embodiment of the present application also provides a kind of computer program product, and the computer program product includes storing calculating
The non-transient computer-readable recording medium of machine program, the computer program are operable to make computer perform such as the side
The part or all of step of either method described in method embodiment.The computer program product can be a software installation
Bag, the computer include mobile terminal.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because
According to the application, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application
It is necessary.
In the described embodiment, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way
Realize.For example, device embodiment described above is only schematical, such as the division of the unit, it is only one kind
Division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can combine or can
To be integrated into another system, or some features can be ignored, or not perform.Another, shown or discussed is mutual
Coupling direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit,
Can be electrical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.The integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer-readable access to memory.Based on such understanding, the technical scheme of the application substantially or
Person say the part to be contributed to prior art or the technical scheme all or part can in the form of software product body
Reveal and, the computer software product is stored in a memory, including some instructions are causing a computer equipment
(can be personal computer, server or network equipment etc.) performs all or part of each embodiment above method of the application
Step.And foregoing memory includes:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory
(RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with the medium of store program codes.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable memory, memory
It can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English:
Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and
Embodiment is set forth, and the explanation of above example is only intended to help and understands the present processes and its core concept;
Meanwhile for those of ordinary skill in the art, according to the thought of the application, can in specific embodiments and applications
There is change part, in summary, this specification content should not be construed as the limitation to the application.
Claims (13)
1. a kind of mobile terminal, it is characterised in that including processor, connect the human face image collecting device of the processor and deposit
Reservoir, wherein:
The human face image collecting device, for gathering facial image;
The memory, for storing face template;
The processor, for when detecting the recognition of face request for the first event, determining the thing of first event
Recognition of face strategy corresponding to part type is the first face recognition strategy;And according to the first face recognition strategy, pass through
Recognition of face trusted application obtains the first face characteristic of active user;And will by the recognition of face trusted application
Face template during the first face characteristic is closed with the first face template set in security system is matched, with generation
First matching result;And first event is handled according to first matching result.
2. mobile terminal according to claim 1, it is characterised in that the running of mobile terminal has Android system, described
Operation has recognition of face service in Android system;The processor is additionally operable to:Detecting the recognition of face for second event
During request, it is the second recognition of face strategy to determine recognition of face strategy corresponding to the event type of the second event;And press
According to the second recognition of face strategy, the second face characteristic data of collection active user are serviced by the recognition of face, incited somebody to action
The second face characteristic data are matched with the face template in the second face template set in the Android system, with
And the second matching result of generation;And the second event is handled according to second matching result.
3. mobile terminal according to claim 2, it is characterised in that each face in the first face template set conjunction
The data volume of template is more than the data volume of each face template in the second face template set.
4. mobile terminal according to claim 3, it is characterised in that the first matching degree of the first matching result association
Higher than the second matching degree of second matching result association.
5. according to the mobile terminal described in claim any one of 1-4, it is characterised in that be directed to the first thing detecting described
During the recognition of face request of part, it is the first recognition of face to determine recognition of face strategy corresponding to the event type of first event
Tactful aspect, the processor are specifically used for:When detecting the recognition of face request for the first event, with first thing
The event type of part identifies for inquiry, the mapping relations inquired about between default event type and recognition of face strategy, determines institute
The event type for stating the first event is the first face recognition strategy.
A kind of 6. face identification method, it is characterised in that applied to mobile terminal, the running of mobile terminal has security system,
Operation has recognition of face trusted application in the security system, and methods described includes:
When detecting the recognition of face request for the first event, face corresponding to the event type of first event is determined
Recognition strategy is the first face recognition strategy;
According to the first face recognition strategy, the first face that active user is obtained by the recognition of face trusted application is special
Levy data;
By the recognition of face trusted application by the first face in the first face characteristic and the security system
Face template in template set is matched, to generate the first matching result;
First event is handled according to first matching result.
7. according to the method for claim 6, it is characterised in that the running of mobile terminal has Android system, the Android
Operation has recognition of face service in system;Methods described also includes:
When detecting the recognition of face request for second event, face corresponding to the event type of the second event is determined
Recognition strategy is the second recognition of face strategy;
According to the second recognition of face strategy, the second face characteristic number for gathering active user is serviced by the recognition of face
According to, the face template in the second face template set in the second face characteristic data and the Android system carried out
Match somebody with somebody and generate the second matching result;
The second event is handled according to second matching result.
8. according to the method for claim 7, it is characterised in that each face template in the first face template set conjunction
Data volume be more than the second face template set in each face template data volume.
9. according to the method for claim 8, it is characterised in that the first matching degree of the first matching result association is higher than
Second matching degree of the second matching result association.
10. according to the method described in claim any one of 6-9, it is characterised in that described to detect for the first event
When recognition of face is asked, it is the first recognition of face plan to determine recognition of face strategy corresponding to the event type of first event
Omit, including:
When detecting the recognition of face request for the first event, identified by inquiry of the event type of first event,
The mapping relations inquired about between default event type and recognition of face strategy, the event type for determining first event are institute
State the first face recognition strategy.
11. a kind of mobile terminal, it is characterised in that the running of mobile terminal has security system, is run in the security system
There is recognition of face trusted application, the mobile terminal includes determining unit, acquiring unit, matching unit and processing unit,
The determining unit, for when detecting the recognition of face request for the first event, determining first event
Recognition of face strategy corresponding to event type is the first face recognition strategy;
The acquiring unit, for according to the first face recognition strategy, being obtained and being worked as by the recognition of face trusted application
The first face characteristic of preceding user;
The matching unit, for by the recognition of face trusted application by the first face characteristic and the safety
Face template during the first face template set in system closes is matched, to generate the first matching result;
The processing unit, for handling first event according to first matching result.
A kind of 12. mobile terminal, it is characterised in that including processor, memory, communication interface, and one or more programs,
One or more of programs are stored in the memory, and are configured by the computing device, described program bag
Include the instruction for performing the step in the method as described in claim any one of 6-10.
A kind of 13. computer-readable recording medium, it is characterised in that the computer program for electronic data interchange is stored, its
In, the computer program causes computer to perform the method as described in claim any one of 6-10, and the computer includes
Mobile terminal.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710941356.9A CN107729836B (en) | 2017-10-11 | 2017-10-11 | Face recognition method and related product |
PCT/CN2018/109065 WO2019072133A1 (en) | 2017-10-11 | 2018-09-30 | Face recognition method and related product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710941356.9A CN107729836B (en) | 2017-10-11 | 2017-10-11 | Face recognition method and related product |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107729836A true CN107729836A (en) | 2018-02-23 |
CN107729836B CN107729836B (en) | 2020-03-24 |
Family
ID=61210342
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710941356.9A Active CN107729836B (en) | 2017-10-11 | 2017-10-11 | Face recognition method and related product |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107729836B (en) |
WO (1) | WO2019072133A1 (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924340A (en) * | 2018-06-06 | 2018-11-30 | Oppo广东移动通信有限公司 | Verification method, verifying device and computer readable storage medium |
CN108959880A (en) * | 2018-06-06 | 2018-12-07 | Oppo广东移动通信有限公司 | Verification method, verifying device and computer readable storage medium |
WO2019072133A1 (en) * | 2017-10-11 | 2019-04-18 | Oppo广东移动通信有限公司 | Face recognition method and related product |
CN109672659A (en) * | 2018-09-25 | 2019-04-23 | 平安科技(深圳)有限公司 | User terminal fingerprint identification method, device, equipment and readable storage medium storing program for executing |
EP3633546A4 (en) * | 2018-04-12 | 2020-10-21 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Image processing method and apparatus, and electronic device and computer-readable storage medium |
US10942999B2 (en) | 2018-06-06 | 2021-03-09 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Verification method, verification device, electronic device and computer readable storage medium |
JP2021525006A (en) * | 2018-05-30 | 2021-09-16 | オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Laser projector control system and mobile terminals |
US11184513B2 (en) | 2018-04-28 | 2021-11-23 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | System, method and device for controlling electronic device and its target camera and laser projector |
EP3621294B1 (en) * | 2018-07-16 | 2023-02-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for image capture, computer readable storage medium and electronic device |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114995709A (en) * | 2022-05-13 | 2022-09-02 | 深圳康佳电子科技有限公司 | Multi-window splicing and combining interaction method, terminal and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130281206A1 (en) * | 2010-11-15 | 2013-10-24 | Bally Gaming, Inc. | System and Method for Augmented Reality Gaming |
CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
CN105760736A (en) * | 2016-02-19 | 2016-07-13 | 北京奇虎科技有限公司 | Unlocking method and unlocking device of application program |
CN105959317A (en) * | 2016-07-11 | 2016-09-21 | 深圳市金立通信设备有限公司 | Security authentication method and terminal |
CN106599649A (en) * | 2016-11-10 | 2017-04-26 | Tcl数码科技(深圳)有限责任公司 | Camera-based terminal device user identity verification method and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107729836B (en) * | 2017-10-11 | 2020-03-24 | Oppo广东移动通信有限公司 | Face recognition method and related product |
-
2017
- 2017-10-11 CN CN201710941356.9A patent/CN107729836B/en active Active
-
2018
- 2018-09-30 WO PCT/CN2018/109065 patent/WO2019072133A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130281206A1 (en) * | 2010-11-15 | 2013-10-24 | Bally Gaming, Inc. | System and Method for Augmented Reality Gaming |
CN105205370A (en) * | 2015-08-24 | 2015-12-30 | 北京恒信安科技有限公司 | Safety protection method for mobile terminal, mobile terminal, safety system and application method |
CN105760736A (en) * | 2016-02-19 | 2016-07-13 | 北京奇虎科技有限公司 | Unlocking method and unlocking device of application program |
CN105959317A (en) * | 2016-07-11 | 2016-09-21 | 深圳市金立通信设备有限公司 | Security authentication method and terminal |
CN106599649A (en) * | 2016-11-10 | 2017-04-26 | Tcl数码科技(深圳)有限责任公司 | Camera-based terminal device user identity verification method and system |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019072133A1 (en) * | 2017-10-11 | 2019-04-18 | Oppo广东移动通信有限公司 | Face recognition method and related product |
EP3633546A4 (en) * | 2018-04-12 | 2020-10-21 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Image processing method and apparatus, and electronic device and computer-readable storage medium |
US11170204B2 (en) | 2018-04-12 | 2021-11-09 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Data processing method, electronic device and computer-readable storage medium |
US11184513B2 (en) | 2018-04-28 | 2021-11-23 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | System, method and device for controlling electronic device and its target camera and laser projector |
AU2019277762B2 (en) * | 2018-05-30 | 2022-04-21 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Control system for laser projector and mobile terminal |
JP2021525006A (en) * | 2018-05-30 | 2021-09-16 | オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Laser projector control system and mobile terminals |
JP7168687B2 (en) | 2018-05-30 | 2022-11-09 | オッポ広東移動通信有限公司 | Laser projector control system and mobile terminal |
US11506963B2 (en) | 2018-05-30 | 2022-11-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Systems for controlling laser projector and mobile terminals |
EP3575916B1 (en) * | 2018-05-30 | 2022-11-30 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Systems for controlling laser projector and mobile terminals |
US10942999B2 (en) | 2018-06-06 | 2021-03-09 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Verification method, verification device, electronic device and computer readable storage medium |
CN108959880A (en) * | 2018-06-06 | 2018-12-07 | Oppo广东移动通信有限公司 | Verification method, verifying device and computer readable storage medium |
CN108924340A (en) * | 2018-06-06 | 2018-11-30 | Oppo广东移动通信有限公司 | Verification method, verifying device and computer readable storage medium |
EP3621294B1 (en) * | 2018-07-16 | 2023-02-22 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | Method and device for image capture, computer readable storage medium and electronic device |
CN109672659A (en) * | 2018-09-25 | 2019-04-23 | 平安科技(深圳)有限公司 | User terminal fingerprint identification method, device, equipment and readable storage medium storing program for executing |
Also Published As
Publication number | Publication date |
---|---|
CN107729836B (en) | 2020-03-24 |
WO2019072133A1 (en) | 2019-04-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107729836A (en) | Face identification method and Related product | |
CN107832670A (en) | Face identification method and Related product | |
CN103488481B (en) | Application program control method, terminal equipment and remote control system | |
CN107808127A (en) | Face identification method and Related product | |
CN106227437B (en) | A kind of unlocked by fingerprint method and terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106228054A (en) | Auth method and device | |
CN109583356A (en) | Fingerprint identification method and Related product | |
CN107622191B (en) | Unlocking control method and related product | |
CN107527046A (en) | Solve lock control method and Related product | |
CN107622243A (en) | Solve lock control method and Related product | |
CN107818253A (en) | Face template data inputting control method and Related product | |
CN107766713A (en) | Face template data inputting control method and Related product | |
CN109117619A (en) | Unlocked by fingerprint method and Related product | |
CN107765853A (en) | Using method for closing, device, storage medium and electronic equipment | |
CN105550627A (en) | Fingerprint verification method and apparatus | |
CN107483717A (en) | The method to set up and Related product of infrared light compensating lamp | |
CN108737638A (en) | Application control method, apparatus, mobile terminal and computer-readable medium | |
CN112989888B (en) | Fingerprint anti-counterfeiting method and electronic equipment | |
CN107317928B (en) | Information processing method, mobile terminal and computer readable storage medium | |
CN107657219A (en) | Method for detecting human face and Related product | |
CN106027532A (en) | Voiceprint-based subscriber identity authentication method, terminal and server | |
CN104252352A (en) | Information processing method and electronic equipment | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN114528598A (en) | Method and device for determining file integrity of file system and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: Guangdong Opel Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |