CN107729836A - Face identification method and Related product - Google Patents

Face identification method and Related product Download PDF

Info

Publication number
CN107729836A
CN107729836A CN201710941356.9A CN201710941356A CN107729836A CN 107729836 A CN107729836 A CN 107729836A CN 201710941356 A CN201710941356 A CN 201710941356A CN 107729836 A CN107729836 A CN 107729836A
Authority
CN
China
Prior art keywords
face
recognition
event
strategy
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710941356.9A
Other languages
Chinese (zh)
Other versions
CN107729836B (en
Inventor
周海涛
王立中
郭子青
蒋奎
惠方方
王健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710941356.9A priority Critical patent/CN107729836B/en
Publication of CN107729836A publication Critical patent/CN107729836A/en
Priority to PCT/CN2018/109065 priority patent/WO2019072133A1/en
Application granted granted Critical
Publication of CN107729836B publication Critical patent/CN107729836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/168Feature extraction; Face representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present application discloses a kind of face identification method and Related product, including:When detecting the recognition of face request for the first event, it is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of first event;And according to the first face recognition strategy, pass through the first face characteristic of recognition of face trusted application acquisition active user;And the face template during the first face characteristic is closed with the first face template set in security system by the recognition of face trusted application is matched, to generate the first matching result;And first event is handled according to first matching result.The embodiment of the present application is advantageous to be lifted the security for the face recognition process that mobile terminal handles the first event.

Description

Face identification method and Related product
Technical field
The application is related to technical field of mobile terminals, and in particular to a kind of face identification method and Related product.
Background technology
With a large amount of popularization and applications of smart mobile phone, the application that smart mobile phone can be supported is more and more, and function is increasingly Powerful, smart mobile phone develops towards variation, personalized direction, turns into indispensable appliance and electronic in user's life.
At present, as the higher and higher security requirement of smart mobile phone, a variety of biological information unblock schemes are arisen at the historic moment, example Such as unlocked by fingerprint, face unblock, iris unblock etc., wherein, due to the unblock speed of face unblock, recognition success rate compared with Height, become the primary selection of numerous smart mobile phones.
The content of the invention
The embodiment of the present application provides a kind of face identification method and Related product, knows to lift the face of mobile terminal Other security and flexibility.
In a first aspect, the embodiment of the present application provides a kind of mobile terminal, including processor, the face of the processor is connected Image collecting device and memory, wherein:
The human face image collecting device, for gathering facial image;
The memory, for storing face template;
The processor, for when detecting the recognition of face request for the first event, determining first event Event type corresponding to recognition of face strategy be the first face recognition strategy;And according to the first face recognition strategy, The first face characteristic of active user is obtained by recognition of face trusted application;And answered by the way that the recognition of face is credible Matched with the face template during the first face characteristic is closed with the first face template set in security system, with Generate the first matching result;And first event is handled according to first matching result.
Second aspect, the embodiment of the present application provide a kind of face identification method, applied to mobile terminal, the mobile terminal Operation has security system, and being run in the security system has recognition of face trusted application, and methods described includes:
When detecting the recognition of face request for the first event, corresponding to the event type that determines first event Recognition of face strategy is the first face recognition strategy;
According to the first face recognition strategy, the first of active user is obtained by the recognition of face trusted application Face characteristic;
By the recognition of face trusted application by first in the first face characteristic and the security system Face template in face template set is matched, to generate the first matching result;
First event is handled according to first matching result.
The third aspect, the embodiment of the present application provide a kind of mobile terminal, and the running of mobile terminal has security system, described Operation has a recognition of face trusted application in security system, the mobile terminal include determining unit, acquiring unit, matching unit and Processing unit,
The determining unit, for when detecting the recognition of face request for the first event, determining first thing Recognition of face strategy corresponding to the event type of part is the first face recognition strategy;
The acquiring unit, for according to the first face recognition strategy, being obtained by the recognition of face trusted application Take the first face characteristic of active user;
The matching unit, for by the recognition of face trusted application by the first face characteristic with it is described Face template during the first face template set in security system closes is matched, to generate the first matching result;
The processing unit, for handling first event according to first matching result.
Fourth aspect, the embodiment of the present application provide a kind of mobile terminal, including processor, memory, communication interface and One or more programs, wherein, one or more of programs are stored in the memory, and are configured by described Manage device to perform, described program includes being used for the instruction for performing the step in the embodiment of the present application second aspect either method.
5th aspect, the embodiment of the present application provide a kind of computer-readable recording medium, wherein, it is described computer-readable Storage medium stores the computer program for electronic data interchange, wherein, the computer program causes computer to perform such as Part or all of step described in the embodiment of the present application second aspect either method, the computer include mobile terminal.
6th aspect, the embodiment of the present application provide a kind of computer program product, wherein, the computer program product Non-transient computer-readable recording medium including storing computer program, the computer program are operable to make calculating Machine is performed such as the part or all of step described in the embodiment of the present application second aspect either method.The computer program product Can be a software installation bag, the computer includes mobile terminal.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of application, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of structural representation for mobile terminal that the embodiment of the present application provides;
Fig. 2A is a kind of schematic flow sheet of face identification method disclosed in the embodiment of the present application;
Fig. 2 B are a kind of Android system disclosed in the embodiment of the present application and the example architecture figure of security system;
Fig. 3 is the schematic flow sheet of another face identification method disclosed in the embodiment of the present application;
Fig. 4 is the schematic flow sheet of another face identification method disclosed in the embodiment of the present application;
Fig. 5 is a kind of structural representation of mobile terminal disclosed in the embodiment of the present application;
Fig. 6 is a kind of functional unit composition block diagram of mobile terminal disclosed in the embodiment of the present application.
Embodiment
In order that those skilled in the art more fully understand application scheme, below in conjunction with the embodiment of the present application Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only Some embodiments of the present application, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belong to the scope of the application protection.
Term " first ", " second " in the description and claims of this application and the accompanying drawing etc. are to be used to distinguish Different objects, rather than for describing particular order.In addition, term " comprising " and " having " and their any deformations, it is intended that It is to cover non-exclusive include.Such as process, method, system, product or the equipment for containing series of steps or unit do not have The step of being defined in the step of having listed or unit, but alternatively also including not listing or unit, or alternatively also wrap Include for other intrinsic steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Mobile terminal involved by the embodiment of the present application can include the various handheld devices with radio communication function, Mobile unit, wearable device, computing device or other processing equipments for being connected to radio modem, and various forms User equipment (User Equipment, UE), mobile station (Mobile Station, MS), terminal device (terminal Device) etc..For convenience of description, apparatus mentioned above is referred to as mobile terminal.
Mobile terminal described by the embodiment of the present application is provided with human face image collecting device, and human face image collecting device can To be universal camera shooting head mould group, such as front camera.The embodiment of the present application is described in detail below.
A kind of structural representation of mobile terminal 100, the movement are provided referring to Fig. 1, Fig. 1 is the embodiment of the present application Terminal 100 includes:Housing, touching display screen, mainboard, battery and subplate, be provided with mainboard processor 110, memory 120, Front camera 130 and sim card slot etc., oscillator, integral sound chamber, VOOC are provided with subplate and is dodged and fills interface, the preposition shooting First 130 form the human face image collecting device of the mobile terminal 100, and the human face image collecting device can include camera, Wherein,
The human face image collecting device 130, for gathering facial image;
The memory 120, for storing face template;
The processor 110, for when detecting the recognition of face request for the first event, determining first thing Recognition of face strategy corresponding to the event type of part is the first face recognition strategy;And according to the first recognition of face plan Slightly, the first face characteristic of active user is obtained by recognition of face trusted application;And can by the recognition of face Letter is using the face template progress during the first face template set in the first face characteristic and security system is closed Match somebody with somebody, to generate the first matching result;And first event is handled according to first matching result.
Wherein, processor 110 is the control centre of mobile terminal, utilizes various interfaces and the whole mobile terminal of connection Various pieces, by running or performing the software program and/or module that are stored in memory 120, and call and be stored in Data in memory 120, the various functions and processing data of mobile terminal are performed, so as to carry out overall prison to mobile terminal Control.Optionally, processor 110 can integrate application processor and modem processor, wherein, application processor mainly handles behaviour Make system, user interface and application program etc., modem processor mainly handles radio communication.It is it is understood that described Modem processor can not also be integrated into processor 110.
Wherein, memory 120 can be used for storage software program and module, and processor 110 is stored in storage by operation The software program and module of device 120, so as to perform the various function application of mobile terminal and data processing.Memory 120 Storing program area and storage data field can mainly be included, wherein, storing program area can storage program area, at least one function institute Application program needed etc.;Storage data field can store uses created data etc. according to mobile terminal.In addition, memory 120 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic disk storage Part, flush memory device or other volatile solid-state parts.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system Face identification service;The processor 110 is additionally operable to:When detecting the recognition of face request for second event, it is determined that described Recognition of face strategy corresponding to the event type of second event is the second recognition of face strategy;And know according to second face It is not tactful, the second face characteristic data of collection active user are serviced, by second face characteristic by the recognition of face Data are matched and generated the second matching with the face template in the second face template set in the Android system and tied Fruit;And the second event is handled according to second matching result.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute State the data volume of each face template in the second face template set.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching Second matching degree of fruit association.
In a possible example, it is described detecting for the first event recognition of face request when, determine institute In terms of recognition of face strategy corresponding to the event type of the first event is stated as the first face recognition strategy, the processor 110 has Body is used for:When detecting the recognition of face request for the first event, marked by inquiry of the event type of first event Know, the mapping relations inquired about between default event type and recognition of face strategy, determine the event type of first event For the first face recognition strategy.
Fig. 2A is referred to, Fig. 2A is that the embodiment of the present application provides a kind of schematic flow sheet of face identification method, application In mobile terminal, the running of mobile terminal has Android system and security system, and being run in the Android system has recognition of face Service is serviced, being run in the security system has recognition of face trusted application TA, as illustrated, this face identification method bag Include:
S201, mobile terminal determine first event when detecting the recognition of face request for the first event Recognition of face strategy corresponding to event type is the first face recognition strategy;
Wherein, event type can be the event type divided according to function or task, and such as unblock (such as puts out screen solution Lock, using starting unblock, file unblock etc.), pay (such as wholesale payment, small amount payment, quick payment, offline electronic payment) etc.. The event type can also be the event type divided according to safe class, such as high safety grade type, middle safe class Type, lower security rating-type etc..Unique restriction is not done herein.
Wherein, different event types corresponds to different recognition of face strategies, mobile terminal can prestore event type and Mapping relations between face equipment strategy, the corresponding first face recognition strategy of event type of such as the first event of setting, second Corresponding second recognition of face strategy of the event type of event etc..The mapping relations can specifically be set by user, or by servicing Device is pushed to mobile terminal, is either preset or based on machine learning such as big data analyses by developer before dispatching from the factory Algorithm Intelligent statistical history usage record does not do unique restriction herein to analyze to obtain.
S202, the mobile terminal are obtained according to the first face recognition strategy by the recognition of face trusted application Take the first face characteristic of active user;
Wherein, recognition of face trusted application TA is the application in security system, and as shown in Figure 2 B, running of mobile terminal has richness Performing environment (Rich Execution Environment, REE, REE) and credible performing environment (Trust Execution Environment, TEE), TEE has the execution space of its own, that is to say, that also has an operation system in the environment of TEE System.TEE environment is higher than the level of security of Rich OS (normal operating system).The software and hardware resources that TEE can be accessed be with Rich OS separation.TEE provides trusted application TA secure execution environments, while also protects TA resource and the guarantor of data Close property, integrality and access rights.In order to ensure the trusted roots of TEE in itself, TEE is to pass through checking in secure launch process And isolate with Android operation system.In TEE, each TA is separate, and can not be in the case of unauthorized Access mutually.The recognition of face TA is credible performing environment (Trust corresponding to the security system of the mobile terminal Execution Environment, TEE) trusted application in the application supported.
S203, the mobile terminal by the recognition of face trusted application by the first face characteristic with it is described Face template during the first face template set in security system closes is matched, to generate the first matching result;
S204, the mobile terminal handle first event according to first matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system Face identification service;Methods described also includes:The mobile terminal is when detecting the recognition of face request for second event, really Recognition of face strategy corresponding to the event type of the fixed second event is the second recognition of face strategy;According to second face Recognition strategy, by the recognition of face service collection active user the second face characteristic data, will second face spy Sign data are matched and generated the second matching with the face template in the second face template set in the Android system As a result;The second event is handled according to second matching result.
Wherein, because the security of the face recognition process of the recognition of face TA based on security system is higher than based on Android The face recognition process of the recognition of face service of system, so for safety perspective, can be higher by security requirement The recognition of face TA that the face recognition process of event distributes to security system goes to complete, and by the relatively low thing of safety grades The recognition of face service that the face recognition process of part distributes to Android system goes to complete.
For example, as type of payment that EventSelect safety grades are higher, handling duration is longer is the first Face recognition strategy, starting types of events selection for application, safety grades are relatively low, faster second recognition of face of processing speed Strategy, it can so be directed to the selection that becomes more meticulous that different event type realizes face recognition process.
It can be seen that in this example, mobile terminal is directed to different events, can be based on event type corresponding to the event, spirit Recognition of face strategy corresponding to selection living is advantageous to improve becoming more meticulous for mobile terminal progress recognition of face to carry out recognition of face Degree and flexibility.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute State the data volume of each face template in the second face template set.
Wherein, the data volume of the template data included by face template is more, then requires constant feelings in matching degree Under condition, the match complexity of the face template more than data volume is higher, so as to need the face characteristic number of that more current users According to being matched, corresponding security can be higher.
It can be seen that in this example, by the data volume of the face characteristic data of differentiation face template, differentiation can be realized Face recognition process, be advantageous to improve the comprehensive and flexibility that mobile terminal carries out recognition of face.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching Second matching degree of fruit association.
Wherein, matching degree is higher, and the match is successful, and difficulty is bigger, and security is higher, but computation complexity is also lifted simultaneously.
It can be seen that in this example, by differentiation matching degree, differentiation face recognition process can be realized, is advantageous to improve Mobile terminal carries out the comprehensive and flexibility of recognition of face.
It is described when detecting the recognition of face request for the first event in a possible example, it is determined that described Recognition of face strategy corresponding to the event type of first event is the first face recognition strategy, including:
When detecting the recognition of face request for the first event, marked by inquiry of the event type of first event Know, the mapping relations inquired about between default event type and recognition of face strategy, determine the event type of first event For the first face recognition strategy.
It can be seen that in this example, the first recognition of face can fast, be accurately determined by way of inquiring about mapping relations Strategy.
It is consistent with the embodiment shown in described Fig. 2A, referring to Fig. 3, Fig. 3 is a kind of people that the embodiment of the present application provides The schematic flow sheet of face recognition method, applied to mobile terminal, the running of mobile terminal has Android system and security system, institute Stating operation in Android system has recognition of face to service Service, and being run in the security system has recognition of face trusted application TA. As illustrated, this face identification method includes:
S301, mobile terminal determine first event when detecting the recognition of face request for the first event Recognition of face strategy corresponding to event type is the first face recognition strategy;
S302, the mobile terminal are obtained according to the first face recognition strategy by the recognition of face trusted application Take the first face characteristic of active user;
S303, the mobile terminal by the recognition of face trusted application by the first face characteristic with it is described Face template during the first face template set in security system closes is matched, to generate the first matching result;
S304, the mobile terminal handle first event according to first matching result.
S305, the mobile terminal determine second thing when detecting the recognition of face request for second event Recognition of face strategy corresponding to the event type of part is the second recognition of face strategy;
S306, the mobile terminal are worked as according to the second recognition of face strategy by recognition of face service collection The second face characteristic data of preceding user, by the second face template in the second face characteristic data and the Android system Face template in set is matched and generated the second matching result;
S307, the mobile terminal handle the second event according to second matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In addition, mobile terminal is directed to different events, event type corresponding to the event can be based on, is flexibly chosen corresponding Recognition of face strategy to carry out recognition of face, such as type of payment EventSelect safety grades are higher, handling duration The first longer face recognition strategy, for types of events selection safety grades are relatively low, processing speed is faster using starting Second recognition of face strategy, the selection that becomes more meticulous that different event type realizes face recognition process can be so directed to, is advantageous to Improve precision degree and flexibility that mobile terminal carries out recognition of face.
It is consistent with the embodiment shown in described Fig. 2A, referring to Fig. 4, Fig. 4 is a kind of people that the embodiment of the present application provides The schematic flow sheet of face recognition method, applied to mobile terminal, the running of mobile terminal has Android system and security system, institute Stating operation in Android system has recognition of face to service Service, and being run in the security system has recognition of face trusted application TA. As illustrated, this face identification method includes:
S401, mobile terminal is when detecting the recognition of face request for the first event, with the thing of first event Part type identifies for inquiry, the mapping relations inquired about between default event type and recognition of face strategy, determines described first The event type of event is the first face recognition strategy.
S402, the mobile terminal are obtained according to the first face recognition strategy by the recognition of face trusted application Take the first face characteristic of active user;
S403, the mobile terminal by the recognition of face trusted application by the first face characteristic with it is described Face template during the first face template set in security system closes is matched, to generate the first matching result;
S404, the mobile terminal handle first event according to first matching result.
S405, the mobile terminal determine second thing when detecting the recognition of face request for second event Recognition of face strategy corresponding to the event type of part is the second recognition of face strategy;
S406, the mobile terminal are worked as according to the second recognition of face strategy by recognition of face service collection The second face characteristic data of preceding user, by the second face template in the second face characteristic data and the Android system Face template in set is matched and generated the second matching result;
Wherein, the data volume of each face template during the first face template set closes is more than second face template The data volume of each face template in set.
Wherein, the first matching degree of the first matching result association is higher than second that second matching result associates With degree.
S407, the mobile terminal handle the second event according to second matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In addition, mobile terminal is directed to different events, event type corresponding to the event can be based on, is flexibly chosen corresponding Recognition of face strategy to carry out recognition of face, such as type of payment EventSelect safety grades are higher, handling duration The first longer face recognition strategy, for types of events selection safety grades are relatively low, processing speed is faster using starting Second recognition of face strategy, the selection that becomes more meticulous that different event type realizes face recognition process can be so directed to, is advantageous to Improve precision degree and flexibility that mobile terminal carries out recognition of face.
In addition, the data volume for the face characteristic data for passing through differentiation face template, can realize differentiation recognition of face Process, be advantageous to improve the comprehensive and flexibility that mobile terminal carries out recognition of face.
In addition, by differentiation matching degree, differentiation face recognition process can be realized, is advantageous to raising mobile terminal and enters The comprehensive and flexibility of row recognition of face.
It is consistent with the embodiment shown in described Fig. 2A, Fig. 3, Fig. 4, provided referring to Fig. 5, Fig. 5 is the embodiment of the present application A kind of mobile terminal structural representation, as illustrated, the mobile terminal include processor, memory, communication interface and One or more programs, wherein, one or more of programs are stored in the memory, and are configured by described Manage device to perform, described program includes being used for the instruction for performing following steps;
When detecting the recognition of face request for the first event, corresponding to the event type that determines first event Recognition of face strategy is the first face recognition strategy;
According to the first face recognition strategy, the first of active user is obtained by the recognition of face trusted application Face characteristic;
By the recognition of face trusted application by first in the first face characteristic and the security system Face template in face template set is matched, to generate the first matching result;
First event is handled according to first matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system Face identification service;Described program also includes being used to perform the instruction operated below:Detecting the face knowledge for second event Do not invite when asking, it is the second recognition of face strategy to determine recognition of face strategy corresponding to the event type of the second event;And According to the second recognition of face strategy, by the recognition of face service collection active user the second face characteristic data, The second face characteristic data are matched with the face template in the second face template set in the Android system, And the second matching result of generation;And the second event is handled according to second matching result.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute State the data volume of each face template in the second face template set.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching Second matching degree of fruit association.
In a possible example, it is described detecting for the first event recognition of face request when, determine institute In terms of recognition of face strategy corresponding to the event type of the first event is stated as the first face recognition strategy, the instruction in described program Specifically for performing following operate:When detecting the recognition of face request for the first event, with the thing of first event Part type identifies for inquiry, the mapping relations inquired about between default event type and recognition of face strategy, determines described first The event type of event is the first face recognition strategy.
Consistent with above-described embodiment, Fig. 6 is a kind of functional unit composition for mobile terminal that the embodiment of the present application provides Block diagram, the running of mobile terminal have Android system and security system, and being run in the Android system has recognition of face service Service, in the security system operation have recognition of face trusted application TA, the mobile terminal 600 includes:Determining unit 601, Acquiring unit 602, matching unit 603 and processing unit 604, wherein,
The determining unit 601, for when detecting the recognition of face request for the first event, determining described first Recognition of face strategy corresponding to the event type of event is the first face recognition strategy;
The acquiring unit 602, for according to the first face recognition strategy, passing through the recognition of face trusted application Obtain the first face characteristic of active user;
The matching unit 603, for by the recognition of face trusted application by the first face characteristic with Face template during the first face template set in the security system closes is matched, to generate the first matching result;
The processing unit 604, for handling first event according to first matching result.
As can be seen that in the embodiment of the present application, mobile terminal when detecting the recognition of face request for the first event, It is the first face recognition strategy to determine recognition of face strategy corresponding to the event type of the first event;Secondly, according to the first face Recognition strategy, the first face characteristic of active user is obtained by recognition of face trusted application;Again, recognition of face is passed through Face template during trusted application closes the first face characteristic with the first face template set in security system is matched, To generate the first matching result;Finally, the first event is handled according to the first matching result.Because recognition of face trusted application is run In security system, it is mutually isolated with the application program of Android system, so handle first by recognition of face trusted application The face recognition process security of event can be higher, can effectively avoid Android system unauthorized applications or theft-of-service or The data of processing procedure are distorted, improve the security of the recognition of face of the first event.
In a possible example, the running of mobile terminal has Android system, and someone is run in the Android system Face identification service;The determining unit 601, it is additionally operable to, when detecting the recognition of face request for second event, determine institute It is the second recognition of face strategy to state recognition of face strategy corresponding to the event type of second event;
The acquiring unit 602, it is additionally operable to, according to the second recognition of face strategy, adopt by the recognition of face service Collect the second face characteristic data of active user;
The matching unit 603, it is additionally operable to the second people in the second face characteristic data and the Android system Face template in face template set is matched and generated the second matching result;
The processing unit 604, it is additionally operable to handle the second event according to second matching result.
In a possible example, the data volume of each face template in the first face template set conjunction is more than institute State the data volume of each face template in the second face template set.
In a possible example, the first matching degree of the first matching result association is tied higher than the described second matching Second matching degree of fruit association.
In a possible example, it is described detecting for the first event recognition of face request when, determine institute In terms of recognition of face strategy corresponding to the event type of the first event is stated as the first face recognition strategy, the determining unit 601 It is specifically used for:When detecting the recognition of face request for the first event, using the event type of first event as inquiry Identify, the mapping relations inquired about between default event type and recognition of face strategy, determine the event class of first event Type is the first face recognition strategy.
It should be noted that the mobile terminal described by the application device embodiment is presented in the form of functional unit. Term " unit " used herein above should be understood to implication as most wide as possible, for realizing function described by each " unit " Object for example can be integrated circuit ASIC, single circuit, for performing the processing of one or more softwares or firmware program Device (shared, special or chipset) and memory, combinational logic circuit, and/or other conjunctions for realizing above-mentioned function are provided Suitable component.
Wherein, the determining unit 601, the matching unit 603 and processing unit 604 can be processor or control Device, the acquiring unit 602 can be communication interfaces.
The embodiment of the present application also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium is stored for electricity The computer program that subdata exchanges, the computer program cause computer to perform any as described in methods described embodiment The part or all of step of method, the computer include mobile terminal.
The embodiment of the present application also provides a kind of computer program product, and the computer program product includes storing calculating The non-transient computer-readable recording medium of machine program, the computer program are operable to make computer perform such as the side The part or all of step of either method described in method embodiment.The computer program product can be a software installation Bag, the computer include mobile terminal.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because According to the application, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application It is necessary.
In the described embodiment, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way Realize.For example, device embodiment described above is only schematical, such as the division of the unit, it is only one kind Division of logic function, can there is an other dividing mode when actually realizing, such as multiple units or component can combine or can To be integrated into another system, or some features can be ignored, or not perform.Another, shown or discussed is mutual Coupling direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING or communication connection of device or unit, Can be electrical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the application can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.The integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer-readable access to memory.Based on such understanding, the technical scheme of the application substantially or Person say the part to be contributed to prior art or the technical scheme all or part can in the form of software product body Reveal and, the computer software product is stored in a memory, including some instructions are causing a computer equipment (can be personal computer, server or network equipment etc.) performs all or part of each embodiment above method of the application Step.And foregoing memory includes:USB flash disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with the medium of store program codes.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable memory, memory It can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English: Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and Embodiment is set forth, and the explanation of above example is only intended to help and understands the present processes and its core concept; Meanwhile for those of ordinary skill in the art, according to the thought of the application, can in specific embodiments and applications There is change part, in summary, this specification content should not be construed as the limitation to the application.

Claims (13)

1. a kind of mobile terminal, it is characterised in that including processor, connect the human face image collecting device of the processor and deposit Reservoir, wherein:
The human face image collecting device, for gathering facial image;
The memory, for storing face template;
The processor, for when detecting the recognition of face request for the first event, determining the thing of first event Recognition of face strategy corresponding to part type is the first face recognition strategy;And according to the first face recognition strategy, pass through Recognition of face trusted application obtains the first face characteristic of active user;And will by the recognition of face trusted application Face template during the first face characteristic is closed with the first face template set in security system is matched, with generation First matching result;And first event is handled according to first matching result.
2. mobile terminal according to claim 1, it is characterised in that the running of mobile terminal has Android system, described Operation has recognition of face service in Android system;The processor is additionally operable to:Detecting the recognition of face for second event During request, it is the second recognition of face strategy to determine recognition of face strategy corresponding to the event type of the second event;And press According to the second recognition of face strategy, the second face characteristic data of collection active user are serviced by the recognition of face, incited somebody to action The second face characteristic data are matched with the face template in the second face template set in the Android system, with And the second matching result of generation;And the second event is handled according to second matching result.
3. mobile terminal according to claim 2, it is characterised in that each face in the first face template set conjunction The data volume of template is more than the data volume of each face template in the second face template set.
4. mobile terminal according to claim 3, it is characterised in that the first matching degree of the first matching result association Higher than the second matching degree of second matching result association.
5. according to the mobile terminal described in claim any one of 1-4, it is characterised in that be directed to the first thing detecting described During the recognition of face request of part, it is the first recognition of face to determine recognition of face strategy corresponding to the event type of first event Tactful aspect, the processor are specifically used for:When detecting the recognition of face request for the first event, with first thing The event type of part identifies for inquiry, the mapping relations inquired about between default event type and recognition of face strategy, determines institute The event type for stating the first event is the first face recognition strategy.
A kind of 6. face identification method, it is characterised in that applied to mobile terminal, the running of mobile terminal has security system, Operation has recognition of face trusted application in the security system, and methods described includes:
When detecting the recognition of face request for the first event, face corresponding to the event type of first event is determined Recognition strategy is the first face recognition strategy;
According to the first face recognition strategy, the first face that active user is obtained by the recognition of face trusted application is special Levy data;
By the recognition of face trusted application by the first face in the first face characteristic and the security system Face template in template set is matched, to generate the first matching result;
First event is handled according to first matching result.
7. according to the method for claim 6, it is characterised in that the running of mobile terminal has Android system, the Android Operation has recognition of face service in system;Methods described also includes:
When detecting the recognition of face request for second event, face corresponding to the event type of the second event is determined Recognition strategy is the second recognition of face strategy;
According to the second recognition of face strategy, the second face characteristic number for gathering active user is serviced by the recognition of face According to, the face template in the second face template set in the second face characteristic data and the Android system carried out Match somebody with somebody and generate the second matching result;
The second event is handled according to second matching result.
8. according to the method for claim 7, it is characterised in that each face template in the first face template set conjunction Data volume be more than the second face template set in each face template data volume.
9. according to the method for claim 8, it is characterised in that the first matching degree of the first matching result association is higher than Second matching degree of the second matching result association.
10. according to the method described in claim any one of 6-9, it is characterised in that described to detect for the first event When recognition of face is asked, it is the first recognition of face plan to determine recognition of face strategy corresponding to the event type of first event Omit, including:
When detecting the recognition of face request for the first event, identified by inquiry of the event type of first event, The mapping relations inquired about between default event type and recognition of face strategy, the event type for determining first event are institute State the first face recognition strategy.
11. a kind of mobile terminal, it is characterised in that the running of mobile terminal has security system, is run in the security system There is recognition of face trusted application, the mobile terminal includes determining unit, acquiring unit, matching unit and processing unit,
The determining unit, for when detecting the recognition of face request for the first event, determining first event Recognition of face strategy corresponding to event type is the first face recognition strategy;
The acquiring unit, for according to the first face recognition strategy, being obtained and being worked as by the recognition of face trusted application The first face characteristic of preceding user;
The matching unit, for by the recognition of face trusted application by the first face characteristic and the safety Face template during the first face template set in system closes is matched, to generate the first matching result;
The processing unit, for handling first event according to first matching result.
A kind of 12. mobile terminal, it is characterised in that including processor, memory, communication interface, and one or more programs, One or more of programs are stored in the memory, and are configured by the computing device, described program bag Include the instruction for performing the step in the method as described in claim any one of 6-10.
A kind of 13. computer-readable recording medium, it is characterised in that the computer program for electronic data interchange is stored, its In, the computer program causes computer to perform the method as described in claim any one of 6-10, and the computer includes Mobile terminal.
CN201710941356.9A 2017-10-11 2017-10-11 Face recognition method and related product Active CN107729836B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710941356.9A CN107729836B (en) 2017-10-11 2017-10-11 Face recognition method and related product
PCT/CN2018/109065 WO2019072133A1 (en) 2017-10-11 2018-09-30 Face recognition method and related product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710941356.9A CN107729836B (en) 2017-10-11 2017-10-11 Face recognition method and related product

Publications (2)

Publication Number Publication Date
CN107729836A true CN107729836A (en) 2018-02-23
CN107729836B CN107729836B (en) 2020-03-24

Family

ID=61210342

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710941356.9A Active CN107729836B (en) 2017-10-11 2017-10-11 Face recognition method and related product

Country Status (2)

Country Link
CN (1) CN107729836B (en)
WO (1) WO2019072133A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924340A (en) * 2018-06-06 2018-11-30 Oppo广东移动通信有限公司 Verification method, verifying device and computer readable storage medium
CN108959880A (en) * 2018-06-06 2018-12-07 Oppo广东移动通信有限公司 Verification method, verifying device and computer readable storage medium
WO2019072133A1 (en) * 2017-10-11 2019-04-18 Oppo广东移动通信有限公司 Face recognition method and related product
CN109672659A (en) * 2018-09-25 2019-04-23 平安科技(深圳)有限公司 User terminal fingerprint identification method, device, equipment and readable storage medium storing program for executing
EP3633546A4 (en) * 2018-04-12 2020-10-21 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Image processing method and apparatus, and electronic device and computer-readable storage medium
US10942999B2 (en) 2018-06-06 2021-03-09 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Verification method, verification device, electronic device and computer readable storage medium
JP2021525006A (en) * 2018-05-30 2021-09-16 オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. Laser projector control system and mobile terminals
US11184513B2 (en) 2018-04-28 2021-11-23 Guangdong Oppo Mobile Telecommunications Corp., Ltd. System, method and device for controlling electronic device and its target camera and laser projector
EP3621294B1 (en) * 2018-07-16 2023-02-22 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and device for image capture, computer readable storage medium and electronic device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114995709A (en) * 2022-05-13 2022-09-02 深圳康佳电子科技有限公司 Multi-window splicing and combining interaction method, terminal and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130281206A1 (en) * 2010-11-15 2013-10-24 Bally Gaming, Inc. System and Method for Augmented Reality Gaming
CN105205370A (en) * 2015-08-24 2015-12-30 北京恒信安科技有限公司 Safety protection method for mobile terminal, mobile terminal, safety system and application method
CN105760736A (en) * 2016-02-19 2016-07-13 北京奇虎科技有限公司 Unlocking method and unlocking device of application program
CN105959317A (en) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 Security authentication method and terminal
CN106599649A (en) * 2016-11-10 2017-04-26 Tcl数码科技(深圳)有限责任公司 Camera-based terminal device user identity verification method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107729836B (en) * 2017-10-11 2020-03-24 Oppo广东移动通信有限公司 Face recognition method and related product

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130281206A1 (en) * 2010-11-15 2013-10-24 Bally Gaming, Inc. System and Method for Augmented Reality Gaming
CN105205370A (en) * 2015-08-24 2015-12-30 北京恒信安科技有限公司 Safety protection method for mobile terminal, mobile terminal, safety system and application method
CN105760736A (en) * 2016-02-19 2016-07-13 北京奇虎科技有限公司 Unlocking method and unlocking device of application program
CN105959317A (en) * 2016-07-11 2016-09-21 深圳市金立通信设备有限公司 Security authentication method and terminal
CN106599649A (en) * 2016-11-10 2017-04-26 Tcl数码科技(深圳)有限责任公司 Camera-based terminal device user identity verification method and system

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019072133A1 (en) * 2017-10-11 2019-04-18 Oppo广东移动通信有限公司 Face recognition method and related product
EP3633546A4 (en) * 2018-04-12 2020-10-21 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Image processing method and apparatus, and electronic device and computer-readable storage medium
US11170204B2 (en) 2018-04-12 2021-11-09 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Data processing method, electronic device and computer-readable storage medium
US11184513B2 (en) 2018-04-28 2021-11-23 Guangdong Oppo Mobile Telecommunications Corp., Ltd. System, method and device for controlling electronic device and its target camera and laser projector
AU2019277762B2 (en) * 2018-05-30 2022-04-21 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Control system for laser projector and mobile terminal
JP2021525006A (en) * 2018-05-30 2021-09-16 オッポ広東移動通信有限公司Guangdong Oppo Mobile Telecommunications Corp., Ltd. Laser projector control system and mobile terminals
JP7168687B2 (en) 2018-05-30 2022-11-09 オッポ広東移動通信有限公司 Laser projector control system and mobile terminal
US11506963B2 (en) 2018-05-30 2022-11-22 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Systems for controlling laser projector and mobile terminals
EP3575916B1 (en) * 2018-05-30 2022-11-30 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Systems for controlling laser projector and mobile terminals
US10942999B2 (en) 2018-06-06 2021-03-09 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Verification method, verification device, electronic device and computer readable storage medium
CN108959880A (en) * 2018-06-06 2018-12-07 Oppo广东移动通信有限公司 Verification method, verifying device and computer readable storage medium
CN108924340A (en) * 2018-06-06 2018-11-30 Oppo广东移动通信有限公司 Verification method, verifying device and computer readable storage medium
EP3621294B1 (en) * 2018-07-16 2023-02-22 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and device for image capture, computer readable storage medium and electronic device
CN109672659A (en) * 2018-09-25 2019-04-23 平安科技(深圳)有限公司 User terminal fingerprint identification method, device, equipment and readable storage medium storing program for executing

Also Published As

Publication number Publication date
CN107729836B (en) 2020-03-24
WO2019072133A1 (en) 2019-04-18

Similar Documents

Publication Publication Date Title
CN107729836A (en) Face identification method and Related product
CN107832670A (en) Face identification method and Related product
CN103488481B (en) Application program control method, terminal equipment and remote control system
CN107808127A (en) Face identification method and Related product
CN106227437B (en) A kind of unlocked by fingerprint method and terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106228054A (en) Auth method and device
CN109583356A (en) Fingerprint identification method and Related product
CN107622191B (en) Unlocking control method and related product
CN107527046A (en) Solve lock control method and Related product
CN107622243A (en) Solve lock control method and Related product
CN107818253A (en) Face template data inputting control method and Related product
CN107766713A (en) Face template data inputting control method and Related product
CN109117619A (en) Unlocked by fingerprint method and Related product
CN107765853A (en) Using method for closing, device, storage medium and electronic equipment
CN105550627A (en) Fingerprint verification method and apparatus
CN107483717A (en) The method to set up and Related product of infrared light compensating lamp
CN108737638A (en) Application control method, apparatus, mobile terminal and computer-readable medium
CN112989888B (en) Fingerprint anti-counterfeiting method and electronic equipment
CN107317928B (en) Information processing method, mobile terminal and computer readable storage medium
CN107657219A (en) Method for detecting human face and Related product
CN106027532A (en) Voiceprint-based subscriber identity authentication method, terminal and server
CN104252352A (en) Information processing method and electronic equipment
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN114528598A (en) Method and device for determining file integrity of file system and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant